CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT
ANDHRA PRADESH
END SEMESTER – 2023
SUBJECT NAME:
SUBJECT CODE:
SEMESTER:
Question WRT TWO MARK QUESTIONS WITH SPECIFIC 10 10
COs
No
1 (CO1) What is the purpose of implementing 2
database system backup?
2 (CO2) Why is it important to create roles and 2
functions for database users in terms ofsecurity?
3 (CO1) Explain how the concepts of construction 2
of clusters relate to database system backup
implementation.
4 (CO3) How can developing new techniques in 2
cluster deployment benefit from knowledge of
database system backup?
5 (CO2) Discuss the importance of addressing 2
different security issues in database clusters.
6 (CO1) Why should database system backup be a 2
part of cluster construction concepts?
1
7 (CO3) How does understanding database system 2
security enhance cluster deployment skills?
8 (CO2) Explain the significance of solving 2
problems related to database cluster securities.
9 (CO1) Define the term "Database System 2
Backup."
10 (CO3) How can the knowledge of database 2
system backup contribute to real-world cluster
deployment?
Question WRT FIVE MARK QUESTIONS WITH SPECIFIC 10 10
COs
No
1 (CO1) Describe two methods for implementing 5
database system backup.
2 (CO2) Discuss two common security vulnerabilities in 5
database clusters and propose solutions for each.
2
3 (CO1) How does understanding database system 5
backup concepts support the construction of resilient
clusters?
4 (CO3) Describe two best practices for integrating 5
database system backup into cluster deployment
processes.
5 (CO2) Explain the role of encryption in database 5
cluster security and its impact on backup procedures.
6 (CO1) Discuss two factors to consider when selecting 5
backup storage solutions for database clusters.
7 (CO2) Compare and contrast role-based and rule 5
based access control in database cluster security.
8 (CO1) How do database system backup strategies 5
contribute to the overall reliability of clusters?
9 (CO3) Explain two techniques for enhancing database 5
system security in real-world cluster deployments.
10 (CO3) Describe two challenges in cluster deployment 5
related to database system backup and security.
3
Question WRT 12 MARK QUESTIONS WITH SPECIFIC COs 10 10
No
1 (CO1) Explain two techniques for restoring database backups in a 12
clustered environment.
2 (CO3) Discuss two ways in which database system backup 12
procedures can be optimized for efficient cluster deployment.
3 (CO1) How can understanding database system backup principles 12
enhance the scalability of clusters?
4 (CO3) Propose two innovative approaches to integrating database 12
system backup into cluster deployment automation.
5 (CO2) Explain the concept of least privilege and its importance in 12
database cluster security.
6 (CO1) Describe two types of database system backup methods and 12
their advantages in cluster construction.
7 (CO2) Evaluate the effectiveness of database auditing in enhancing 12
security for clustered environments.
4
8 (CO1) How does the implementation of database system backup 12
contribute to disaster recovery planning in cluster deployment?
9 (CO3) Describe two strategies for implementing role-based access 12
control in database clusters.
10 (CO2) Analyze two common threats to database cluster security and 12
propose preventive measures for each.