Exam 16: Database Administration and Security
Exam 1: Database Systems75 Questions
Exam 2: Data Models75 Questions
Exam 3: The Relational Database Model75 Questions
Exam 4: Entity Relationship Er Modeling75 Questions
Exam 5: Advanced Data Modeling75 Questions
Exam 6: Normalization of Database Tables75 Questions
Exam 7: Introduction to Structured Query Language Sql75 Questions
Exam 8: Advanced Sql75 Questions
Exam 9: Database Design75 Questions
Exam 10: Transaction Management and Concurrency Control74 Questions
Exam 11: Database Performance Tuning and Query Optimization75 Questions
Exam 12: Distributed Database Management Systems74 Questions
Exam 13: Business Intelligence and Data Warehouses74 Questions
Exam 14: Big Data and Nosql75 Questions
Exam 15: Database Connectivity and Web Technologies73 Questions
Exam 16: Database Administration and Security74 Questions
Select questions type
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
(Multiple Choice)
4.9/5
(27)
The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.
(True/False)
4.9/5
(39)
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
(True/False)
4.8/5
(38)
System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.
(True/False)
4.8/5
(42)
_____ CASE tools provide support for the planning, analysis, and design phases.
(Multiple Choice)
4.7/5
(30)
The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.
(Short Answer)
4.8/5
(33)
_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
(Multiple Choice)
4.9/5
(33)
In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.
(True/False)
4.7/5
(31)
In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.
(Short Answer)
4.7/5
(28)
Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.
(True/False)
4.8/5
(39)
In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users.
(Multiple Choice)
4.8/5
(30)
In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.
(Short Answer)
4.8/5
(26)
A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
(True/False)
4.9/5
(34)
In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.
(Short Answer)
4.8/5
(32)
In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management.
(Multiple Choice)
4.9/5
(27)
When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.
(Multiple Choice)
4.9/5
(38)
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource
a given user can access.
(Short Answer)
4.8/5
(38)
Showing 21 - 40 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)