Exam 12: Database Administration and Security
Exam 1: The Database Approach70 Questions
Exam 2: Database Development Process100 Questions
Exam 3: Data Models70 Questions
Exam 4: Relational Model Characteristics100 Questions
Exam 5: Beginning Structured Query Language Sql100 Questions
Exam 6: Procedural Language Sql and Advanced Sql100 Questions
Exam 7: Data Modeling With Entity Relationship Diagrams100 Questions
Exam 8: Data Modeling Advanced Concepts70 Questions
Exam 9: Normalizing Database Designs100 Questions
Exam 10: Distributed Databases70 Questions
Exam 11: Interacting With Databases Through the Web100 Questions
Exam 12: Database Administration and Security100 Questions
Exam 13: Managing Transactions and Concurrency70 Questions
Exam 14: Managing Database and Sql Performance70 Questions
Exam 15: Databases for Decision Support100 Questions
Select questions type
A(n) ____ data dictionary is automatically updated by the DBMS with every database access.
Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
B
The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
A full backup, or database dump, produces a complete copy of the entire database.
Free
(True/False)
4.8/5
(33)
Correct Answer:
True
Training people to use the DBMS and its tools is not included in the DBA's technical activities.
(True/False)
4.9/5
(31)
Current data distribution philosophy makes it easy for ____ end users to access the database.
(Multiple Choice)
4.7/5
(42)
____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
(Multiple Choice)
4.8/5
(34)
____________________ deals with the rights of individuals and the organization to determine the "who, what, when, where, and how" of data usage.
(Short Answer)
4.8/5
(32)
The DBA interacts with the end user by providing data and information support services to the organization's departments.
(True/False)
4.8/5
(36)
Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.
(True/False)
4.8/5
(33)
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognition technology.
(Multiple Choice)
4.7/5
(43)
____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
(Multiple Choice)
4.9/5
(33)
The advent of the DBMS and its shared view of data produced a new level of data management sophistication and led the DP department to evolve into a(n) _________________________ department.
(Short Answer)
4.8/5
(31)
The ____________________, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles overlap some.
(Short Answer)
4.9/5
(36)
The DBA's ____ role is focused on personnel management and on interactions with the end-user community.
(Multiple Choice)
4.9/5
(34)
It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.
(Multiple Choice)
5.0/5
(27)
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
(True/False)
4.9/5
(38)
An organization is subject to a(n) _________________________ cycle; that is, the data user applies intelligence to data to produce information that is the basis of knowledge used in decision making by the user.
(Short Answer)
4.8/5
(31)
Instructions to create a password are an example of a ____.
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)