0% found this document useful (0 votes)
11 views5 pages

Module 4

The document outlines a set of examination questions for the end semester of 2023 at Centurion University of Technology and Management, focusing on database cluster security. It includes two-mark, five-mark, and twelve-mark questions that cover various aspects of database security, including threats, encryption, access control mechanisms, and the role of database administrators. The questions are categorized by specific course outcomes (COs) to assess students' understanding of the subject matter.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views5 pages

Module 4

The document outlines a set of examination questions for the end semester of 2023 at Centurion University of Technology and Management, focusing on database cluster security. It includes two-mark, five-mark, and twelve-mark questions that cover various aspects of database security, including threats, encryption, access control mechanisms, and the role of database administrators. The questions are categorized by specific course outcomes (COs) to assess students' understanding of the subject matter.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT

ANDHRA PRADESH

END SEMESTER – 2023

SUBJECT NAME:

SUBJECT CODE:

SEMESTER:

Question WRT TWO MARK QUESTIONS WITH SPECIFIC 10 10


COs
No

1 (CO1) Define the term "database cluster 2


security."

2 (CO2) Explain the importance of securing a 2


database system against security threats.

3 (CO2) State one common security threat faced by 2


database clusters.

4 (CO1) Explain the role of encryption in securing 2


data within a database cluster.

5 (CO2) Why is it important to regularly update 2


security measures in a database cluster?

6 (CO3) How can innovative techniques be applied 2


to enhance the security of database clusters?

1
7 (CO1) Define "security vulnerability" in the 2
context of database systems.

8 (CO3) How can knowledge of information 2


security principles benefit cluster deployment in
real world applications?

9 (CO1) What are the key components of a 2


database cluster?

10 CO3) Why is risk management essential in 2


securing a database system?

Question WRT FIVE MARK QUESTIONS WITH SPECIFIC 10 10


COs
No

1 (CO1) Describe two methods for constructing secure 5


database clusters.

2 (CO2) Discuss two challenges commonly encountered 5


in ensuring the security of database clusters.

2
3 (CO1) How can knowledge of security threats aid in 5
the construction of resilient database clusters?

4 (CO3) Discuss two strategies for managing security 5


risks in database cluster deployment.

5 (CO2) Describe two encryption algorithms commonly 5


used in database cluster security.

6 (CO3) Discuss two factors to consider when 5


developing security policies for database clusters.

7 (CO1) Explain two ways to mitigate security 5


vulnerabilities in database cluster construction.

8 (CO2) Compare and contrast two authentication 5


methods used in database cluster security.

9 (CO1) How does risk assessment contribute to the 5


construction of secure database clusters?

10 (CO3) Explain two techniques for integrating security 5


measures into database cluster deployment.

3
Question WRT 12 MARK QUESTIONS WITH SPECIFIC COs 10 10

No

1 (CO2) Explain two access control mechanisms used to secure 12


database clusters.

2 (CO1) How does threat modeling contribute to the identification of 12


security risks in database cluster construction?

3 (CO3) Explain two methods for securing data transmission within a 12

database cluster.

4 (CO2) Evaluate two intrusion detection systems suitable for 12


monitoring database cluster security.

5 (CO1) Discuss two regulatory compliance requirements relevant to 12


database cluster security.

6 (CO1) Analyze the role of database administrators in ensuring the 12


security of a database system, including their responsibilities in
implementing security controls and responding to security incidents.

7 (CO2) Analyze the impact of a security breach on a database cluster 12


and propose two recovery strategies.

8 (CO1) How can regular security audits help maintain the integrity of 12
database clusters?

4
9 (CO1) How can regular security audits help maintain the integrity of 12
database clusters?

10 (CO3) Discuss two methods for testing the effectiveness of security 12


measures in database cluster deployment.

You might also like