Chapter 11 ■ Practice Test 3 283
and regularly handles classified information on behalf of the government and other
government contractors. Kim is concerned about ensuring the security of information
stored in ASI databases.
Kim’s database is a multilevel security database, and different ASI employees have different
security clearances. The database contains information on the location of military aircraft
containing ASI systems to allow ASI staff to monitor those systems.
- Kim learned that the military is planning a classified mission that involves some ASI
aircraft. She is concerned that employees not cleared for the mission may learn of it by
noticing the movement of many aircraft to the region. Individual employees are cleared
to know about the movement of an individual aircraft, but they are not cleared to know
about the overall mission. What type of attack is Kim concerned about?
A. Aggregation
B. SQL injection
C. Inference
D. Multilevel security - What technique can Kim employ to prevent employees not cleared for the mission from
learning the true location of the aircraft?
A. Input validation
B. Polyinstantiation
C. Parameterization
D. Server-side validation - Kim’s database uniquely identifies aircraft by using their tail number. Which one of the
following terms would not necessarily accurately describe the tail number?
A. Database field
B. Foreign key
C. Primary key
D. Candidate key - Kim would like to create a key that enforces referential integrity for the database. What
type of key does she need to create?
A. Primary key
B. Foreign key
C. Candidate key
D. Master key