Exam 15: Database Administration and Security
Exam 1: Database Systems76 Questions
Exam 2: Data Models75 Questions
Exam 3: The Relational Database Model75 Questions
Exam 4: Entity Relationship Er Modeling75 Questions
Exam 5: Advanced Data Modeling85 Questions
Exam 6: Normalization of Database Tables110 Questions
Exam 7: Introduction to Structured Query Language Sql111 Questions
Exam 8: Advanced Sql109 Questions
Exam 9: Database Design103 Questions
Exam 10: Transaction Management and Concurrency Control85 Questions
Exam 11: Database Performance Tuning and Query Optimization85 Questions
Exam 12: Distributed Database Management Systems83 Questions
Exam 13: Business Intelligence and Data Warehouses75 Questions
Exam 14: Database Connectivity and Web Technologies85 Questions
Exam 15: Database Administration and Security86 Questions
Select questions type
In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.
(True/False)
4.7/5
(35)
CASE tools provide support for the planning, analysis, and design phases.
(Multiple Choice)
4.9/5
(31)
The , also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.
(Short Answer)
4.7/5
(31)
A security is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
(Short Answer)
5.0/5
(40)
Security breaches can yield a database whose integrity is either preserved or corrupted.
(True/False)
4.8/5
(34)
In the context of database administration, is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.
(Short Answer)
4.9/5
(38)
Which of the following is a reason why a DBMS's daily operations must be clearly documented?
(Multiple Choice)
4.8/5
(29)
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
(True/False)
4.8/5
(37)
are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.
(Multiple Choice)
4.8/5
(28)
_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
(Multiple Choice)
4.8/5
(30)
Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.
(True/False)
4.8/5
(26)
Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.
(True/False)
4.9/5
(29)
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
(Multiple Choice)
4.8/5
(36)
In the context of the Oracle Enterprise Manager, a(n) is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources.
(Multiple Choice)
4.7/5
(34)
One of the important functions provided by the database is to reserve the resources that must be used by the database at run time.
(Multiple Choice)
4.7/5
(27)
In the context of the Oracle Enterprise Manager, a(n) is a uniquely identifiable object that allows a given person to log on to the database.
(Multiple Choice)
4.9/5
(34)
The maintenance activities of the DBA are an extension of the operational activities.
(True/False)
4.7/5
(45)
Showing 61 - 80 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)