Data and Database Security
Implement data security concepts, governance, authentication, infrastructure security, and threat mitigation strategies (23% of exam).
In the context of CompTIA DataSys+, data and database security are foundational domains focused on protecting information assets from unauthorized access, corruption, and theft. The curriculum emphasizes the implementation of the CIA triad: Confidentiality, Integrity, and Availability. A primary d…
Concepts covered: Tokenization, Encryption in transit, Encryption at rest, Data masking, Data destruction techniques, Transparent Data Encryption (TDE), Column-level encryption, Key management, Hashing and salting, Data Loss Prevention (DLP), Data retention policies, GDPR compliance, PCI DSS compliance, HIPAA compliance for databases, SOX compliance, Data classification, Data governance frameworks, Privacy regulations, Audit logging, Access control management, Role-based access control (RBAC), Password policies, Identity management, Principle of least privilege, Database user management, Multi-factor authentication for databases, Service accounts security, Privileged access management, Physical security controls, Biometric access controls, Fire suppression systems, Database firewalls, Port security, Network segmentation for databases, Virtual private networks (VPN) for database access, Logical security controls, SQL injection prevention, Denial of Service (DoS) protection, Phishing awareness for DBAs, Ransomware protection, Brute-force attack mitigation, Database vulnerability scanning, Security patching, Intrusion detection for databases
DataSys+ - Data and Database Security Example Questions
Test your knowledge of Data and Database Security
Question 1
A database administrator at a biotechnology research institute is evaluating their genomics research database that supports multiple collaborative studies. The database contains a primary table storing research protocol identifiers, institutional review board approval numbers, study enrollment periods, and aggregate participant demographics showing age ranges in 20-year brackets and geographic distribution at the continental level. A secondary table named 'Genomic_Sequences' stores individual DNA sequence data with study-specific participant codes that were generated using a deterministic hashing function based on birth dates and enrollment sequence numbers. Each record contains whole genome sequencing results with approximately 3 billion base pair positions, rare genetic variant annotations, pharmacogenomic markers that predict drug metabolism rates, and carrier status for hereditary disease mutations. The institute's bioinformatics team has documented that certain rare genetic variants occur in fewer than 50 individuals worldwide, making those specific combinations potentially identifiable when cross-referenced with published medical literature and genetic genealogy databases that have proliferated across consumer genetics platforms. The research institute is negotiating a data sharing agreement with an international pharmaceutical consortium that wants to use the genomic data for drug discovery targeting rare diseases. The data governance committee has emphasized that classification must account for the permanent and immutable nature of genetic information, familial implications beyond the individual participant, and the evolving landscape of re-identification techniques using publicly available genetic databases. The DBA must classify the Genomic_Sequences table before implementing cell-level encryption policies and before the institutional biosafety committee approves the consortium partnership. What classification level should the administrator assign to the Genomic_Sequences table?
Question 2
A healthcare technology company operates a MySQL database managing electronic health records, prescription histories, and insurance claim data for 890,000 patients across 15 medical facilities. The intrusion detection system identifies that database account 'prescription_lookup' has begun executing queries using BENCHMARK() and GET_LOCK() functions embedded within conditional expressions over the past 4 days. Historical behavioral analysis covering 19 months shows this account has performed standard indexed lookups against PRESCRIPTION_HISTORY and MEDICATION_FORMULARY tables with consistent execution times averaging 35-55 milliseconds per query, executing approximately 8,500 queries daily. The new pattern reveals 142 query executions containing statements like 'SELECT * FROM PATIENT_RECORDS WHERE patient_id=12345 AND BENCHMARK(5000000,SHA1(1))' and 'OR (GET_LOCK("test",10))' targeting PATIENT_SSN and INSURANCE_PAYMENT_DETAILS columns, with execution times ranging from 8 to 18 seconds per query. These queries originate from the prescription management application server's registered IP address during clinic hours (7 AM - 9 PM) using valid connection strings with TLS 1.2 encryption and proper credential rotation. The queries return minimal result sets but consume excessive CPU resources on the database server, causing intermittent performance degradation affecting other applications. Application monitoring shows the prescription lookup interface experiencing timeout errors approximately 23% of the time during the past 96 hours. The development team confirms the prescription management system has been stable with no code deployments, framework updates, or infrastructure modifications in the past 75 days. Database query logs reveal all affected queries originate from the patient search form's autocomplete functionality, which was migrated from a legacy system 8 months ago but has operated normally until this recent anomaly. Security scanning tools recently identified the prescription application's web framework (version 5.9.1) contains known vulnerabilities to inference-based SQL injection attacks that leverage resource-intensive functions to extract data through timing channels. What primary security control implementation should the database administrator prioritize to detect and mitigate this resource exhaustion attack pattern while maintaining prescription lookup functionality for clinical staff?
Question 3
You are the database administrator for a securities trading firm managing a Couchbase distributed cluster across 128 nodes processing $2.3 billion in daily equity transactions with 99.99% uptime requirements. Your colocation facility recently completed installation of a hybrid fire suppression system combining early warning aspirating smoke detection with a two-stage Novec 1230 discharge mechanism. The system design includes a pre-discharge warning sequence: upon initial smoke detection, audible alarms activate and a 45-second countdown begins before agent release, during which personnel can abort the discharge if it's a false alarm. However, if smoke concentration reaches critical threshold levels in two consecutive detection zones, the system bypasses the countdown and triggers instantaneous discharge. During a tabletop exercise with your facilities team, the fire safety consultant explains that your database room contains several potential ignition sources: lithium-ion UPS battery banks in the northeast corner, high-density power distribution units throughout all equipment rows, and legacy fiber channel switches that generate significant heat in rack positions 12-18. The consultant notes that electrical fires in battery systems can escalate from initial thermal event to full combustion in 12-25 seconds, while server component fires typically develop over 90-180 seconds. Your disaster recovery site maintains a 60-second replication lag, and the database cluster serves real-time order execution for 8,400 institutional trading accounts. The operations director questions whether the 45-second pre-discharge countdown creates unacceptable risk exposure for rapid-escalation fire scenarios, particularly given the UPS battery placement. What fire protection engineering consideration should primarily inform your assessment of whether the countdown duration balances personnel safety with asset protection requirements?