Exam 9: Data Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Changing the default listening port is an effective way of discouraging attackers from accessing the database.

(True/False)
4.8/5
(37)

DLL triggers are used to ________.

(Multiple Choice)
4.9/5
(40)

The most common form of deletion in Windows-based systems is nominal deletion.

(True/False)
4.9/5
(30)

Optical disks can safely hold data for decades.

(True/False)
4.8/5
(37)

The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________.

(Multiple Choice)
4.9/5
(42)

With nominal deletion, data is ________.

(Multiple Choice)
4.8/5
(50)

In relational database, a row is the same as a tuple or record.

(True/False)
4.8/5
(36)

Image backup is attractive because ________.

(Multiple Choice)
4.7/5
(38)

With CDP, each location backs up the other in real time.

(True/False)
4.8/5
(36)

Wiping/clearing is the best approach to destroying media.

(True/False)
4.9/5
(33)

Backed-up data must be physically stored on something.

(True/False)
4.8/5
(38)

Which of the following database events should be regularly audited?

(Multiple Choice)
4.8/5
(37)

Properly hardened hosts and securely coded applications can help protect data while it is transmitted.

(True/False)
5.0/5
(33)

Full backups are ________.

(Multiple Choice)
4.9/5
(44)

File/directory data backup copies ________.

(Multiple Choice)
4.8/5
(35)

CDP is inexpensive to use.

(True/False)
4.8/5
(30)

DDL triggers are used to ________.

(Multiple Choice)
4.8/5
(34)

Mesh backup is where client PCs in an organization back up each other.

(True/False)
4.8/5
(37)

Losing an encryption key is not a serious danger.

(True/False)
4.7/5
(36)

Retaining data can be ________.

(Multiple Choice)
4.9/5
(41)
Showing 41 - 60 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)