Q1. Loss of availability occurs when:
A) A user or program cannot access objects who has legitimate right to those objects.
Q2)Which of the following control measures is handled by creating user accounts and passwords to control the login processes by the DBMS?
A) Access control
“An administrator
who is allowed to change student information can updates student grades without the instructor’s permission,”
What kind
of attack does the given example represent?
A) Privilege abuse
Q4) Which injection attack attempts to add additional SQL statements to the existing SQL statement by exploiting a computer bug. Which is caused by processing invalid data?
A) Code
injection
Q5) What type od risk will occur when an attacker floods the server with requests?
A) Denial of service
Comments
Post a Comment