Relational Database Management System Mcqs

Page No. 26

What are workflows in a business logic layer?


aThey describe how a particular task that involves servers is handled


b They describe how multiple tasks involving a single participant is handled


cThey describe how a particular task involving multiple participants is handled.


dNone of the mentioned



. The _________ layer provides the interface between the business logic layer and the underlying database


a Business-logic layer


b Data access layer


cData transfer layer


dBusiness manager layer


View Answer Data access layer

The ___________ provides a high level view of data and actions on data


aBusiness-logic layer


bData access layer


cData transfer layer


dBusiness manager layer


View Answer Business-logic layer

Which of the following is true regarding the model-view- controller architecture?


aThe model corresponds to the business logic layer


bThe view defines the presentation of data


cThe controller receives events, executes actions on the model and returns a view


dAll of the mentioned


View Answer All of the mentioned

Which of the following is a valid encryption technique?


aParallel key encryption


b Public key encryption


cSystematic key encryption


dAll of the mentioned



A log of all changes to the application data is called as __________


aAudit trail


b Audit log


cAudit lead


dData log


View Answer Audit trail

What is the standard for exchanging authentication and authorization information between two different security domains?


aSABM


bSTML


c SPTA


d SAML


View Answer SAML

What are phishing attacks?


aUsers are forced to use a second server which causes the attack


bUsers are forced to divert to a fake site where the attack takes place


cUsers are fooled by similar GUI and data is extracted from them.


d None of the mentioned



What are man in the middle attacks?


a Users are forced to use a second server which causes the attack


bUsers are forced to divert to a fake site where the attack takes pla


cUsers are fooled by similar GUI and data is extracted from them.


dNone of the mentioned



The system where two independent pieces of data are used to identify a user is called as ______


a Two system authentication


b ID password authentication


cTwo factor authenticatio


dMulti data authentication



Goto Page No.

Page 26 of 54

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan