August 2009
Intermediate to advanced
893 pages
26h 48m
English
| 1. | True |
| 2. | True |
| 3. | True |
| 4. | True |
| 5. | True |
| 6. | False |
| 7. | True |
| 8. | True |
| 9. | False |
| 10. | True |
| 11. | True |
| 12. | True |
| 13. | True. |
| 1. | (d) |
| 2. | (c) |
| 3. | (b) |
| 4. | (b) |
| 5. | (c) |
| 6. | (a) |
| 7. | (b) |
| 8. | (c) |
| 9. | (d) |
| 10. | (b) |
| 11. | (a) |
| 12. | (a) |
| 13. | (b) |
| 14. | (c) |
| 15. | (c) |
| 16. | (d). |
| 1. | Protection, threats |
| 2. | Database security |
| 3. | (a) sabotage of hardware, (b) sabotage of applications |
| 4. | Invalid, corrupted |
| 5. | Authorization |
| 6. | GRANT, REVOKE |
| 7. | Authorization |
| 8. | Data encryption |
| 9. | Authentication |
| 10. | Coding or scrambling |
| 11. | (a) Simple substitution method, (b) Polyalphabetic substitution method |
| 12. | DBA |
| 13. | Access rights (also called privileges) |
| 14. | Access rights (also called privileges) |
| 15. | The Bel-LaPadula model |
| 16. | Firewall |
| 17. | Statistical database security. |