0% found this document useful (0 votes)
117 views

Database Security Imp Questions

The document discusses various topics related to database security including hardening principles, access policies, zero-day attacks, authentication and authorization, intrusion detection systems, software vulnerability tools, network access mapping, Oracle network security specifications, user identification, Kerberos, buffer overflows, perimeter security tools like IPS, IDS and firewalls, vulnerability management processes, port scanners, authentication methods for databases, and profile creation and password parameters for account lockouts. It provides question numbers and associated mark values for cycle test questions on these topics.

Uploaded by

Mamta Varma
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views

Database Security Imp Questions

The document discusses various topics related to database security including hardening principles, access policies, zero-day attacks, authentication and authorization, intrusion detection systems, software vulnerability tools, network access mapping, Oracle network security specifications, user identification, Kerberos, buffer overflows, perimeter security tools like IPS, IDS and firewalls, vulnerability management processes, port scanners, authentication methods for databases, and profile creation and password parameters for account lockouts. It provides question numbers and associated mark values for cycle test questions on these topics.

Uploaded by

Mamta Varma
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Database Security Imp question for cycle test 1 with page numbers 2 Marks 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

14. 15. Principles of hardening C2 security & c2 auditing Access policy diagram Zero-day attacks Authentication, authorization and administration IDS types based on data collection Signature VS statistical analysis False positive and False negative Software vulnerability tools and its types -53 Account lock out Need for n/w access map Program IP interface in oracle n/w layer and its components Mention the security specification related to oracle10g in network connectivity-87 Mention the identification of users for authentication-95 Kerberos

16 Marks 1. 2. 3. 4. 5. Buffer Overflow-24(8) Perimeters security (IPS, IDS, Firewall)-42( Vulnerability management process-52(8) Tracking tools and applications, discuss about port scanners-66 and 81-84(16) Different authentication methods adapted with example(Related to DB2 or Oracle or anyone)-96(16) 6. Profile creation and password parameter assignment concern with account lock out and corrective measures to overcome the account lock out issues.-117-119(16)

You might also like