Exam 4: IT Security Part II: Auditing Database Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain the three views of a database.

(Essay)
4.8/5
(34)

Which of the following is not a basic database backup and recovery feature?

(Multiple Choice)
4.9/5
(30)

An example of a distributed database is

(Multiple Choice)
4.8/5
(36)

Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.

(True/False)
4.9/5
(36)

The database management system provides a controlled environment for accessing the database.

(True/False)
4.9/5
(28)

Explain a database lockout and the deadlock phenomenon.Contrast that to concurrency control and the timestamping technique.Describe the importance of these items in relation to database integrity.

(Essay)
4.9/5
(33)

In the database method of data management,access authority is maintained by systems programming.

(True/False)
4.9/5
(49)

Which of the following is not a problem usually associated with the flat-file approach to data management?

(Multiple Choice)
4.7/5
(41)

Describe an environment in which a firm should use a partitioned database.

(Essay)
4.8/5
(35)

What is the flat-file model?

(Essay)
4.9/5
(37)

Use the following words to complete the sentences in questions 1 through 5. Use the following words to complete the sentences in questions 1 through 5.    -The __________________________ authorizes access to the database. -The __________________________ authorizes access to the database.

(Short Answer)
5.0/5
(37)

The database attributes that individual users have permission to access are defined in

(Multiple Choice)
4.9/5
(38)

Data concurrency

(Multiple Choice)
4.8/5
(41)

All of the following are elements of the DBMS which facilitate user access to the database except

(Multiple Choice)
4.9/5
(27)

Discuss the key factors to consider in determining how to partition a corporate database.

(Essay)
4.8/5
(35)

Ownership of data in traditional legacy systems often leads to data redundancy.This in turn leads to several data management problems.What are they? How does the database approach solve them?

(Essay)
4.7/5
(43)

Use the following words to complete the sentences in questions 1 through 5. Use the following words to complete the sentences in questions 1 through 5.    -The __________________________ describes every data element in the database. -The __________________________ describes every data element in the database.

(Short Answer)
4.8/5
(37)

Which statement is false?

(Multiple Choice)
4.8/5
(25)

What types of problems does data redundancy cause?

(Essay)
4.7/5
(33)

Which characteristic is associated with the database approach to data management?

(Multiple Choice)
4.9/5
(32)
Showing 61 - 80 of 101
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)