MNSU CIS 440 Fall 2020 Quiz 4

Descripción

Quiz 4 given during Fall 2020 for CIS 440 at Minnesota State University, Mankato.
Kyle Peterson
Test por Kyle Peterson, actualizado hace más de 1 año
Kyle Peterson
Creado por Kyle Peterson hace más de 3 años
6
0

Resumen del Recurso

Pregunta 1

Pregunta
Cursors are created using the DECLARE statement.
Respuesta
  • True
  • False

Pregunta 2

Pregunta
What are the common threats to database security?
Respuesta
  • Disgruntled employees
  • Natural disasters
  • Technical failures
  • Poor physical security
  • b, c, and d
  • All of the above

Pregunta 3

Pregunta
Which law regulates the privacy and security of healthcare data?
Respuesta
  • HIPPA
  • FERPA
  • GLB
  • Patriot Act

Pregunta 4

Pregunta
Which law regulates privacy and security of student data?
Respuesta
  • HIPPA
  • FERPA
  • GLB
  • Patriot Act

Pregunta 5

Pregunta
The following method actually creates a new table when you insert data into a table.
Respuesta
  • INSERT INTO
  • SELECT INTO
  • UPDATE
  • None of the above

Pregunta 6

Pregunta
Which one of the following changes the structure of the database?
Respuesta
  • UPDATE
  • ALTER
  • CHANGE
  • RENAME

Pregunta 7

Pregunta
Unlike stored procedures, triggers are executed only when a user or application attempts to modify data.
Respuesta
  • True
  • False

Pregunta 8

Pregunta
Which one is the most common type of trigger?
Respuesta
  • AFTER
  • INSTEAD OF
  • CLR
  • BEFORE

Pregunta 9

Pregunta
What do triggers enforce?
Respuesta
  • Data integrity
  • Referential integrity
  • Business Rules
  • All of the above
  • a and b only

Pregunta 10

Pregunta
Which one of the following is not generally classified as "restricted data" in public organizations?
Respuesta
  • Aggregate crime incidence data
  • Social Security numbers
  • Identifiable human subject research data
  • Credit card data
  • None of the above as all are examples of restricted data

Pregunta 11

Pregunta
An organization should avoid disclosing an incidence of public data breach.
Respuesta
  • True
  • False

Pregunta 12

Pregunta
Which one of the following is NOT related to protecting data centers physically?
Respuesta
  • Video surveillance system
  • Environmental monitoring
  • Theft mitigation system
  • Firewalls

Pregunta 13

Pregunta
A special local network configuration designed to improve security by segregating computers on each side of a firewall is called _________.
Respuesta
  • Firewall perimeter
  • IDS
  • DMZ
  • Extranet

Pregunta 14

Pregunta
Which law is related to protecting credit card data?
Respuesta
  • HIPPA
  • FERPA
  • PCI-DSS
  • GLB

Pregunta 15

Pregunta
Which transaction property ensures that the schedule for the concurrent execution of several transactions should yield consistent results?
Respuesta
  • Atomicity
  • Consistency
  • Isolation
  • Durability
  • Serializability

Pregunta 16

Pregunta
Which one is a special DBMS table that contains a description of all the database transactions by the DBMS?
Respuesta
  • tempdb
  • master
  • scheduler
  • transaction log

Pregunta 17

Pregunta
If concurrency control is not maintained, which one of the following problems is least likely to occur?
Respuesta
  • Lost updates
  • Uncommitted date
  • Inconsistent retrievals
  • Database login issues

Pregunta 18

Pregunta
Which lock granularity is meant for a disk block of fixed size?
Respuesta
  • Table-Level
  • Database-Level
  • Page-Level
  • Field-Level

Pregunta 19

Pregunta
Which lock granularity is less likely to negatively affect concurrency of the database?
Respuesta
  • Database-Level
  • Table-Level
  • Field-Level
  • Page-Level

Pregunta 20

Pregunta
Which one of the following is NOT true about data lakes?
Respuesta
  • They are meant for primarily unstructured data.
  • They require schema on write.
  • They need distributed file system.
  • None of the above

Pregunta 21

Pregunta
Which one of the following is true about data warehouses?
Respuesta
  • They require schema on write.
  • They require schema on read.
  • They are schema-less.
  • They are key-value pairs.

Pregunta 22

Pregunta
Which one of the following statements is NOT true about data warehouses (DWs)?
Respuesta
  • They are historical repository of data.
  • They use normalization to reduce data duplication.
  • Batch updates are common with DWs.
  • They use the multi-dimensional cubes to store data.

Pregunta 23

Pregunta
The smallest detail in a warehouse is known as:
Respuesta
  • dimension
  • fact
  • grain
  • key-value pair

Pregunta 24

Pregunta
A historical data repository for marketing data:
Respuesta
  • data warehouse
  • data lake
  • data mart
  • metadata

Pregunta 25

Pregunta
Which one of the following is focused on consistent data definitions across an organization?
Respuesta
  • Master data
  • Metedata
  • Grain
  • Fact

Pregunta 26

Pregunta
The change of customer address is an example of the following type dimension in a DW.
Respuesta
  • SCD 0
  • SCD 1
  • SCD 2
  • SCD 25

Pregunta 27

Pregunta
The fact table maintains one-to-many relations with all the dimension tables in:
Respuesta
  • snowflake schema
  • star schema
  • galaxy schema
  • star cluster schema

Pregunta 28

Pregunta
Which module in the SQL Server is used for creating OLAP cubes?
Respuesta
  • SQL Server MDM
  • SQL Server Analysis Services
  • SQL Server Integration Services
  • SQL Server Data Transformation Services (DTS)
  • SQL Server Reporting Services

Pregunta 29

Pregunta
Which one of the following statements is INCORRECT?
Respuesta
  • If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with an asymmetric key.
  • If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with a symmetric key.
  • If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with a symmetric key.
  • If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with an asymmetric key.

Pregunta 30

Pregunta
Only full backups are available for the master database.
Respuesta
  • True
  • False

Pregunta 31

Pregunta
According to the rules of precedence, which of the following computations should be completed first?
Respuesta
  • performing additions and subtractions
  • performing multiplications and divisions
  • performing operations within parentheses
  • performing power operations

Pregunta 32

Pregunta
Which one of the following is NOT true about indexes?
Respuesta
  • Too many indexes can result in a slow database response.
  • When a table is updated, the indexes will need to be updated.
  • Indexes make the retrieval of data faster and efficient in most cases.
  • Indexes reside in the same file that has the associated table.

Pregunta 33

Pregunta
The top node of the B-tree index is called:
Respuesta
  • Leaf node
  • Root node
  • Index node
  • Intermediate node

Pregunta 34

Pregunta
Clustered indexes are NOT a good choice for the following attributes.
Respuesta
  • Attributes that are unique or contain many distinct values.
  • Attributes that need to be accessed sequentially.
  • Attributes that undergo frequent changes.
  • Attributes that are frequently used to sort the data retrieved from a table.

Pregunta 35

Pregunta
How many non-clustered indexes per table are allowed in SQL Server?
Respuesta
  • 1
  • 99
  • 999
  • Unlimited
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Translations and transformations of functions
Christine Laurich
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler