Exam 11: Database Control Issues: Security, Backup and Recovery, Concurrency
Exam 1: Data: the New Corporate Resource31 Questions
Exam 2: Data Modeling57 Questions
Exam 3: The Database Management System Concept83 Questions
Exam 4: Relational Data Retrieval: SQL71 Questions
Exam 5: The Relational Database Model: Introduction57 Questions
Exam 6: The Relational Database Model: Additional Concepts39 Questions
Exam 7: Logical Database Design58 Questions
Exam 8: Physical Database Design134 Questions
Exam 9: Object-Oriented Database Management41 Questions
Exam 10: Data Administration, Database Administration, and Data Dictionaries47 Questions
Exam 11: Database Control Issues: Security, Backup and Recovery, Concurrency59 Questions
Exam 12: Clientserver Database and Distributed Database56 Questions
Exam 13: The Data Warehouse62 Questions
Exam 14: Database and the Internet45 Questions
Select questions type
All of the following are true about mirrored databases, except ____.
(Multiple Choice)
4.9/5
(35)
Forward recovery uses as inputs the log and the last backup taken.
(True/False)
4.8/5
(38)
Passwords should not be so difficult to remember that the person herself has to write them down, which is security exposure in itself because someone else could potentially see it.
(True/False)
4.8/5
(39)
Passwords should appear on the terminal screen when they are typed in.
(True/False)
4.7/5
(41)
All of the following are types of data security breaches, except ____.
(Multiple Choice)
4.8/5
(31)
Unauthorized data access and unauthorized data modification are two types of data security breaches.
(True/False)
4.8/5
(34)
The Central Zoo maintains a modest information systems environment with a server and a LAN that connects all of the zoo's departments. It maintains a relational database that includes data about its animals, employees, members, and about a variety of infrastructure entities including the animals' enclosures.
a. Devise a data security strategy for the Central Zoo, incorporating appropriate data security measures.
b. Devise a backup and recovery strategy for the Central Zoo.
c. While Central Zoo's database is not subject to heavy update activity, it is possible that two employees could try to update the same record at the same time. Devise a strategy that will avoid data problems when this happens.
(Essay)
4.8/5
(44)
All of the following are true about computer viruses, except ____.
(Multiple Choice)
4.7/5
(30)
All of the following are characteristics of forward recovery, except ____.
(Multiple Choice)
5.0/5
(41)
All of the following are disaster recovery tools or techniques, except ____.
(Multiple Choice)
4.8/5
(31)
A computer virus attack is the computer version of the old concept of "wiretapping."
(True/False)
4.9/5
(39)
In public key encryption, one key is used to encrypt the data and another key is used to decrypt the data.
(True/False)
4.8/5
(34)
In the "mirrored databases" backup and recovery technique, two copies of the entire database are maintained and both are updated simultaneously.
(True/False)
4.8/5
(43)
Backward recovery is an alternative to forward recovery for recreating a table that was destroyed.
(True/False)
4.8/5
(28)
Recommended places to locate a mainframe computer or a cluster of servers include a building's basement and ground floor.
(True/False)
4.8/5
(28)
In Secure Socket Layer (SSL) technology on the World Wide Web, a public key encryption algorithm is used to securely transfer a key for a private key encryption algorithm.
(True/False)
4.9/5
(33)
Showing 21 - 40 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)