Exam 15: Database Administration and Security
Exam 1: Database Systems70 Questions
Exam 2: Data Models70 Questions
Exam 3: The Relational Database Model100 Questions
Exam 4: Entity Relationship (ER)Modeling100 Questions
Exam 5: Advanced Data Modeling70 Questions
Exam 6: Normalization of Database Tables100 Questions
Exam 7: Introduction to Structured Query Language (SQL)100 Questions
Exam 8: Advanced SQL100 Questions
Exam 9: Database Design100 Questions
Exam 10: Transaction Management and Concurrency Control70 Questions
Exam 11: Database Performance Tuning and Query Optimization70 Questions
Exam 12: Distributed Database Management Systems70 Questions
Exam 13: Business Intelligence and Data Warehouses100 Questions
Exam 14: Database Connectivity and Web Technologies100 Questions
Exam 15: Database Administration and Security100 Questions
Select questions type
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
(True/False)
4.9/5
(40)
Placing the DBA function in a(n)____________________ position often creates a consulting environment in which the DBA is able to devise the data administration strategy but does not have the authority to enforce it or to resolve possible conflicts.
(Short Answer)
4.8/5
(38)
The DBA works with managers to ensure the quality and integrity of database design and transactions.
(True/False)
4.9/5
(34)
Explain conflict and problem resolution as part of the DBA's end-user support services.
(Essay)
4.8/5
(35)
The end user's role requires a broad understanding of DBMS functions,configuration,programming languages,data modeling and design methodologies,and so on.
(True/False)
4.8/5
(31)
The DBA must periodically generate a(n)____________________ report to determine whether there have been actual or attempted security violations-and,if so,from what locations,and if possible,by whom.
(Short Answer)
4.9/5
(33)
Classifying users into ____ according to common access needs facilitates the DBA's job of controlling and managing the access privileges of individual users.
(Multiple Choice)
4.8/5
(31)
The selection of the DBMS ____________________ involves asking the question,"Are the company's needs better served by a relational,object-oriented,or object/relational DBMS?"
(Short Answer)
4.9/5
(30)
The DBA interacts with the end user by providing data and information support services to the organization's departments.
(True/False)
4.8/5
(33)
Protecting the data in the database is a function of authorization management.
(True/False)
5.0/5
(31)
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy,must have a thorough understanding of the components being installed,and must be familiar with the installation,configuration,and startup procedures of such components.
(True/False)
4.8/5
(29)
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
(True/False)
4.9/5
(43)
The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
(True/False)
4.9/5
(35)
The maintenance activities of the DBA are an extension of the operational activities.
(True/False)
4.8/5
(47)
Security breaches can yield a database whose integrity is either preserved or corrupted.
(True/False)
4.8/5
(34)
____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)