0% found this document useful (0 votes)
32 views25 pages

CB3401 DBMSS

This document is a question bank for the course CB3401 - Database Management Systems and Security, prepared for the Department of CSE (Cyber Security). It outlines the course objectives, educational objectives, program outcomes, course outcomes, and includes a structured question format for various units of study. Additionally, it provides details on the course structure, including topics covered, textbooks, and references.

Uploaded by

sahasafi26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views25 pages

CB3401 DBMSS

This document is a question bank for the course CB3401 - Database Management Systems and Security, prepared for the Department of CSE (Cyber Security). It outlines the course objectives, educational objectives, program outcomes, course outcomes, and includes a structured question format for various units of study. Additionally, it provides details on the course structure, including topics covered, textbooks, and references.

Uploaded by

sahasafi26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

DEPARTMENT OF CSE (CYBER SECURITY)

CB3401 – DATABASE MANAGEMENT SYSTEMS AND SECURITY

QUESTION BANK

R-2021
Prepared by
Mrs. T. Sathiya Priya Page 1
DEPARTMENT OF CSE (CYBER SECURITY)

II YEAR / IV SEMESTER
REGULATION - 2021

CB3401 – DATABASE MANAGEMENT SYSTEMS AND SECURITY

Faculty In Charge Head of the Department


T. Sathiya Priya, B.E., M.E., Dr. M. P. Revathi, M.E., Ph.D.,
Assistant Professor Professor
Department of CSE (Cyber Security) Department of CSE (Cyber Security)

Prepared by
Mrs. T. Sathiya Priya Page 2
INSTITUTE VISION & MISSION

VISION:
To become a globally recognized “Centre of Academic Excellence” providing Quality
Education to all students.

MISSION:
To provide Quality Education in the fields of Engineering, Management, Information,
Technology and other Engineering areas.

DEPARTMENT VISION & MISSION

VISION:
To develop eminent engineers, researchers and entrepreneurs in the areas of Computer Science
& Engineering and Cyber Security with exceptional technical expertise, skills and ethical values,
capable of providing innovative solutions to national and global needs.

MISSION:
M1 : To create a study environment where all academicians, entrepreneurs, researchers are
brought together.
M2 : To create perpetual learning environment for students and faculty members establish
research centre and conduct researches in emerging areas.
M3 : To create a platform for socially relevant technical and domain researches through funded
projects.

Prepared by
Mrs. T. Sathiya Priya Page 3
PROGRAM EDUCATIONAL OBJECTIVES (PEOs)

Apply their technical competence in computer science to solve real world problems,
PEO1
with technical and people leadership.

PEO2 Conduct cutting edge research and develop solutions on problems of social relevance.

Work in a business environment, exhibiting team skills, work ethics, adaptability


PEO3
and lifelong learning.

PROGRAM OUTCOMES (POs)

Engineering knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals and an engineering specialization to the solution of complex engineering
PO1
problems.
Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions Using first principles of
PO2
mathematics, natural sciences, and engineering sciences.
Design/development of solutions: Design solutions for complex engineering problems and
design system components or processes that meet the specified needs with appropriate
PO3
consideration for public health and safety, and the cultural, societal, and environmental
considerations.
Conduct investigations of complex problems: Use research-based knowledge and research
PO4 methods including the design of experiments, Analysis and interpretation of data, and
synthesis of the information to provide valid conclusions.
Modern tool usage: Create, select and apply appropriate techniques, resources, and
PO5 modern engineering and IT tools including prediction and modeling to complex
Engineering activities with an understanding of the limitations.
The engineer and society: Apply to reason in formed by the contextual Knowledge
PO6 to assess societal, health, safety, legal and cultural issues and the Consequent responsibilities
relevant to the professional engineering practice.
Environment and sustainability: Understand the impact of the professional engineering
PO7 solutions in societal and environmental contexts and demonstrate the knowledge of, and need
for sustainable development.

Ethics: Apply ethical principles and commit to professional ethics and Responsibilities and
PO8
norms of the engineering practice.

Prepared by
Mrs. T. Sathiya Priya Page 4
Individual and team work: Function effectively as an individual, and as a member or leader
PO9
in Diverse teams, and in multidisciplinary settings.

Communication: Communicate effectively on complex engineering activities with the


engineering community and with society at large, such as, being able to comprehend and
PO10
write effective reports and design documentation, make effective presentations, and give and
receive clear instructions.

Project management and finance: Demonstrate knowledge and understanding of the


PO11 engineering and management principles and apply These to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.

Life-long learning: Recognize the need for, and have the preparation and ability to Engage
PO12 in independent and life-long learning in the broadest context of technological change.

PROGRAM SPECIFIC OUTCOMES (PSOs):

PSO1 Exhibit design and programming skills to build and automate business solutions using
cutting edge technologies.

PSO2 Strong theoretical foundation leading to excellence and excitement towards research,
to provide elegant solutions to complex problems.

Prepared by
Mrs. T. Sathiya Priya Page 5
CB3401 DATABASE MANAGEMENT SYSTEMS AND SECURITY
L T P C
3 0 0 3
COURSE OBJECTIVES:
To learn the fundamentals of data models, conceptualize and depict a database system
using ER diagram. To study the principles to be followed to create an effective relational
database and write SQL queries to store/retrieve data to/from database systems. To know the
fundamental concepts of transaction processing, concurrency control techniques and recovery
procedure. To understand the need of security in Database Management system. To learn how
to secure database Management systems.

UNIT I RELATIONAL DATABASES 9


Data Models – Relational Data Models – Relational Algebra – Structured Query
Language – Entity-Relationship Model – Mapping ER Models to Relations –
Distributed Databases – Data Fragmentation – Replication

UNIT II DATABASE DESIGN 9


ER Diagrams – Functional Dependencies – Non-Loss Decomposition Functional
Dependencies – First Normal Form – Second Normal Form – Third Normal Form –
Dependency Preservation – Boyce/Codd Normal Form – Multi-Valued
Dependencies and Fourth Normal Form – Join Dependencies and Fifth Normal
Form

UNIT III TRANSACTION MANAGEMENT 9


Transaction Concepts – ACID Properties – Serializability – Transaction Isolation
Levels – Concurrency Control – Need for Concurrency – Lock-Based Protocols –
Deadlock Handling – Recovery System – Failure Classification – Recovery
Algorithm.

UNIT IV DATABASE SECURITY 9


Need for database security – SQL Injection Attacks – The Injection Technique –
SQLi Attack Avenues and Types

UNIT V ACCESS CONTROL AND ENCRYPTION 9


Database Access Control – SQL based access definition – Cascading Authorizations
– Role- based access control – Inference – Database encryption

TOTAL: 45 PERIODS

Prepared by
Mrs. T. Sathiya Priya Page 6
COURSE OUTCOMES

At the end of this course, the students will be able to:


Model an application’s data requirements using conceptual modeling
CO1
and design database schemas based on the conceptual model.
Formulate solutions to a broad range of query problems using relational
CO2
algebra/SQL.
Demonstrate an understanding of normalization theory and apply such
CO3
knowledge to the normalization of a database.
Run transactions and estimate the procedures for
CO4
controlling the consequences of concurrent data access.

CO5 Understand and handle security issues in database management systems.

CO’s – PO’s & PSO’s MAPPING

PO’s PSO’s
CO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 1 2 2 1 1 - 1 - 2 - 2 2 3 2
2 1 2 2 1 1 - 1 - 2 - 3 2 3 3
3 2 1 2 1 2 - 2 - 1 - 3 3 3 3
4 2 2 3 2 1 - 2 - 2 - 3 2 3 3
5 2 2 3 2 2 - 1 - 2 2 3 3 3 3
AVg. 2 2 2 1 1 - 1 - 2 2 3 2 3 3

1 - Low, 2 - Medium, 3 - High, ‘-' - No correlation

Prepared by
Mrs. T. Sathiya Priya Page 7
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System
Concepts”, Seventh Edition, Tata McGraw Hill, 2021.
2. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database
Systems”, Seventh Edition, Pearson Education, 2016.
3. William Stallings, Lawrie Brown, “Computer Security: Principles and
Practice”, Fourth Edition, Pearson, 2019.

REFERENCES:
1. C.J. Date, A. Kannan and S. Swamynathan, “An Introduction to Database
Systems”, Pearson Education, Eighth Edition, 2006.
2. Raghu Ramakrishnan and Johannes Gehrke, “Database Management
Systems”, Third Edition, McGraw Hill, 2014.
3. Narain Gehani and Melliyal Annamalai, “The Database Book: Principles and
Practice Using the Oracle Database System”, Universities Press, 2012.

Prepared by
Mrs. T. Sathiya Priya Page 8
UNIT I
RELATIONAL DATABASES

PART–A

CO
Q. No Questions BT Level Complexity
Mapping

1 What is a Data Model? CO1 Understand Low

Differentiate Primary Key and Foreign Key. CO1 Understand Medium


2
3 What is the purpose of DBMS? CO1 Understand Low

What are the disadvantages of File Processing


4 CO1 Understand Low
System?

5 Define Relational DBMS. CO1 Remember Low

6 What is the role of Database Administrator? CO1 Understand Low

7 What is Relational Algebra? CO1 Understand Low

8 What do you mean by instance & schema? CO1 Understand Low

9 Define Candidate Key. CO1 Remember Low

10 List the various levels of abstraction. CO1 Remember Low

11 What is SQL? CO2 Understand Low

Compare DELETE and TRUNCATE


12 CO2 Evaluate Medium
commands in SQL.

13 What is Distributed database? CO1 Understand Low

14 What is Data Fragmentation? CO1 Understand Low

15 Name the three types of data fragmentation. CO1 Remember Low

16 What is Data Replication? CO1 Understand Low

17 Mention the types of Data Replication. CO1 Remember Low

Prepared by
Mrs. T. Sathiya Priya Page 9
What is the role of replication in fault
18 CO1 Understand Low
tolerance?

Convert the given ER model into relational


19 CO1 Create Medium
tables.

Write an SQL query to retrieve names of


20 CO2 Create Medium
employees earning more than $50,000.

PART–B
CO
Q. No Questions BT Level Complexity
Mapping

1 Explain DBMS Architecture with an example.


CO1 Understand Medium

2 Discuss all the Data Models with examples. CO1 Understand Medium

Describe the fundamental operations in


3
relational algebra with examples. CO2 Understand Medium

Explain selection (σ), projection (π), and


4 Cartesian product (×) operations in relational CO2 Understand Medium
algebra with examples.

Discuss the different types of JOIN operations


5 (Inner Join, Outer Join, Natural Join, Cross CO2 Understand Medium
Join) with examples.

Explain the SELECT statement in SQL with


6 various clauses (WHERE, GROUP BY, CO2 Understand Medium
HAVING, ORDER BY).

What is SQL? Explain its different categories of


7 commands (DDL, DML, DCL, and TCL) with CO2 Understand Medium
examples.

8 Explain the architecture of a distributed


CO1 Understand Medium
database system with a neat diagram.

Prepared by
Mrs. T. Sathiya Priya Page 10
What is data fragmentation? Explain its types
9 with suitable examples. CO1 Understand Medium

Create the following tables: Employee


(Emp_no, Name, Emp_city) Company
(Emp_no, Company_name, Salary)
i. Write a SQL query to display Employee name
and company name.
10 ii. Write a SQL query to display employee CO2 Create High
name, employee city, company name and salary
of all the employees whose salary >10000
iii. Write a query to display all the employees
working in ‘XYZ’ company.

Create the table of the following relations


EMPLOYEE (ENO, NAME, DATE-BORN,
GENDER,DATE-JOINED, DESIGNATION,
BASIC-PAY, DEPARTMENT-NUMBER)
DEPARTMENT (DEPARTMENTNUMBER,
NAME)
Write SQL queries to perform the following:
a) List the details of employees belonging to
11
department number ‘CSE’. CO2 Create High
b) List the employee number, employee name,
department number and department name of all
employees.
c) List the department number and number of
employees in each department.
d) List the details of employees who earn less
than the average basic pay of all employees.

Design a relational schema for an online


12 CO1 Create High
shopping system.

Prepared by
Mrs. T. Sathiya Priya Page 11
Create the following table with the relations:
EMPLOYEE
GEN DCO
ENO NAME DOB
DER DE
HAME 24-MAR-
12345 M 201
N 2001
12-MAR-
12346 VINI F 202
2001
II-JAN-
1234'7 ANI F
1999
14-FEB-
12348 PETER M
2001
DEPARTMENT
13 DCODE DNAME CO1 Create High
COMPUTER
201
SC
202 INFN SC
203 CIVIL
204 MECHANICAL

The primary key of each relation is underlined.


Outline Cartesian product, equi join, left outer
join, right outer join and full outer join
operations in relational algebra. Illustrate the
above relational algebra operations with the
EMPLOYEE and DEPARTMENT relations.

Prepared by
Mrs. T. Sathiya Priya Page 12
UNIT II
DATABASE DESIGN

PART–A

CO
Q. No Questions BT Level Complexity
Mapping

1 Define ER diagram. CO1 Remember Low

2 What is cardinality? CO1 Understand Low

3 Define functional dependency. CO3 Remember Low

4 What is a trivial functional dependency? CO3 Understand Low

5 What is non-loss decomposition? CO3 Understand Low

6 Define 1NF. CO3 Remember Low

7 What is 2NF? CO3 Understand Low

8 Define 3NF. CO3 Remember Low

9 What is dependency preservation? CO3 Understand Low

10 Define BCNF. CO3 Remember Low

11 Define multi-valued dependency. CO3 Remember Low

12 What is a join dependency? CO3 Understand Low

13 What is a partial dependency? CO3 Understand Low

14 Define transitive dependency. CO3 Remember Low

15 Why is normalization needed? CO3 Understand Low

16 What is denormalization? CO3 Understand Low

17 What are repeating groups? CO3 Understand Low

Prepared by
Mrs. T. Sathiya Priya Page 13
18 What is a candidate key? CO3 Understand Low

19 What is a surrogate key? CO3 Understand Low

20 What are Armstrong’s Axioms? CO3 Understand Low

21 Why is BCNF called a stricter version of 3NF CO3 Understand Low

PART–B
CO
Q. No Questions BT Level Complexity
Mapping
1 Explain ER modeling with an example. CO1 Understand Medium

Design an ER diagram for a university


2 CO1 Create High
database.
A Company is organized into departments.
Each department has employees working in it.
The attributes of department include department
number and department name. The attributes of
employee include employee number, employee
name, date of birth, gender, date of joining,
designation and basic pay. Each department has
a manager managing it. There are also
supervisors in each department who supervise a
set of employees. Each department controls a
number of projects. The attributes of project
3 include project code and project name. A CO1 Create High
project is controlled only by one department. An
employee can work in any number of distinct
projects on a day. The date an employee
worked, in time and out time has to be kept
track. 'The company also keeps track of the
dependents of each employee. The attributes of
dependent include dependent name, date of
birth, gender and relationship with the
employee.
Model an Entity Relationship diagram for the
above scenario
Explain functional dependencies with
4 CO3 Understand Medium
examples.

Prepared by
Mrs. T. Sathiya Priya Page 14
How do functional dependencies impact
5 CO3 Understand High
normalization?

6 Explain the process of non-loss decomposition. CO3 Understand Medium

What are the characteristics of a table that is not


7 CO3 Understand Medium
in 1NF? How can it be converted to 1NF?

Distinguish between 1NF and 2NF with an


8 CO3 Analyze High
example.

9 Explain the steps to convert a relation into 3NF. CO3 Understand Medium

Explain dependency preservation in


10 CO3 Understand Medium
normalization.

How does BCNF differ from 3NF? Explain


11 CO3 Understand High
with example.
Create the car dealership table for the attributes.
Dealership (uniqueid, Customername,
Purchase, Address, Newsfeed, Supplier, Price)
12 CO3 Create High
Normalize the table so that all resulting tables
are in 3NF stating the definitions of various
normal forms.

13 Explain 4NF and how it eliminates redundancy. CO3 Understand Medium

14 Explain 5NF with an example. CO3 Understand Medium

Explain how functional dependencies affect


15 CO3 Understand Medium
database anomalies.

Explain the impact of transitive dependencies


16 CO3 Understand Medium
on database design.

Compare the advantages and disadvantages of


17 CO3 Evaluate High
normalization.

When should denormalization be used? Explain


18 CO3 Understand High
with an example.

Prepared by
Mrs. T. Sathiya Priya Page 15
UNIT – III
TRANSACTION MANAGEMENT

PART–A

CO
Q.No Questions BT Level Complexity
Mapping

What is a database transaction? CO4 Understand Low


1
What does ACID stand for in transaction
2 CO4 Understand Low
management?

3 What is Serializability? CO4 Understand Low

What is the difference between conflict and view


4 CO4 Understand Medium
serializability?

5 Name the different isolation levels in SQL. CO4 Remember Low

6 Why is durability important in transactions? CO4 Understand Low

7 Why is concurrency control needed? CO4 Understand Low


What problems occur due to concurrent
8 CO4 Understand Low
transactions?

9 What is a shared lock? CO4 Understand Low

10 What is deadlock in database transactions? CO4 Understand Low

11 What is transaction rollback? CO4 Understand Low

12 What are different types of database failures? CO4 Understand Low

13 What is a log-based recovery mechanism? CO4 Understand Low

14 What is a wait-for graph in deadlock detection? CO4 Understand Low

15 What is a shadow paging technique? CO4 Understand Low

What are the disadvantages of too strict


16 CO4 Understand Low
concurrency control?

Prepared by
Mrs. T. Sathiya Priya Page 16
What is the difference between shared and
17 CO4 Understand Medium
exclusive locks?

What is the difference between read committed


18 CO4 Understand Medium
and repeatable read?

19 What is a redo log in transaction recovery? CO4 Understand Low

20 What is a dirty read in concurrent transactions? CO4 Understand Low

PART–B

1 Explain the different states of a transaction with a


CO4 Understand Medium
diagram.

2 Explain ACID properties with examples. CO4 Understand Medium

Explain conflict and view Serializability with


3 CO4 Understand Medium
examples.

Explain the different transaction isolation levels


4 CO4 Understand Medium
with examples.

Compare optimistic and pessimistic concurrency


5 CO4 Evaluate High
control.

Explain lost updates, dirty reads, and inconsistent


6 CO4 Understand Medium
retrievals with examples.

Explain two-phase locking (2PL) protocol with


7 CO4 Understand Medium
an example.

Compare deadlock prevention, detection, and


8 CO4 Evaluate High
recovery techniques.

Explain the steps involved in transaction


9 CO4 Understand High
recovery.
What recovery mechanisms are used to handle
10 CO4 Understand Medium
system crashes and transaction failures?
Explain deferred and immediate database
11 CO4 Understand Medium
modifications with examples.

Explain phantom reads and how Serializable


12 CO4 Understand Medium
Isolation Level prevents them.

Prepared by
Mrs. T. Sathiya Priya Page 17
Explain strict two-phase locking (Strict 2PL) with
13 CO4 Understand Medium
an example.

Explain write-ahead logging (WAL) and its role


14 CO4 Understand Medium
in recovery.
How do concurrency control mechanisms prevent
15 data anomalies such as lost updates and CO4 Understand Medium
inconsistencies?
Explain check pointing and its importance in
16 CO4 Understand Medium
database recovery.
Compare log-based recovery and shadow paging
17 CO4 Evaluate High
in database recovery.

How does timestamp-based concurrency control


18 CO4 Understand Medium
work?

Prepared by
Mrs. T. Sathiya Priya Page 18
UNIT IV

DATABASE SECURITY

PART–A

CO
Q. No Questions BT Level Complexity
Mapping

1 Why is database security important? CO5 Understand Low

2 List the key components of database security? CO5 Remember Low

3 What is an SQL Injection (SQLi) attack? CO5 Understand Low

4 What is the basic technique behind SQL Injection? CO5 Understand Low

5 What are common entry points for SQLi attacks? CO5 Understand Low

6 Name different types of SQL Injection attacks. CO5 Remember Low

What is parameterized query and how does it


7 CO5 Understand Low
prevent SQLi?

What is least privilege principle in database


8 CO5 Understand Low
security?

9 What is role-based access control (RBAC)? CO5 Understand Low

10 Define database hardening? CO5 Remember Low

11 What is data masking in database security? CO5 Understand Low

12 What is a time-based blind SQLi attack? CO5 Understand Low

13 What is a second-order SQL Injection? CO5 Understand Low

14 How do login forms become vulnerable to SQLi? CO5 Understand Low

15 What is an out-of-band SQL Injection? CO5 Understand Low


Difference between escaping input and
16 CO5 Understand Medium
parameterized queries?

Prepared by
Mrs. T. Sathiya Priya Page 19
Difference between encryption at rest and
17 CO5 Understand Low
encryption in transit?

18 What is discretionary access control (DAC)? CO5 Understand Low

19 What is database auditing? CO5 Understand Low

PART–B

CO
Q. No Questions BT Level Complexity
Mapping

Explain common security threats in database


1 CO5 Understand Medium
systems.

2 Compare different database security mechanisms. CO5 Evaluate High

Explain SQL Injection attacks with real-world


3 CO5 Understand Medium
examples.

How does input validation prevent SQL Injection?


4 CO5 Understand Medium
Explain.

Explain client-side vs server-side SQL Injection


5 CO5 Understand Medium
attacks.

Explain Blind SQLi, Error-based SQLi, and Union-


6 CO5 Understand Medium
based SQLi with examples.

Compare Parameterized Queries, Stored Procedures,


7 and Web Application Firewalls (WAF) in SQLi CO5 Evaluate High
prevention.

Discuss encryption techniques used for securing


8 CO5 Understand Medium
databases.

Explain different database access control models


9 CO5 Understand Medium
with examples.

Explain different types of database threats and


10 CO5 Understand Medium
countermeasures.

How does data encryption enhance database security


11 CO5 Understand High
and protect sensitive information?

What are the risks of SQL Injection in privilege


12 CO5 Understand Medium
escalation, and how can they be mitigated?

Prepared by
Mrs. T. Sathiya Priya Page 20
How does improper error handling lead to SQL
13 CO5 Understand High
Injection?

How can automated tools be used to perform SQL


14 CO5 Understand High
Injection attacks?

Compare Union-based SQLi and Boolean-based


15 CO5 Evaluate Medium
SQLi with examples.

Discuss the effectiveness of Web Application


16 CO5 Understand Medium
Firewalls (WAF) in SQLi prevention.

Explain how Multi-Factor Authentication (MFA)


17 CO5 Understand Medium
enhances database security.

Compare MAC (Mandatory Access Control) vs.


18 RBAC (Role-Based Access Control) in database CO5 Evaluate High
security.

How does logging and monitoring help in database


19 CO5 Understand High
security?

Prepared by
Mrs. T. Sathiya Priya Page 21
UNIT – V
ACCESS CONTROL AND ENCRYPTION
PART–A

CO
Q. No Questions BT Level Complexity
Mapping

1 What is database access control? CO5 Understand Low

Name the different types of database access


2 CO5 Remember Low
controls?

3 How is access control implemented in SQL? CO5 Understand Low

4 What is cascading authorization in databases? CO5 Understand Low

5 What is Role-Based Access Control (RBAC)? CO5 Understand Low

6 List the advantages of RBAC? CO5 Remember Low

7 What is inference in database security? CO5 Understand Low


How does statistical inference lead to data
8 CO5 Understand Low
leakage?

9 What is database encryption? CO5 Understand Low

10 What is transparent data encryption (TDE)? CO5 Understand Low

11 What is fine-grained access control? CO5 Understand Low

12 How does access control improve security? CO5 Understand Low

What is the use of the WITH GRANT OPTION


13 CO5 Understand Low
in SQL?

What is the difference between GRANT and


14 CO5 Understand Low
REVOKE commands?

What happens when a user with cascading


15 CO5 Understand Low
privileges is deleted?

Prepared by
Mrs. T. Sathiya Priya Page 22
16 What is transitive authorization in databases? CO5 Understand Low

Difference between RBAC and ABAC


17 CO5 Understand Low
(Attribute-Based Access Control)?

18 What is least privilege principle (POLP)? CO5 Understand Low

How do aggregation and inference relate in


19 CO5 Understand Low
database security?

What is the differential privacy model in


20 CO5 Understand Low
security?

What is the difference between symmetric and


21 CO5 Understand Low
asymmetric encryption?

22 What is the role of hashing in database security? CO5 Understand Low

23 Define Transparent Data Encryption (TDE)? CO5 Remember Low

PART – B

CO
Q. No Questions BT Level Complexity
Mapping
Explain the importance of access control in
1 CO5 Understand Medium
database security.
Compare DAC (Discretionary Access Control)
2 CO5 Evaluate Medium
and MAC (Mandatory Access Control).

Explain the use of GRANT and REVOKE in


3 CO5 Understand Medium
SQL-based access control.

Explain how cascading privileges affect database


4 CO5 Understand High
security with an example.
Compare RBAC, DAC, and MAC access control
5 CO5 Evaluate High
models.

How does RBAC work in databases, and can you


6 CO5 Understand High
provide a practical example?

Explain inference attacks and techniques to


7 CO5 Understand Medium
prevent them.

Prepared by
Mrs. T. Sathiya Priya Page 23
Discuss different methods to control inference
8 CO5 Understand Medium
attacks in databases.
Explain different types of database encryption
9 CO5 Understand Medium
techniques.
Compare Encryption at Rest, Encryption in
10 CO5 Evaluate Medium
Transit and End-to-End Encryption.
Explain discretionary vs. mandatory access
11 CO5 Understand Medium
control with examples.

Discuss challenges in implementing access


12 CO5 Understand Medium
control in distributed databases.

Explain SQL-based access control policies with


13 CO5 Understand Medium
real-world examples.
How do SQL views enhance access control and
14 CO5 Understand High
improve database security?

How does cascading authorization influence role


15 CO5 Understand High
inheritance in access control systems?
Discuss the security risks of cascading privileges
16 CO5 Understand Medium
in database access control.
How is Role-Based Access Control (RBAC)
17 CO5 Understand High
implemented in cloud-based database systems?

Prepared by
Mrs. T. Sathiya Priya Page 24
THANK YOU

ALL THE BEST

Prepared by
Mrs. T. Sathiya Priya Page 25

You might also like