Exam 16: Database Administration and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When performing user access management,a DBA assigns passwords to each user at both the operating system and DBMS levels.

(True/False)
4.7/5
(28)

One of the important functions provided by the database is to reserve the resources that must be used by the database at run time.

(Multiple Choice)
4.9/5
(37)

The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.

(True/False)
4.7/5
(36)

A(n)data dictionary is automatically updated by the DBMS with every database access.

(Multiple Choice)
4.7/5
(22)

A security is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

(Short Answer)
4.9/5
(30)

In the context of an organization's managerial structure,decisions are short term and affect only daily operations; for example,deciding to change the price of a product to clear it from inventory.

(Short Answer)
4.7/5
(32)

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.

(True/False)
4.9/5
(34)

Testing procedures and standards must already be in place before any application program can be approved for use in the company.

(True/False)
4.9/5
(32)

_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

(Multiple Choice)
4.9/5
(26)

Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.

(True/False)
4.8/5
(31)

The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.

(True/False)
4.7/5
(30)

At the level of middle management,the database must be able to .

(Multiple Choice)
4.8/5
(37)

In the context of database administration,is the extent to which individuals and organizations have the right to determine the "who,what,when,where,and how" of data usage.

(Short Answer)
4.7/5
(41)

A(n)_____ physically stores the database's data.

(Short Answer)
4.8/5
(33)

Within the data security framework,is concerned with keeping data consistent and free of errors or anomalies.

(Short Answer)
4.8/5
(37)

When performing user access management,a DBA defines each user to the database at the levels.

(Multiple Choice)
4.9/5
(32)

The DBA function provides data modeling and design services to the end-user community,often through coordination with an application development group within the data-processing department.

(True/False)
4.7/5
(33)

The administrator is responsible for strategic planning.

(Multiple Choice)
4.9/5
(40)

security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

(Multiple Choice)
4.8/5
(29)

The maintenance activities of the DBA are an extension of the operational activities.

(True/False)
4.7/5
(30)
Showing 61 - 80 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)