Exam 16: Database Administration and Security
Exam 1: Database Systems72 Questions
Exam 2: Data Models75 Questions
Exam 3: The Relational Database Model74 Questions
Exam 4: Entity Relationship Ermodeling75 Questions
Exam 5: Advanced Data Modeling83 Questions
Exam 6: Normalization of Database Tables92 Questions
Exam 7: Introduction to Structured Query Language SQL92 Questions
Exam 8: Advanced SQL95 Questions
Exam 9: Database Design87 Questions
Exam 10: Transaction Management and Concurrency Control76 Questions
Exam 11: Database Performance Tuning and Query Optimization82 Questions
Exam 12: Distributed Database Management Systems72 Questions
Exam 13: Business Intelligence and Data Warehouses75 Questions
Exam 14: Big Data Analytics and NoSQL76 Questions
Exam 15: Database Connectivity and Web Technologies81 Questions
Exam 16: Database Administration and Security81 Questions
Select questions type
When performing user access management,a DBA assigns passwords to each user at both the operating system and DBMS levels.
(True/False)
4.7/5
(28)
One of the important functions provided by the database is to reserve the resources that must be used by the database at run time.
(Multiple Choice)
4.9/5
(37)
The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.
(True/False)
4.7/5
(36)
A(n)data dictionary is automatically updated by the DBMS with every database access.
(Multiple Choice)
4.7/5
(22)
A security is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.
(Short Answer)
4.9/5
(30)
In the context of an organization's managerial structure,decisions are short term and affect only daily operations; for example,deciding to change the price of a product to clear it from inventory.
(Short Answer)
4.7/5
(32)
Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.
(True/False)
4.9/5
(34)
Testing procedures and standards must already be in place before any application program can be approved for use in the company.
(True/False)
4.9/5
(32)
_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.
(Multiple Choice)
4.9/5
(26)
Training people to use the DBMS and its tools is not included in the responsibilities of a DBA.
(True/False)
4.8/5
(31)
The DBA can use an audit log to automatically record a brief description of the database operations performed by the users.
(True/False)
4.7/5
(30)
At the level of middle management,the database must be able to .
(Multiple Choice)
4.8/5
(37)
In the context of database administration,is the extent to which individuals and organizations have the right to determine the "who,what,when,where,and how" of data usage.
(Short Answer)
4.7/5
(41)
Within the data security framework,is concerned with keeping data consistent and free of errors or anomalies.
(Short Answer)
4.8/5
(37)
When performing user access management,a DBA defines each user to the database at the levels.
(Multiple Choice)
4.9/5
(32)
The DBA function provides data modeling and design services to the end-user community,often through coordination with an application development group within the data-processing department.
(True/False)
4.7/5
(33)
security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.
(Multiple Choice)
4.8/5
(29)
The maintenance activities of the DBA are an extension of the operational activities.
(True/False)
4.7/5
(30)
Showing 61 - 80 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)