CIS 1200 Ch 15 Database Administration and Secuity

question

The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
answer

TRUE
question

A full backup, or database dump, produces a complete copy of the entire database.
answer

TRUE
question

The storage locations for multiple backups must include sites inside and outside the organization.
answer

TRUE
question

The end user’s role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
answer

FALSE
question

The end user must provide testing and evaluation services for all the database and DBA applications.
answer

FALSE
question

Training people to use the DBMS and its tools is not included in the DBA’s technical activities.
answer

FALSE
question

The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
answer

TRUE
question

A DBMS facilitates ____. interpretation and presentation of data in useful formats destruction of data and information to the right people at the right time data presentation and data usage monitoring for adequate periods of time automatic auditing of all data changes
answer

interpretation and presentation of data in useful formats
question

At the level of middle management, the database must be able to ____. represent and support the company operations as closely as possible deliver the data necessary for tactical decisions and planning produce query results within specified performance levels provide access to external and internal data to identify growth opportunities and to chart the direction of such growth
answer

deliver the data necessary for tactical decisions and planning
question

The person responsible for the control of the centralized and shared database is the database ____. analyst administrator programmer user
answer

administrator
question

It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases. SLA DBLC SDLC MRA
answer

DBLC
question

There is a growing trend toward ____ in the data-management function. cross-training encapsulation specialization centralization
answer

specialization
question

The DBA’s ____ role is focused on personnel management and on interactions with the end-user community. administrative arbitration technical managerial
answer

managerial
question

As a manager, the DBA must concentrate on the ____ dimensions of the database administration function. control and planning conflict and problem-resolution policies and standards security and privacy
answer

control and planning
question

The DBA’s ____ role covers activities involving the use of the DBMS. administrative arbitration technical managerial
answer

technical
question

____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. Guidelines Standards Procedures Documentation
answer

Standards
question

____ are written instructions that describe a series of steps to be followed during the performance of a given activity. Policies Standards Documentation Procedures
answer

Procedures
question

“All users must have passwords” is an example of a ____. rule policy standard procedure
answer

policy
question

The ____ is responsible for ensuring database security and integrity. database programmer systems analyst data administrator database security officer
answer

database security officer
question

Procedures and standards must be revised at least ____ to keep them up-to-date. weekly monthly every six months annually
answer

annually
question

Current data distribution philosophy makes it easy for ____ end users to access the database. limited unauthorized authorized any
answer

authorized
question

____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications. Backup and recovery System support Performance monitoring and tuning Security auditing and monitoring
answer

System support
question

____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. Integrity Compliance Availability Confidentiality
answer

Confidentiality
question

____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. Dangerous Preserving Corrupting Authorized
answer

Corrupting
question

Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognition technology. drug testing fingerprinting electronic personnel badges retina scans
answer

electronic personnel badges
question

User-access management is a subset of ____. password protection authorization management data integrity managerial control
answer

authorization management
question

Classifying users into ____ according to common access needs facilitates the DBA’s job of controlling and managing the access privileges of individual users. user groups sections authorization schemes policy definitions
answer

user groups
question

A(n) ____ data dictionary is automatically updated by the DBMS with every database access. dynamic active passive static
answer

active
question

A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run. active passive static dynamic
answer

passive
question

____ CASE tools provide support for the planning, analysis, and design phases. Front-end Back-end Vertical Horizontal
answer

Front-end
question

The ____ component of a CASE tool produces the information system’s input/output formats. analysis graphics program document generator screen painter and report generator
answer

screen painter and report generator

Get instant access to
all materials

Become a Member