CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT
ANDHRA PRADESH
END SEMESTER – 2023
SUBJECT NAME:
SUBJECT CODE:
SEMESTER:
Question WRT TWO MARK QUESTIONS WITH SPECIFIC 10 10
COs
No
1 (CO1) Define the term "database cluster 2
security."
2 (CO2) Explain the importance of securing a 2
database system against security threats.
3 (CO2) State one common security threat faced by 2
database clusters.
4 (CO1) Explain the role of encryption in securing 2
data within a database cluster.
5 (CO2) Why is it important to regularly update 2
security measures in a database cluster?
6 (CO3) How can innovative techniques be applied 2
to enhance the security of database clusters?
1
7 (CO1) Define "security vulnerability" in the 2
context of database systems.
8 (CO3) How can knowledge of information 2
security principles benefit cluster deployment in
real world applications?
9 (CO1) What are the key components of a 2
database cluster?
10 CO3) Why is risk management essential in 2
securing a database system?
Question WRT FIVE MARK QUESTIONS WITH SPECIFIC 10 10
COs
No
1 (CO1) Describe two methods for constructing secure 5
database clusters.
2 (CO2) Discuss two challenges commonly encountered 5
in ensuring the security of database clusters.
2
3 (CO1) How can knowledge of security threats aid in 5
the construction of resilient database clusters?
4 (CO3) Discuss two strategies for managing security 5
risks in database cluster deployment.
5 (CO2) Describe two encryption algorithms commonly 5
used in database cluster security.
6 (CO3) Discuss two factors to consider when 5
developing security policies for database clusters.
7 (CO1) Explain two ways to mitigate security 5
vulnerabilities in database cluster construction.
8 (CO2) Compare and contrast two authentication 5
methods used in database cluster security.
9 (CO1) How does risk assessment contribute to the 5
construction of secure database clusters?
10 (CO3) Explain two techniques for integrating security 5
measures into database cluster deployment.
3
Question WRT 12 MARK QUESTIONS WITH SPECIFIC COs 10 10
No
1 (CO2) Explain two access control mechanisms used to secure 12
database clusters.
2 (CO1) How does threat modeling contribute to the identification of 12
security risks in database cluster construction?
3 (CO3) Explain two methods for securing data transmission within a 12
database cluster.
4 (CO2) Evaluate two intrusion detection systems suitable for 12
monitoring database cluster security.
5 (CO1) Discuss two regulatory compliance requirements relevant to 12
database cluster security.
6 (CO1) Analyze the role of database administrators in ensuring the 12
security of a database system, including their responsibilities in
implementing security controls and responding to security incidents.
7 (CO2) Analyze the impact of a security breach on a database cluster 12
and propose two recovery strategies.
8 (CO1) How can regular security audits help maintain the integrity of 12
database clusters?
4
9 (CO1) How can regular security audits help maintain the integrity of 12
database clusters?
10 (CO3) Discuss two methods for testing the effectiveness of security 12
measures in database cluster deployment.