Exam 16: Database Administration and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

"All users must have passwords" is an example of a _____.

(Multiple Choice)
4.7/5
(36)

_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

(Multiple Choice)
4.9/5
(27)

The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.

(True/False)
4.9/5
(39)

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.

(True/False)
4.8/5
(38)

System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.

(True/False)
4.8/5
(42)

_____ CASE tools provide support for the planning, analysis, and design phases.

(Multiple Choice)
4.7/5
(30)

The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.

(Short Answer)
4.8/5
(33)

_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

(Multiple Choice)
4.9/5
(33)

In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.

(True/False)
4.7/5
(31)

In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.

(Short Answer)
4.7/5
(28)

Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.

(True/False)
4.8/5
(39)

In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users.

(Multiple Choice)
4.8/5
(30)

In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.

(Short Answer)
4.8/5
(26)

A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

(True/False)
4.9/5
(34)

User-access management is a subset of _____.

(Multiple Choice)
4.9/5
(38)

In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.

(Short Answer)
4.8/5
(32)

Incremental backups produce a backup of all data.

(True/False)
4.8/5
(37)

In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management.

(Multiple Choice)
4.9/5
(27)

When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.

(Multiple Choice)
4.9/5
(38)

In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource a given user can access.

(Short Answer)
4.8/5
(38)
Showing 21 - 40 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)