1. The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.



Ask Your Doubts Here

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Show Similar Question And Answers
QA->Father is aged three times more than his son Anil. After 8 years, he would be two and a half times of Anil"s age. After further 8 years, how many times would he be of Anil"s age?....
QA->Father is aged three times more than his son Ram . After 8 years, he would be two and a half times of Ram"s age. After further 8 years, how many times would he be of Ram"s age?....
QA->From which community the President of India can nominate two members to Lok Sabha to ensure representation?....
QA->P can do a work in the same time in which Q and R together can do it. If P and Q work together, the work can be completed in 10 days. R alone needs 50 days to complete the same work. then Q alone can do it in....
QA->The degree of detail that should be incorporated into a database depends on what?....
MCQ->The goal of database security is to ensure that only authorized users can perform authorized activities at authorized times.....
MCQ->You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?....
MCQ->Which of the following security features can .NET applications avail? PIN Security Code Access Security Role Based Security Authentication Security Biorhythm Security....
MCQ->Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?....
MCQ->You are the administrator of a Windows 2000 Server computer. You configure the server to audit all access to files that are places in shared folders. One week after you configured the server, users report that the server has stopped responding. You investigate the problem and discover a stop error with the error message: Stop C0000244 (Audit Failed) An attempt to generate a security audit failed. You restart the computer. You need to ensure that you can keep a record of all files access on the server. You also need to ensure that the stop error will not occur again.....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions
Question ANSWER With Solution