Review Questions for
Chapter 1 Security Architecture
10. Which one of the following administrator function is enabled by a database management system?
11. Which one of the following is part of the information security triangle?
12. Which one of the following is not part of typical information security architecture?
13. Data risk results in which of the following?
14. Which of the following Is not a logical asset?
15. Outline the three components of the information security triangle and list one violation example for each. 16. Provide an example of how we can prevent access to an application database server. 17. Name three methods to enforce data integrity and provide an example for each method. 18. Provide three examples of people threats. 17. Explain how system vulnerabilities impact business. 18. Name three key measures that business may adopt to protect data. |