5 Secure Databases
5 Secure Databases
061205T4CYB
CYBER SECURITY TECHNICIAN LEVEL 5
SECURE DATABASES
SEC/OS/CS/CR/05/5/A
Nov. / Dec. 2023
WRITTEN ASSESSMENT
TIME: 3 HOURS
INSTRUCTIONS TO CANDIDATES
1. This paper has three sections A, B and C.
2. You are provided with a separate answer booklet.
3. Marks for each question are as indicated.
4. Do not write on the question paper.
Page 1 of 7
©2023 TVET CDACC
Page 2 of 7
©2023 TVET CDACC
6. How do the following manufacturer's guide affect the overall security of the database
environment when checking for misconfigurations?
A. It has no impact on database security.
B. It strengthens database security by addressing vulnerabilities
C. It only affects physical security.
D. It increases the risk of security breaches.
7. Which of the following is not a type of database model?
A. Hierarchical
B. Network
C. Distributed
D. Decentralized
8. Which risks can be mitigated by monitoring and applying database patches according to the
ICT policy?
A. Data breaches and unauthorized access
B. Physical security issues.
C. Server power consumption.
D. Data retention policies.
9. What is a common industry best practice for securing database backups?
A. Storing backups in an unprotected folder on the database server
B. Using strong encryption to protect backup files
C. Keeping backup files in plain text format
D. Regularly sharing backups with external partners
10. What is the primary purpose of conducting cost evaluation when identifying database types?
A. To prioritize the use of the most expensive databases.
B. To optimize database query performance.
C. To ensure that the selected database type aligns with organizational budget
constraints and efficiency requirements.
D. To increase licensing costs
Page 3 of 7
©2023 TVET CDACC
Page 4 of 7
©2023 TVET CDACC
Page 5 of 7
©2023 TVET CDACC
21. Explain TWO key factors to consider when testing a database (4marks)
22. Give FOUR for reasons for conducting an assessment of security vulnerabilities, risks, and
threats in a database. (4marks)
23. Why is it important to monitor and apply database patches in accordance with the
organization’s ICT policy? (5marks)
24. Outline FIVE advantages for performing database backup. (5marks)
25. Distinguish between threat and vulnerability as applied in database security. (4marks)
26. State FOUR methods applied for monitoring database patches as per organization’s ICT
Policy. (4marks)
27. Discuss TWO main types of logs that are critical for database security. (4marks)
28. Outline THREE benefits of using database auditing system. (3marks)
29. Explain the significance of deploying database patches in a test environment as per the
organization's quality assurance policy (4marks)
30. Give THREE ways of managing database access controls. (3marks)
Page 6 of 7
©2023 TVET CDACC
31. When identifying a database based on its operation model, several factors are considered to
determine which database system is most suitable for a particular use case.
a) Discuss FIVE factors to be considered in determining which database system is most
suitable for a particular use case. (10marks)
b) Explain FIVE key considerations when evaluating the operational costs of a database
system. (10marks)
32. Leo Company is using the traditional file-based system in their daily routines to record and
manage business transactions.
a) Describe FIVE Security threats that the company is experiencing. (10marks)
b) Discuss any FIVE database backup strategies that you could advice the company to
employ in case they opted to install and use a server-based architecture. (10marks)
33. a) Define the term hardware sizing and explain the process of hardware sizing in the context
of database deployment. (10marks)
b) Justify why hardware sizing process is essential for the performance, scalability, and cost-
effectiveness of a database system. (10marks)
END
Page 7 of 7