Which of the following is used in database information …

Which of the following is used in database information security to hide information?

Which of the following is used in database information security to hide information?

A.
Inheritance

B.
Polyinstantiation

C.
Polymorphism

D.
Delegation

Explanation:
Polyinstantiation is a process of interactively producing more detailed versions of objects by populating
variables with different values or other variables. It is often used to prevent inference attacks by hiding
information.
Incorrect Answers:
A: Inheritance is not used to hide database information. Within object orientation programming inheritance is a
mechanism for code reuse and to allow independent extensions of the original software via public classes and
interfaces.
C: Polymorphism is when different objects are given the same input and react differently. Polymorphism is not a
way to hide database security information.
D: Delegation is a concept within object-oriented programming. Delegation does not concern information
security for database.

Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, New York, 2013, pp. 1136, 1186
http://en.wikipedia.org/wiki/Polyinstantiation
https://en.wikipedia.org/wiki/Polymorphism_(computer_science)



Leave a Reply 0

Your email address will not be published. Required fields are marked *