Exam 16: Database Administration and Security
Exam 1: Database Systems75 Questions
Exam 2: Data Models75 Questions
Exam 3: The Relational Database Model75 Questions
Exam 4: Entity Relationship Er Modeling75 Questions
Exam 5: Advanced Data Modeling75 Questions
Exam 6: Normalization of Database Tables75 Questions
Exam 7: Introduction to Structured Query Language Sql75 Questions
Exam 8: Advanced Sql75 Questions
Exam 9: Database Design75 Questions
Exam 10: Transaction Management and Concurrency Control74 Questions
Exam 11: Database Performance Tuning and Query Optimization75 Questions
Exam 12: Distributed Database Management Systems74 Questions
Exam 13: Business Intelligence and Data Warehouses74 Questions
Exam 14: Big Data and Nosql75 Questions
Exam 15: Database Connectivity and Web Technologies73 Questions
Exam 16: Database Administration and Security74 Questions
Select questions type
Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.
(Short Answer)
4.8/5
(35)
Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies.
(Short Answer)
4.7/5
(33)
In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
(Short Answer)
4.8/5
(33)
Which of the following is a reason why a DBMS's daily operations must be clearly documented?
(Multiple Choice)
4.8/5
(28)
A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.
(Multiple Choice)
4.9/5
(34)
In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.
(Short Answer)
4.9/5
(37)
In the context of Oracle Enterprise Manager, a(n) _____ isa uniquely identifiable object that allows a given person to log on to the
database.
(Short Answer)
4.8/5
(36)
The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.
(True/False)
4.9/5
(39)
One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time.
(Multiple Choice)
4.8/5
(41)
An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.
(True/False)
4.9/5
(51)
_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
(Multiple Choice)
4.8/5
(36)
In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.
(Multiple Choice)
4.8/5
(30)
In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS.
(Short Answer)
4.8/5
(41)
_____ CASE tools provide support for the coding and implementation phases.
(Multiple Choice)
4.7/5
(37)
A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
(Short Answer)
4.8/5
(36)
The _____ administrator is responsible for strategic planning.
(Multiple Choice)
4.9/5
(35)
A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run.
(Multiple Choice)
4.8/5
(37)
The DBA interacts with the end user by providing data and information support services to the organization's departments.
(True/False)
4.7/5
(34)
Showing 41 - 60 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)