CHAPTER 16: DATABASE ADMINISTRATION AND SECURITY

Description

CIS 3365 Flashcards on CHAPTER 16: DATABASE ADMINISTRATION AND SECURITY, created by Miguel Lucero on 21/03/2017.
Miguel Lucero
Flashcards by Miguel Lucero, updated more than 1 year ago
Miguel Lucero
Created by Miguel Lucero about 8 years ago
71
1
1 2 3 4 5 (0)

Resource summary

Question Answer
1. The DBMS must provide tools that give each level of management a useful view of the data and support the required level of decision-making. a. True b. False ANSWER: True
2. An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations. a. True b. False ANSWER: True
3. Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers. a. True b. False ANSWER: False
4. The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization. a. True b. False ANSWER: True
5. When an organization employs both a DA and a DBA, the DA's job has a technical orientation, whereas the DBA's job has a managerial orientation. a. True b. False ANSWER: False
6. The DBA interacts with the end user by providing data and information support services to the organization’s departments. a. True b. False ANSWER: True
7. In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity. a. True b. False ANSWER: False
8. The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations. a. True b. False ANSWER: False
9. Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure. a. True b. False ANSWER: False
10. A full backup, or database dump, produces a complete copy of the entire database. a. True b. False ANSWER: True
11. Incremental backups produce a backup of all data. a. True b. False ANSWER: False
12. Concurrent backups take place while the user is working on the database. a. True b. False Answer: True
13. Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database. a. True b. False ANSWER: True
14. The storage locations for multiple backups must include sites inside and outside the organization. a. True b. False ANSWER: True
15. The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure. a. True b. False ANSWER: True
16. The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format. a. True b. False ANSWER: True
17. The DBA must supervise the installation of all software and hardware designated to support the data administration strategy. a. True b. False ANSWER: True
18. The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department. a. True b. False ANSWER: True
19. Testing procedures and standards must already be in place before any application program can be approved for use in the company. a. True b. False ANSWER: True
20. System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications. a. True b. False ANSWER: True
21. Training people to use the DBMS and its tools is not included in the responsibilities of a DBA. a. True b. False ANSWER: False
22. The maintenance activities of the DBA are an extension of the operational activities. a. True b. False ANSWER: True
23. A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions. a. True b. False ANSWER: False
24. Security breaches can yield a database whose integrity is either preserved or corrupted. a. True b. False ANSWER: True
25. In the context of database security measures, enforcing complex password policies will address the security vulnerabilities of the operating system component. a. True b. False ANSWER: False
26. Protecting the security and integrity of a database is a function of authorization management. a. True b. False ANSWER: True
27. When performing user access management, a DBA assigns passwords to each user at both the operating system and DBMS levels. a. True b. False ANSWER: True
28. The DBA can use an audit log to automatically record a brief description of the database operations performed by the users. a. True b. False ANSWER: True
29. A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date. a. True b. False ANSWER: False
30. In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's: a. Lower levels b. top levels c. target markets d. customer base a. Lower levels
31. At the level of middle management, the database must be able to . a. provide a framework for defining and enforcing organizational policies b. provide the data necessary for tactical decisions and planning c. provide feedback to monitor whether a company is achieving its goals d. provide access to external and internal data to identify growth opportunities b. provide the data necessary for tactical decisions and planning
32. When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) impact of the new database system. a. cultural b. managerial c. technical d. operational a. cultural
33. The person responsible for the control of the centralized and shared database is the database . a. analyst b. administrator c. programmer d. user b. administrator
34. Database administration operations are commonly defined and divided according to the phases of the . a. SLA b. DBLC c. SDLC d. MRA b. DBLC
35. A data administrator is also known as a(n) . a. data security officer b. systems administrator c. information resource manager d. information engineering officer c. information resource manager
36. The administrator is responsible for strategic planning. a. system b. data c. database d. program b. data
37. Coordinating, monitoring, and allocating database administration resources is included in a DBA's role. a. operative b. arbitration c. technical d. managerial d. managerial
38. are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. a. Guidelines b. Standards c. Procedures d. Documentations b. Standards
39. “All users must have passwords” is an example of a . a. rule b. policy c. standard d. procedure b. policy
40. A password must have a minimum of five characters” is an example of a . a. policy b. rule c. procedure d. standard d. standard
41. Instructions to create a password are an example of a . a. rule b. policy c. standard d. procedure d. procedure
42. In the context of data backup and recovery, the activities of a includes the DBA operations that are classified as disaster management. a. database programmer b. systems analyst c. data administrator d. database security officer d. database security officer
43. Which of the following is a reason why a DBMS's daily operations must be clearly documented? a. Documentation of the daily operations help a company set its long-term goals. b. Documentation of the daily operations help manage the manual data resources of a company. c. Documentation of the daily operations help pinpoint causes and solutions of database problems. d. Documentation of the daily operations help free the DBA from many lower-level technology-oriented tasks. c. Documentation of the daily operations help pinpoint causes and solutions of database problems.
44. A(n) plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time. a. access b. completion c. application d. communications a. access
45. _____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications. a. Backup and recovery b. System support c. Performance monitoring and tuning d. Security auditing and monitoring b. System support
46. _____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. a. Integrity b. Compliance c. Availability d. Confidentiality d. Confidentiality
47. security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. a. Debilitative b. Preserving c. Corrupting d. Destructive c. Corrupting
48. When performing user access management, a DBA defines each user to the database at the levels. a. application and DBMS b. operating system and DBMS c. operating system and application d. application and network b. operating system and DBMS
49. User-access management is a subset of . a. password protection b. authorization management c. data integrity management d. managerial control b. authorization management
50. In the context of database usage monitoring, a(n) is a file that automatically records a brief description of the database operations performed by all users. a. change tracker b. digital footprint c. paper trail d. audit log d. audit log
51. A(n) data dictionary is automatically updated by the DBMS with every database access. a. dynamic b. active c. passive d. static b. active
52. A(n) data dictionary is not updated automatically and usually requires a batch process to be run. a. active b. passive c. static d. dynamic ANSWER:
53. CASE tools provide support for the planning, analysis, and design phases. a. Front-end b. Back-end c. Vertical d. Horizontal ANSWER:
54. CASE tools provide support for the coding and implementation phases. a. Front-end b. Back-end c. Vertical d. Horizontal b. Back-end
55. The component of a CASE tool produces the information system’s input/output formats. a. analysis b. graphics c. program document generator d. screen painter and report generator d. screen painter and report generator
56. allows for the translation of the company’s strategic goals into the data and applications that will help the company achieve those goals. a. Access Management b. Business Intelligence c. Information engineering (IE) d. MOLAP c. Information engineering (IE)
57. In the context of developing a data administration strategy, a(n) provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools. a. access plan b. active data dictionary c. information systems architecture d. security policy c. information systems architecture
58. A(n) is a logical storage area in Oracle. a. audit log b. datafile c. schema d. tablespace d. tablespace
59. In the context of the Oracle Enterprise Manager, a(n) is a uniquely identifiable object that allows a given person to log on to the database. a. user b. role c. profile d. client a. user
60. In the context of the Oracle Enterprise Manager, a(n) is a named collection of database access privileges that authorize a user to connect to the database and use the database system resources. a. license b. role c. profile d. quota b. role
61. In the context of the Oracle Enterprise Manager, a is a named collection of settings that control how much of the database resource a given user can use. a. license b. role c. profile d. constraint c. profile
62. One of the important functions provided by the database is to reserve the resources that must be used by the database at run time. a. security component b. authorization manager c. initialization parameters d. administrator c. initialization parameters
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

A level Henry VIII: Foreign policy
avocadolover
AQA GCSE Physics Unit 2.5
Matthew T
BYU English 11 B Speedback
Becky Kopplin
AQA Biology 12.1 cellular organisation
Charlotte Hewson
A View from the Bridge
Mrs Peacock
AQA GCSE Chemistry Unit 3 quiz
Gabi Germain
Health and Social Care
Kelsey Phillips
The Effects of Climate Change
j. stu
Think Python
tsilvo2001
GCSE - Introduction to Economics
James Dodd