Q.1
When developing SQL injection attacks, the final resulting statement must what?
  • It must end with a SQL comment ( -- )
  • It must be balanced and true
  • It must meet the ISO SQL:2008 standard
  • It must start with a single quote
Q.2
Ultimately, injection attacks are caused by what?
  • Unpatched versions of applications and operating systems
  • Operating systems not restricting memory from one process to another
  • Development languages using immutable strings
  • Developers not sanitizing application input
Q.3
ROLLBACK adalah Struktur Query pada Level?
  • Data Manipulation Language
  • Data Definition Language
  • Transaction Control Language
  • Data Control Language
Q.4
Sebutkan default logging name format pada PostgreSQL.
  • postgresql-%a.log
  • 'postgresql-%d-%a.log
  • 'postgresql-%d.log
  • 'postgresql-%a-%d-%m.log
Q.5
Berikut ini adalah Query untuk melakukan Connection Check, Kecuali!
  • \conninfo
  • SELECT current_user;
  • SHOW current_connection;
  • show port;
Q.6
Which statement is used to sort the result-set?
  • SORT BY
  • ORDER
  • ORDER BY
  • FILTER BY
Q.7
Which statement can retrieve the first 5 films ordered by film_id
  • SELECT film_id, title, release_yearFROM filmORDER BY film_idLIMIT 5 OFFSET 1;
  • SELECT film_id, title, release_yearFROM filmORDER BY film_idLIMIT 5;
  • SELECT film_id, title, release_yearFROM filmORDER BY film_idLIMIT 4 OFFSET 1;
  • None of these above.
Q.8
Which of the following query is correct for using comparison operators?
  • SELECT name, course_name FROM student WHERE age>50 and <80;
  • SELECT name, course_name FROM student WHERE age>50 and age<80;
  • SELECT name, course_name FROM student WHERE age>50 and WHERE age<80;
  • None of these
Q.9
The ability to find all web pages, directories and other files that make up a web application is provided by a:
  • Response analysis tool
  • Spider
  • Proxy
  • None of these answers are correct
Q.10
Sebutkan cara untuk membuat sebuah output query dengan menggunakan command OS.
  • \o
  • \O
  • psql -o
  • psql -s
Q.11
Pada file postgresql.conf terdapat parameter untuk include konfigurasi berupa file dari luar file postgresql.conf, parameter tersebut adalah?
  • file_include
  • include_file
  • include_dir
  • include
Q.12
Pilih yang paling benar, Berikut ini adalah Levels of Security PostgreSQL.
  • Server and Application
  • Object
  • Database
  • All of above
Q.13
A key which allows unique or null values.
  • Unique
  • Null key
  • Primary key
  • Alternate key
Q.14
The ability to intercept and change requests as they leave a web browser is provided by a:
  • Response analysis tool
  • Spider
  • Proxy
  • None of these answers are correct
Q.15
A tool that examines responses from web-servers and web sites in order to ‘fingerprint’ them for an analysis of what software and versions they are (and sometimes, to list vulnerabilities) is called what?
  • Response analysis tool
  • Spider
  • Proxy
  • None of these answers are correct
Q.16
What type of statement to eliminate duplicate rows from the result?
  • SELECT FROM
  • SELECT DISTINCT
  • SELECT WHERE
  • SELECT INTO
Q.17
When retrieving data in a particular table, we use the_____________ statement.
  • FETCH
  • ORDER BY
  • SELECT FROM
  • OFFSET
Q.18
In PostgreSQL, a named collection of tables is called what?
  • Trigger
  • View
  • Diagram
  • Schema
Q.19
DML commands are:-
  • DELETE
  • INSERT
  • UPDATE
  • All of above
Q.20
TCL commands are:-
  • ROLLBACK
  • GRANT
  • REVOKE
  • All of above
0 h : 0 m : 1 s