Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
125 views1 page

Database - Security Model - Question - Paper

The document is a question paper on database security, divided into three parts: short answer questions, short essay questions, and long answer questions. It covers various topics including database integrity, access control methods, recovery techniques, and security models. The paper aims to assess knowledge on database security problems and solutions.

Uploaded by

manjusreedhar3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views1 page

Database - Security Model - Question - Paper

The document is a question paper on database security, divided into three parts: short answer questions, short essay questions, and long answer questions. It covers various topics including database integrity, access control methods, recovery techniques, and security models. The paper aims to assess knowledge on database security problems and solutions.

Uploaded by

manjusreedhar3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Database Security - Question Paper (80 Marks)

Part A - Short Answer Questions (2 Marks Each)

1. Define database integrity.


2. What is discretionary access control?
3. Explain role-based access control.
4. What is statistical database security?
5. Define referential integrity in databases.
6. What is the purpose of recovery in databases?
7. What is shadow paging?
8. Explain the concept of rollback in database recovery.
9. Define Bell-LaPadula security model.
10. What is the Lattice Model used for?
11. Define memory protection in database security.
12. What is the purpose of object-oriented database security?

Part B - Short Essay Questions (5 Marks Each)

13. Explain domain constraints and their role in database security.


14. Describe the mandatory access control method in databases.
15. Explain encryption techniques used for database security.
16. Discuss log-based recovery techniques with examples.
17. Compare and contrast deferred and immediate updates in database recovery.
18. Describe the Biba model and its application in database security.
19. Explain the role of authentication mechanisms in secure DBMS design.
20. Discuss the importance of isolation security in databases.
21. Explain the SORION model for protecting object-oriented databases.

Part C - Long Answer Questions (15 Marks Each)

22. Discuss various database security problems and the methods used to secure databases.
23. Explain different database recovery techniques and their role in handling failures.
24. Compare Bell-LaPadula, Biba, and Dion security models.
25. Discuss security mechanisms such as user authentication, resource protection, and secure
DBMS design.

You might also like