5. Databases Networks
Database Security — Quiz
Test your understanding of database security with 5 practice questions.
Practice Questions
Question 1
Which advanced encryption standard (AES) mode of operation is most suitable for encrypting large databases where parallel processing of encryption and decryption is crucial for performance, while still maintaining data confidentiality?
Question 2
A database system implements a security measure that ensures that even if an unauthorized party gains access to the encrypted data, they cannot determine if two identical plaintext values result in the same ciphertext. Which cryptographic property is being described?
Question 3
In a highly sensitive database environment, a security policy dictates that users should only be able to access data that is directly relevant to their current task, and these permissions should be revoked immediately after the task is completed. Which principle of authorization is this policy primarily enforcing?
Question 4
A database administrator is designing a backup strategy for a critical financial database that requires a Recovery Point Objective (RPO) of less than 15 minutes and a Recovery Time Objective (RTO) of less than 4 hours. Which combination of backup types and technologies would be most appropriate to meet these stringent requirements?
Question 5
Consider a scenario where a database stores highly sensitive personal identifiable information (PII). To comply with stringent data protection regulations, the organization decides to implement a technique that replaces sensitive data with non-sensitive, unique identifiers while maintaining referential integrity. Which data protection technique is being described?
