How To Exam?

a knowledge trading engine...


Jawaharlal Nehru Technological University Kakinada 2010-1st Sem M.Tech Computer Science & Engg. - Information Security SUBJECT CODE: C4006 REGULAR S SECURED DATABASE APPLICATION DEVELOP

Sunday, 11 August 2013 02:40Web

1. a. What is security? define the info system and its components.
b. define the concept of info security.

2. a. define the operating system security environment from the database perspective.
b. define the differences ranging from authentication methods

3. a. define the importance of administration documentation
b. Briefly define the risks of database links

4. a. define the process of Granting and revoking user privileges
b. Briefly define the best practices for a secured network environment

5. List the kinds of users in a database environment? define in detail about the concepts
of 5 security models

6. a. What is VPD? define the importance of VPD.
b. define the importance of VIEW database object, while implementing a VPD.

7. a. define the basic objectives of an audit
b. Differentiate ranging from the auditing architectures of DML Action Vs DML modifications

8. define the process to create and implement DLL triggers with Oracle


( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Jawaharlal Nehru Technological University Kakinada 2010-1st Sem M.Tech Computer Science & Engg. - Information Security SUBJECT CODE: C4006 REGULAR S SECURED DATABASE APPLICATION DEVELOP