Exam 11: Database Control Issues: Security, Backup and Recovery, Concurrency
Exam 1: Data: the New Corporate Resource31 Questions
Exam 2: Data Modeling57 Questions
Exam 3: The Database Management System Concept83 Questions
Exam 4: Relational Data Retrieval: SQL71 Questions
Exam 5: The Relational Database Model: Introduction57 Questions
Exam 6: The Relational Database Model: Additional Concepts39 Questions
Exam 7: Logical Database Design58 Questions
Exam 8: Physical Database Design134 Questions
Exam 9: Object-Oriented Database Management41 Questions
Exam 10: Data Administration, Database Administration, and Data Dictionaries47 Questions
Exam 11: Database Control Issues: Security, Backup and Recovery, Concurrency59 Questions
Exam 12: Clientserver Database and Distributed Database56 Questions
Exam 13: The Data Warehouse62 Questions
Exam 14: Database and the Internet45 Questions
Select questions type
With the combination of the logical view and the SQL GRANT command, users either individually or in groups can be restricted to accessing only certain database tables or only certain data within a database table.
(True/False)
4.9/5
(33)
Of the following actions or events that can result in a breach of data security, the one that is not necessarily deliberate is ____.
(Multiple Choice)
4.7/5
(40)
Locks should never be used because of the possibility of deadlock.
(True/False)
4.9/5
(26)
The combination of views and the SQL GRANT command can do all of the following, except ____.
(Multiple Choice)
4.8/5
(29)
All of the following are types of data security (prevention) measures, except ____.
(Multiple Choice)
4.9/5
(31)
All of the following are true about antivirus software, except ____.
(Multiple Choice)
4.8/5
(46)
A basic backup and recovery task is maintaining a disk log or journal of all database data retrieval operations.
(True/False)
4.8/5
(32)
Forward recovery is used to recreate a table that was destroyed.
(True/False)
4.9/5
(39)
A proxy server is firewall software that resides in the Web server.
(True/False)
4.8/5
(38)
All of the following are characteristics of backward recovery, except ____.
(Multiple Choice)
4.9/5
(31)
Of the following choices, the most advisable location for a mainframe computer or a group of servers in a 20 story office building is ____.
(Multiple Choice)
4.9/5
(24)
Data that has been encrypted has to be decrypted to be used again.
(True/False)
5.0/5
(39)
All of the following are good rules for employees to follow for data security purposes, except ____.
(Multiple Choice)
4.8/5
(36)
All of the following are methods of breaching data security, except ____.
(Multiple Choice)
4.9/5
(33)
Backward recovery uses as inputs the log (starting with the last change to the database) and the last backup taken.
(True/False)
4.9/5
(44)
The lost update problem can occur when two people attempt to update the same data simultaneously.
(True/False)
4.9/5
(39)
A computer virus is a malicious piece of software that has the goal of damaging hardware as a means of breaching data security.
(True/False)
4.9/5
(32)
Showing 41 - 59 of 59
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)