Exam 15: Database Administration and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The selection of the DBMS ____________________ involves asking the question,"Are the company's needs better served by a relational,object-oriented,or object/relational DBMS?"

(Short Answer)
4.9/5
(40)

"All users must have passwords" is an example of a ____.

(Multiple Choice)
5.0/5
(38)

Some common physical security practices found in large database installations include secured entrances,password-protected workstations,____,closed-circuit video,and voice-recognition technology.

(Multiple Choice)
4.9/5
(33)

The general coordinator of all DBAs is sometimes known as the ____________________ administrator.

(Short Answer)
4.7/5
(32)

A(n)____ plan is a set of instructions generated at application compilation time that predetermines how the application will access the database at run time.

(Multiple Choice)
4.8/5
(32)

System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.

(True/False)
4.8/5
(34)

An access ____________________ describes the type of authorized access.

(Short Answer)
4.7/5
(34)

At the level of middle management,the database must be able to ____.

(Multiple Choice)
4.9/5
(32)

The testing and evaluation of a database application cover all aspects of the system-from the simple collection and creation of data to its use and retirement.What is covered by the evaluation process?

(Essay)
4.9/5
(38)

Describe the need for convenient and safe backup storage.

(Essay)
4.8/5
(36)

Protecting the data in the database is a function of authorization management.

(True/False)
4.8/5
(37)

An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.

(True/False)
4.9/5
(32)

In the IBM DB2 system catalog tables,____________________ stores one row for each column of each table or view.

(Short Answer)
4.9/5
(31)

It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases.

(Multiple Choice)
4.8/5
(35)

Disaster management includes all the end-user activities designed to secure data availability following a physical disaster or a database integrity failure.

(True/False)
4.8/5
(42)

A ____ is a uniquely identifiable object that allows a given person to log on to the database.

(Multiple Choice)
4.8/5
(36)

____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

(Multiple Choice)
4.9/5
(31)

____ are general statements of direction or action that communicate and support DBA goals.

(Multiple Choice)
4.8/5
(33)

The ____ administrator is responsible for strategic planning.

(Multiple Choice)
4.7/5
(39)

The ____________________,also known as the information resource manager (IRM),usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA,although the two roles overlap some.

(Short Answer)
4.7/5
(37)
Showing 21 - 40 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)