Computer

Database Security & Backup Techniques MCQs with Answers

What is the primary purpose of database security?
a) To improve query performance
b) To ensure data availability
c) To protect data from unauthorized access
d) To store data more efficiently

Answer
c) To protect data from unauthorized access

Which of the following is a key aspect of database backup?
a) Increasing data redundancy
b) Ensuring real-time data availability
c) Protecting data from corruption or loss
d) Reducing database size

Answer
c) Protecting data from corruption or loss

Which backup method involves copying only the data that has changed since the last backup?
a) Full backup
b) Incremental backup
c) Differential backup
d) Mirror backup

Answer
b) Incremental backup

Which of the following describes a full database backup?
a) A backup of only the changed data
b) A backup of the entire database
c) A backup of the database schema only
d) A backup of non-critical data

Answer
b) A backup of the entire database

Which security measure is used to restrict access to sensitive data in a database?
a) Backup encryption
b) Data masking
c) Data replication
d) Database indexing

Answer
b) Data masking

What is the primary benefit of database encryption?
a) To improve query performance
b) To prevent unauthorized access to sensitive data
c) To reduce database size
d) To speed up data backup processes

Answer
b) To prevent unauthorized access to sensitive data

Which technique involves copying data from one storage location to another to ensure high availability?
a) Data replication
b) Data normalization
c) Data compression
d) Data indexing

Answer
a) Data replication

What is a differential backup?
a) A backup of the entire database
b) A backup of all data that has changed since the last full backup
c) A backup of only the data that has changed since the last incremental backup
d) A backup of critical data only

Answer
b) A backup of all data that has changed since the last full backup

Which of the following is an example of database authentication?
a) Backup encryption
b) User ID and password
c) Database replication
d) Database partitioning

Answer
b) User ID and password

What is the purpose of a database firewall?
a) To prevent unauthorized access to the database
b) To manage database connections
c) To store backup copies
d) To encrypt sensitive data

Answer
a) To prevent unauthorized access to the database

Which of the following backup strategies is most appropriate for large databases with minimal changes?
a) Full backup
b) Incremental backup
c) Differential backup
d) Snapshot backup

Answer
a) Full backup

Which technique ensures that data in a database is consistent and reliable even in the event of a failure?
a) Data encryption
b) Backup recovery
c) Database transaction logging
d) Data normalization

Answer
c) Database transaction logging

What is a “hot” backup?
a) A backup of data while the database is offline
b) A backup of data while the database is online and actively in use
c) A backup that occurs only during non-peak hours
d) A backup of inactive data

Answer
b) A backup of data while the database is online and actively in use

Which database security measure helps to prevent SQL injection attacks?
a) Backup encryption
b) Input validation
c) Data compression
d) Database indexing

Answer
b) Input validation

What is the main purpose of database transaction logs?
a) To provide data backups
b) To ensure data consistency and recoverability
c) To store unstructured data
d) To optimize query performance

Answer
b) To ensure data consistency and recoverability

Which of the following describes a “cold” backup?
a) A backup performed while the database is online
b) A backup of critical data only
c) A backup performed while the database is offline
d) A backup of all changed data only

Answer
c) A backup performed while the database is offline

Which of the following is an example of data access control in database security?
a) Data encryption
b) Backup scheduling
c) User roles and permissions
d) Data compression

Answer
c) User roles and permissions

Which backup method is most commonly used to minimize backup time and storage requirements?
a) Full backup
b) Incremental backup
c) Differential backup
d) Snapshot backup

Answer
b) Incremental backup

What is the primary function of a database audit trail?
a) To monitor query performance
b) To track changes and access to sensitive data
c) To backup data
d) To encrypt database files

Answer
b) To track changes and access to sensitive data

What is the purpose of a “point-in-time” backup?
a) To store data at a specific moment in time for recovery
b) To store only the most recent data
c) To store data that has been compressed
d) To store data in an encrypted format

Answer
a) To store data at a specific moment in time for recovery

Which of the following is an essential part of a database backup strategy?
a) Encrypting sensitive data
b) Replicating data across multiple servers
c) Regularly testing backup and recovery procedures
d) Storing backups in unstructured formats

Answer
c) Regularly testing backup and recovery procedures

Which of the following is the primary objective of database backup and recovery?
a) To improve database performance
b) To ensure data is not lost due to hardware failures or disasters
c) To reduce storage requirements
d) To prevent unauthorized data access

Answer
b) To ensure data is not lost due to hardware failures or disasters

Which database security practice helps protect against unauthorized database changes?
a) Data encryption
b) Backup scheduling
c) Change management and auditing
d) Database partitioning

Answer
c) Change management and auditing

Which of the following is a benefit of database replication for security purposes?
a) It reduces storage requirements
b) It helps recover data in case of failure
c) It speeds up query processing
d) It ensures the database is always encrypted

Answer
b) It helps recover data in case of failure

Which of the following is an important feature of secure database access control?
a) Backup encryption
b) Strong password policies and authentication
c) Data compression
d) Data fragmentation

Answer
b) Strong password policies and authentication

Which of the following backup methods is best suited for frequent, small changes in the database?
a) Full backup
b) Incremental backup
c) Differential backup
d) Snapshot backup

Answer
b) Incremental backup

What is the role of database partitioning in security?
a) It encrypts sensitive data
b) It improves database query performance
c) It divides a database into smaller, more manageable pieces for easier access control
d) It stores backup copies of data

Answer
c) It divides a database into smaller, more manageable pieces for easier access control

Which backup method involves storing only the changes made since the last backup of any kind?
a) Full backup
b) Incremental backup
c) Differential backup
d) Snapshot backup

Answer
b) Incremental backup

What is a key principle of database security?
a) To store all data in an encrypted format
b) To prevent data loss and ensure unauthorized access is blocked
c) To regularly back up data but not encrypt it
d) To store data in unstructured formats

Answer
b) To prevent data loss and ensure unauthorized access is blocked

Which database backup strategy is best suited for databases with frequent and large updates?
a) Full backup
b) Incremental backup
c) Differential backup
d) Snapshot backup

Answer
c) Differential backup

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button