Which of the following represents a vulnerability in SQL query construction that can be exploited through malicious user input, and can be prevented using parameterized queries?
ABuffer overflow attacks
BCross-site scripting (XSS)
CSQL injection attacks
DDistributed denial of service (DDoS)
Correct Answer:
C. SQL injection attacks
EXPLANATION
SQL injection occurs when untrusted input is concatenated into SQL queries. Parameterized queries/prepared statements separate code from data, preventing attackers from modifying query logic.
Which of the following is a characteristic of NoSQL databases that makes them suitable for handling big data in cloud environments?
AStrict ACID compliance across all nodes
BHorizontal scalability and schema-less design
CRequirement for predefined schemas before insertion
DComplex JOIN operations for data retrieval
Correct Answer:
B. Horizontal scalability and schema-less design
EXPLANATION
NoSQL databases like MongoDB and Cassandra are designed for horizontal scaling and flexible schemas, making them ideal for cloud-based big data applications with varying data structures.
In a relational database, which normal form eliminates partial dependencies and is considered essential for most practical database designs?
ASecond Normal Form (2NF)
BThird Normal Form (3NF)
CBoyce-Codd Normal Form (BCNF)
DFourth Normal Form (4NF)
Correct Answer:
B. Third Normal Form (3NF)
EXPLANATION
3NF eliminates partial and transitive dependencies, making it the standard for practical database design. BCNF is stricter but 3NF is the most commonly implemented normalization form.