Exam 11: Database Control Issues: Security, Backup and Recovery, Concurrency

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

With the combination of the logical view and the SQL GRANT command, users either individually or in groups can be restricted to accessing only certain database tables or only certain data within a database table.

(True/False)
4.9/5
(33)

Of the following actions or events that can result in a breach of data security, the one that is not necessarily deliberate is ____.

(Multiple Choice)
4.7/5
(40)

Damaged hardware can result in unusable or unavailable data.

(True/False)
4.9/5
(33)

Locks should never be used because of the possibility of deadlock.

(True/False)
4.9/5
(26)

The combination of views and the SQL GRANT command can do all of the following, except ____.

(Multiple Choice)
4.8/5
(29)

All of the following are types of data security (prevention) measures, except ____.

(Multiple Choice)
4.9/5
(31)

All of the following are true about antivirus software, except ____.

(Multiple Choice)
4.8/5
(46)

A basic backup and recovery task is maintaining a disk log or journal of all database data retrieval operations.

(True/False)
4.8/5
(32)

Forward recovery is used to recreate a table that was destroyed.

(True/False)
4.9/5
(39)

A proxy server is firewall software that resides in the Web server.

(True/False)
4.8/5
(38)

All of the following are characteristics of backward recovery, except ____.

(Multiple Choice)
4.9/5
(31)

Of the following choices, the most advisable location for a mainframe computer or a group of servers in a 20 story office building is ____.

(Multiple Choice)
4.9/5
(24)

Data that has been encrypted has to be decrypted to be used again.

(True/False)
5.0/5
(39)

All of the following are good rules for employees to follow for data security purposes, except ____.

(Multiple Choice)
4.8/5
(36)

All of the following are methods of breaching data security, except ____.

(Multiple Choice)
4.9/5
(33)

Backward recovery uses as inputs the log (starting with the last change to the database) and the last backup taken.

(True/False)
4.9/5
(44)

The lost update problem can occur when two people attempt to update the same data simultaneously.

(True/False)
4.9/5
(39)

A computer virus is a malicious piece of software that has the goal of damaging hardware as a means of breaching data security.

(True/False)
4.9/5
(32)

Stealing disks is a method of breaching computer security.

(True/False)
4.9/5
(39)
Showing 41 - 59 of 59
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)