Which of the following refers to the system, processes, and procedures that protect a database from unintended activities…?

Which of the following refers to the system, processes, and procedures that protect a database from
unintended activities, such as
authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized individuals or
processes?

Which of the following refers to the system, processes, and procedures that protect a database from
unintended activities, such as
authenticated misuse, malicious attacks, or inadvertent mistakes made by authorized individuals or
processes?

A.
Database security

B.
Encryption

C.
Abstraction

D.
Referential integrity

Explanation:
Database security refers to the system, processes, and procedures that protect a database from
unintended activities, such as authenticated misuse, malicious attacks, or inadvertent mistakes
made by authorized individuals or processes. Database security can begin with the process of
creating and publishing appropriate security standards for the database environment. These
standards may include specific controls for the

various relevant database platforms.
Answer D is incorrect. Referential integrity is a feature or property that prevents users or
applications from entering inconsistent data
which, when satisfied, requires every value of one column of a table to exist as a value of another
column in a different or the same table.
Answer C is incorrect. Abstraction is a method of coding that enables a user to focus on the coding
rather than the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for
database access.
Answer B is incorrect. Encryption provides an additional security layer, protecting the data from
unauthorized viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher
encrypted data into a readable form.



Leave a Reply 0

Your email address will not be published. Required fields are marked *