Exam 16: Database Administration and Security
Exam 1: Database Systems75 Questions
Exam 2: Data Models75 Questions
Exam 3: The Relational Database Model75 Questions
Exam 4: Entity Relationship Er Modeling75 Questions
Exam 5: Advanced Data Modeling75 Questions
Exam 6: Normalization of Database Tables75 Questions
Exam 7: Introduction to Structured Query Language Sql75 Questions
Exam 8: Advanced Sql75 Questions
Exam 9: Database Design75 Questions
Exam 10: Transaction Management and Concurrency Control74 Questions
Exam 11: Database Performance Tuning and Query Optimization75 Questions
Exam 12: Distributed Database Management Systems74 Questions
Exam 13: Business Intelligence and Data Warehouses74 Questions
Exam 14: Big Data and Nosql75 Questions
Exam 15: Database Connectivity and Web Technologies73 Questions
Exam 16: Database Administration and Security74 Questions
Select questions type
A full backup, or database dump, produces a complete copy of the entire database.
Free
(True/False)
4.9/5
(34)
Correct Answer:
True
Each database has an associated_____ file that is read at instance startup, stores run-time configuration parameters, and is used to set the working environment for the database.
Free
(Short Answer)
4.8/5
(31)
Correct Answer:
initialization
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
B
The _____, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
(Short Answer)
4.7/5
(31)
The storage locations for multiple backups must include sites inside and outside the organization.
(True/False)
4.7/5
(32)
The person responsible for the control of the centralized and shared database is the database _____.
(Multiple Choice)
4.8/5
(42)
In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the _____ administrator.
(Short Answer)
4.7/5
(40)
A security vulnerability is a collection of standards and policies created to guarantee the security of a system and ensure auditing and compliance.
(True/False)
4.9/5
(39)
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
(True/False)
4.8/5
(36)
Explain user requirements gathering as part of the DBA's end-user support services.
(Essay)
4.9/5
(27)
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
(True/False)
4.9/5
(32)
Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.
(Short Answer)
4.8/5
(35)
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
(True/False)
4.9/5
(41)
The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.
(True/False)
4.8/5
(27)
_____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.
(Multiple Choice)
4.9/5
(33)
In the context of an organization's managerial structure, _____ decisions are short term and affect only daily operations; for example, deciding to change the price of a product to clear it from inventory.
(Short Answer)
4.7/5
(30)
A(n) _____ data dictionary is automatically updated by the DBMS with every database access.
(Multiple Choice)
4.8/5
(34)
Instructions to create a password are an example of a _____.
(Multiple Choice)
4.7/5
(30)
Showing 1 - 20 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)