in Education by
__________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. (a) Database (b) Network (c) System (d) Hardware This question was posed to me at a job interview. I would like to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (a) Database Best explanation: Database Security consultants are specific individuals hired in order to monitor and scan the database systems and keep them secured from unwanted threats and attacks by giving access to restricted users, blocking unwanted files, multi-factor access control etc.

Related questions

0 votes
    One common way to maintain data availability is __________ (a) Data clustering (b) Data backup (c) Data recovery ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? (a) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    _________ are those individuals who maintain and handles IT security in any firm or organization. (a) IT Security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    In port scanning, a _________ is always associated with an IP address (usually of the host system) & the ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    Which of the following do not comes under security measures for cloud in firms? (a) Firewall (b) Antivirus (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ___________________ is alike as that of Access Point (AP) from 802.11, & the mobile operators uses it for ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...