Filters
Question type

Study Flashcards

_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.


A) Debilitative
B) Preserving
C) Corrupting
D) Destructive

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource a given user can access.

Correct Answer

verifed

verified

In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.

Correct Answer

verifed

verified

A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

A) True
B) False

Correct Answer

verifed

verified

User-access management is a subset of _____.


A) password protection
B) authorization management
C) data integrity management
D) managerial control

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users.


A) change tracker
B) digital footprint
C) paper trail
D) audit log

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.

Correct Answer

verifed

verified

In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.

A) True
B) False

Correct Answer

verifed

verified

System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.

A) True
B) False

Correct Answer

verifed

verified

Incremental backups produce a backup of all data.

A) True
B) False

Correct Answer

verifed

verified

"All users must have passwords" is an example of a _____.


A) rule
B) policy
C) standard
D) procedure

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.

Correct Answer

verifed

verified

_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.


A) Integrity
B) Compliance
C) Availability
D) Confidentiality

E) All of the above
F) None of the above

Correct Answer

verifed

verified

_____ CASE tools provide support for the planning, analysis, and design phases.


A) Front-end
B) Back-end
C) Vertical
D) Horizontal

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.

A) True
B) False

Correct Answer

verifed

verified

In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management.


A) database programmer
B) systems analyst
C) data administrator
D) database security officer

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.

Correct Answer

verifed

verified

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.

A) True
B) False

Correct Answer

verifed

verified

When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.


A) cultural
B) managerial
C) technical
D) operational

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 74

Related Exams

Show Answer