adplus-dvertising
frame-decoration

Question

VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.

a.

Row-level authorization

b.

Column-level authentication

c.

Row-type authentication

d.

Authorization security

Answer: (a).Row-level authorization

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.

Similar Questions

Discover Related MCQs

Q. _______________ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

Q. The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years.

Q. The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.

Q. A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.

Q. Even with two-factor authentication, users may still be vulnerable to_____________attacks.

Q. Many applications use _________________, where two independent factors are used to identify a user.

Q. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

Q. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.

Q. In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.

Q. Which of the following is a valid encryption technique?

Q. A log of all changes to the application data is called as __________

Q. What is the standard for exchanging authentication and authorization information between two different security domains?

Q. What are phishing attacks?

Q. What are man in the middle attacks?

Q. The system where two independent pieces of data are used to identify a user is called as ______

Q. State true or false: Password leakage is a major security problem

Q. The URL of the page that had the link that the user clicked to access the page is called as _____

Q. An attack on a website that stores and displays text to a user is known as ______ attack

Q. If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________

Q. The information that gets transformed in encryption is ____________