0% found this document useful (0 votes)
11 views2 pages

Test 3 Monitor

The document is a knowledge test on Database Monitoring and Administration, focusing on database access management with multiple-choice questions. It assesses understanding of SQL commands for user access, privilege management, and best practices for monitoring and resource allocation. The test includes a passing score requirement of 6 out of 10 points and features a bonus question about granting read-only access.

Uploaded by

bayush
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

Test 3 Monitor

The document is a knowledge test on Database Monitoring and Administration, focusing on database access management with multiple-choice questions. It assesses understanding of SQL commands for user access, privilege management, and best practices for monitoring and resource allocation. The test includes a passing score requirement of 6 out of 10 points and features a bonus question about granting read-only access.

Uploaded by

bayush
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Knowledge test (10 point)

Passing score >=6 Module Title: Database Monitoring and


Administration
GOFA INDUSTRIAL
TRAY 1
Unit Three : database access management
COLLAGE
Name______________Level_________________Sign___________Date

Part-I Multiple choice

1. What SQL command is used to grant read-only access to a new user in MySQL?

A. REVOKE SELECT ON database.table FROM 'user'@'localhost';


B. GRANT SELECT ON database.table TO 'user'@'localhost';
C. GRANT ALL ON database.* TO 'user';
D. CREATE USER 'user'@'localhost';

2. What is the correct command to remove all privileges and delete a user who has left the
organization?

A. DROP DATABASE 'user';


B. REVOKE SELECT ON database.table FROM 'user';
C. REVOKE ALL PRIVILEGES ON database.* FROM 'user'@'localhost'; DROP USER
'user'@'localhost';
D. DELETE USER 'user';

3. How should access be managed when a user changes their role in an organization?

A. Keep old privileges to avoid C. Adjust privileges to match the new role
interruption D. Disable the account temporarily
B. Revoke all access and reset the account

4. Why is periodic access review important in access management?

A. It improves database indexing C. It reduces storage costs


B. It helps detect and remove unnecessary D. It logs server errors
or risky access

5. What action should be taken for an 'inactive' user status?

A. Grant INSERT and DELETE access C. REVOKE all access privileges


B. No changes are needed D. Update their password only
6. Which log activity may indicate a brute-force attack attempt?

A. A single failed login


B. High CPU usage C. Multiple failed login attempts in a
short time
D. Data replication error

7. What is a good practice for monitoring logins in real-time?

A. Manual weekly review of logs C. Emailing logs to users


B. Use of geolocation tagging D. implementing real-time alert systems

8. What tool or method helps analyze large volumes of login data quickly?

A. Index fragmentation C. Automated log analysis tools


B. Manual inspection D. running cron jobs

9. What strategy helps ensure sufficient resources as database demands grow?

A. Use static hardware configurations C. Regular capacity planning


B. Disable background processes D. Increase CPU frequency only

10. Which of the following best reduces repetitive database load and improves
performance?

A. Using multiple admin accounts


B. Query caching and indexing
C. Rebooting the server frequently
D. Disabling write operation

Bonus
11. What is the purpose of granting basic read-only access to a new user in the context of
access privilege management?
A. To allow the user to modify database records
B. To provide full administrative access to the database
C. To restrict the user from accessing the database
D. To enable the user to view but not modify data

You might also like