11.) How can database performance be monitored?
A) Using performance monitoring tools
B) Analyzing query execution plans
C) Tracking server resource usage
D) All of the above
12.) What is a disaster recovery plan in database management?
A) A plan to optimize database queries
B) A strategy to recover data in case of failure
C) A guide to install database software
D) A method to grant user permissions
13.) What is SQL injection?
A) A database optimization technique
B) A method of creating backups
C) A security vulnerability allowing malicious SQL code execution
D) A way to encrypt database records
14.) Which SQL function can identify the current user?
A) USER()
B) CURRENT_USER()
C) SESSION_USER()
D) All of the above
15.) How is sensitive data protected in a database?
A) By limiting user access
B) By using encryption
C) By auditing and monitoring activities
D) All of the above
16.) What is the purpose of a database firewall?
A) To optimize query execution
B) To block unauthorized access
C) To monitor server performance
D) To manage user permissions
17.) What is the difference between symmetric and asymmetric encryption in databases?
A) Symmetric uses one key; asymmetric uses two keys
B) Asymmetric is faster than symmetric
C) Symmetric encrypts only text; asymmetric encrypts all data
D) There is no difference
18.) What is the primary purpose of a database schema?
A) To define the structure of the database
B) To store backup files
C) To grant user permissions
D) To execute SQL queries
19.) What does “principle of least privilege” mean in database security?
A) Encrypting sensitive data
B) Allowing all users full database access
C) Removing unused tables and columns
D) Assigning minimum access necessary for users
20.) Which command is used to lock a table in SQL?
A) LOCK TABLE
B) BLOCK TABLE
C) SECURE TABLE
D) FREEZE TABLE
Related