Obj WS MID 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Important Objective Questions & Answers for Mid-2 objective exam

1. The correct syntax of the declaration which defines the XML version? <?xml version="1.0" ?>

2. In XML, DTD stands for Document Type Definition

3. In Invertibility attack, attacker attempts to establish a plausible (Watermark , key) pair that
matches the data set and then claims rights based on this found watermark.

4. XPath language is an expression language where the basic building block is the
path expression, in identification of elements and attributes of XML

5. XML is a sophisticated subset of SGML designed to describe data using arbitrary tags

6. In Relation data, the data rows in the tables acre called Tuples

7. Watermarking is used to prove ownership of digital data True

8. Steganography works as carrier for hidden information treating them as transporters

9. “Effective detecting and preventing insider Misuse” is an Objective for Social Re-Engineering

10. The authorization specified on an element attributes can be defined as applicable


Element attributes only are called Local Authorization

11.The Goal of Trustworthy Record Retention is to provide long term retention and eventual disposal
of organization records such that no user can delete, hide or tamper with any record during its
retention period nor recreate a record’s content once it has been deleted.

12. Hippocratic Databases are a class of database systems that accept responsibility for privacy and
security of information they manage without impeding legitimate use and disclosure.

13. A Complex type element in XML schema that have at least one attribute or least one sub (child)
element or both.

14. Blind Water Marking is the method that does not require the availability of the un-watermarked
data at detection time.

15. XML is used to store and transport the data (True/False) True

16. In Data ware Housing MOLAP stands for Multi Dimensional Online Analytical Processing

17. A GHT is an Index tree that supports exact-match lookup of records based on attribute values. For
example to find all mail sent from a particular address

18. Generalization function can hide the attribute value completely by replacing it with the wild card
this called Suppression attribute.

1
19. The attacks used on combining the anonymized data with external public database are called
Linking attacks .

20. An Intrusion activity is considered an activity that violates the security policy of a system.

21. In location service of mobile Application architecture, MOST stands for Moving Object Spatio-
Temporal.

22. Obfuscation-based technique are aimed at protecting location privacy by degrading the accuracy of
the location information still maintaining an explicit association with the real user identity.

23. in secrecy-Based mandatory policy No-Read principle says “A subject ‘s’ can read an object ‘o’ if and
only if the access class of the subject dominates the access class of the object”.

24. in OLAP, the dimensional tables may contain redundancy, which can be removed by splitting each
dimension table into multiple one per attribute in the dimension table. The result is called SnowFlake
Schema.

25. Access Control List is one of the mechanism of access matrix model in which access matrix is
stored by column.

26. Guaranteed Retention organizations must store records in a manner that prevents deletions of the
records or tampering with their contents even by insider/ for a regulation mandated lifespan.

27. The process of evaluating a query involves finding a chain of credentials that delegates authority from
resource owner to the requested. This process is also called credential chain recovery.

28. in Anomaly Detection information about repetitive and usual behavior is collected and suitably
represented as statistical models of normal behavior i.e in the form of profiles.

29. The Trust Management(TM) approach, aims to provide a basis for authorization in highly
decentralized environments by enabling resource owners to delegate authority to other entities who will
help them identify the appropriate requesters to authorize.

30. The Security Re-configuration mechanism is to constrain the behavior of database users and roles
such that they have exactly those privileges necessary and sufficient to perform, their task.

31. Discretionary Access Control is based on the identity of the user requesting access and on a set of rules,
called authorizations, explicitly stating which user can perform which action on which resource.

32. SDSI stands for Simple Distributed Security Infrastructure,”.

33. unsolicited advertising, meaning that the location of the user could be exploited, without her consent, to
provide advertisements of products and services available nearby the user position.

34. In attribute declaration of XML, attribute which are marked as #REQUIRED means attribute must
have an explicit value.

2
35. Mandatory Access Control enforces access control on the basis of regulations mandated by a central
authority.

36. One of the negotiation strategy is , PRUNES stands for Prudent Negotiation Strategy.

37. Auditing is the process of monitoring and recording selected database event and activities.

38. The objective of user-centric is to determine how users typically behave in terms of operations on
the database and how their current behavior.

39. Profiling of users is mainly used in fraud detection and intrusion detection(True/False) True.

40. Hippocratic databases(HDB) active enforcement is executed in three stages, policy creation, preference
negotiation, application data retrieval(True/False) True.

You might also like