0% found this document useful (0 votes)
6 views

Bài 3- Data Security and Data Protection

The document details a quiz on Data Security and Data Protection, completed on March 4, 2025, with a perfect score of 10 out of 10. It includes questions on encryption techniques, access control rules, and the features of Discretionary and Mandatory Access Control. Key concepts covered include data protection methods, the implications of access control policies, and potential vulnerabilities in data access.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Bài 3- Data Security and Data Protection

The document details a quiz on Data Security and Data Protection, completed on March 4, 2025, with a perfect score of 10 out of 10. It includes questions on encryption techniques, access control rules, and the features of Discretionary and Mandatory Access Control. Key concepts covered include data protection methods, the implications of access control policies, and potential vulnerabilities in data access.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

3/23/25, 9:50 AM Bài 3- Data Security and Data Protection: Xem lại lần làm thử | UEL E-Learning

Trạng thái Đã xong


Bắt đầu vào lúc Thứ Ba, 4 tháng 3 2025, 11:50 AM
Kết thúc lúc Thứ Ba, 4 tháng 3 2025, 12:04 PM
Thời gian thực 13 phút 53 giây
hiện
Điểm 10,00 trên 10,00 (100%)

Câu hỏi 1

Đúng

Đạt điểm 1,00 trên 1,00

Which technique is used to protect data so that it can only be understood by authorized users?

Select one:

a. Data mining
b. Data backup
c. Data masking
d. Encryption/Decryption techniques (Public key) 

Câu trả lời của bạn đúng


The correct answer is: Encryption/Decryption techniques (Public key)

Câu hỏi 2

Đúng

Đạt điểm 1,00 trên 1,00

What does the "No write down" rule in MAC ensure?

Select one:

a. Subjects can write data at any level


b. Subjects can write data only at the same or lower levels
c. Subjects can write data only at the same or higher levels 
d. Subjects can write data only at higher levels

Câu trả lời của bạn đúng


The correct answer is: Subjects can write data only at the same or higher levels

https://lms.uel.edu.vn/mod/quiz/review.php?attempt=899777&cmid=95028 1/5
3/23/25, 9:50 AM Bài 3- Data Security and Data Protection: Xem lại lần làm thử | UEL E-Learning

Câu hỏi 3

Đúng

Đạt điểm 1,00 trên 1,00

Which of the following statements about Discretionary Access Control (DAC) is correct?

Select one:

a. DAC does not involve authorization rules


b. DAC defines access rights based on the users and the type of access 
c. DAC is more secure than Mandatory Access Control (MAC)
d. DAC is rarely used by Database Management Systems (DBMS)

Câu trả lời của bạn đúng

The correct answer is: DAC defines access rights based on the users and the type of access

Câu hỏi 4

Đúng

Đạt điểm 1,00 trên 1,00

What is a key feature of Mandatory Access Control (MAC)?

Select one:

a. It provides no security levels for data access


b. It is less secure than Discretionary Access Control (DAC)
c. It relies solely on user discretion to grant access
d. It increases security by restricting access to classified data to cleared users 

Câu trả lời của bạn đúng


The correct answer is: It increases security by restricting access to classified data to cleared users

https://lms.uel.edu.vn/mod/quiz/review.php?attempt=899777&cmid=95028 2/5
3/23/25, 9:50 AM Bài 3- Data Security and Data Protection: Xem lại lần làm thử | UEL E-Learning

Câu hỏi 5

Đúng

Đạt điểm 1,00 trên 1,00

What is the primary function of authorization in DAC?

Select one:

a. To revoke access to all operations


b. To check whether a subject may perform an operation on an object 
c. To grant all users full access to all objects
d. To define the type of access an unauthorized user has on an object

Câu trả lời của bạn đúng

The correct answer is: To check whether a subject may perform an operation on an object

Câu hỏi 6

Đúng

Đạt điểm 1,00 trên 1,00

Which of the following statements about centralized DAC is correct?

Select one:

a. Only users can grant or revoke access


b. One single user class (admin) may grant or revoke access 
c. Decentralized users have full control over grants
d. Only groups of users can grant or revoke access

Câu trả lời của bạn đúng

The correct answer is: One single user class (admin) may grant or revoke access

https://lms.uel.edu.vn/mod/quiz/review.php?attempt=899777&cmid=95028 3/5
3/23/25, 9:50 AM Bài 3- Data Security and Data Protection: Xem lại lần làm thử | UEL E-Learning

Câu hỏi 7

Đúng

Đạt điểm 1,00 trên 1,00

What is a key feature of decentralized DAC with the operation type GRANT?

Select one:

a. It provides no security levels for data access


b. It is more flexible but requires a recursive revoking process 
c. It does not involve the hierarchy of grants
d. It is less flexible but more secure

Câu trả lời của bạn đúng


The correct answer is: It is more flexible but requires a recursive revoking process

Câu hỏi 8

Đúng

Đạt điểm 1,00 trên 1,00

What is a potential problem with Discretionary Access Control (DAC)?

Select one:

a. It allows unauthorized data access through authorized users 


b. It is too strict and limits authorized users' access
c. It is not flexible enough for user-specific needs
d. It completely prevents unauthorized access

Câu trả lời của bạn đúng


The correct answer is: It allows unauthorized data access through authorized users

https://lms.uel.edu.vn/mod/quiz/review.php?attempt=899777&cmid=95028 4/5
3/23/25, 9:50 AM Bài 3- Data Security and Data Protection: Xem lại lần làm thử | UEL E-Learning

Câu hỏi 9

Đúng

Đạt điểm 1,00 trên 1,00

In the example provided, how does User B access unauthorized data?

Select one:

a. By obtaining User A's access credentials


b. By gaining physical access to the database server
c. By modifying an application program used by User A to write R data in S 
d. By directly hacking into User A's account

Câu trả lời của bạn đúng

The correct answer is: By modifying an application program used by User A to write R data in S

Câu hỏi 10

Đúng

Đạt điểm 1,00 trên 1,00

Which of the following is the highest security level in MAC?

Select one:

a. Top Secret 
b. Unclassified
c. Secret
d. Confidential

Câu trả lời của bạn đúng


The correct answer is: Top Secret

https://lms.uel.edu.vn/mod/quiz/review.php?attempt=899777&cmid=95028 5/5

You might also like