CIS 1200 Ch 15 Database Administration and Secuity – Flashcards

Unlock all answers in this set

Unlock answers
question
The introduction of a DBMS represents a big change and challenge, and is likely to have a profound impact throughout the organization.
answer
TRUE
question
A full backup, or database dump, produces a complete copy of the entire database.
answer
TRUE
question
The storage locations for multiple backups must include sites inside and outside the organization.
answer
TRUE
question
The end user's role requires a broad understanding of DBMS functions, configuration, programming languages, data modeling and design methodologies, and so on.
answer
FALSE
question
The end user must provide testing and evaluation services for all the database and DBA applications.
answer
FALSE
question
Training people to use the DBMS and its tools is not included in the DBA's technical activities.
answer
FALSE
question
The DBA must define data views to protect and control the scope of the data that are accessible to an authorized user.
answer
TRUE
question
A DBMS facilitates ____. interpretation and presentation of data in useful formats destruction of data and information to the right people at the right time data presentation and data usage monitoring for adequate periods of time automatic auditing of all data changes
answer
interpretation and presentation of data in useful formats
question
At the level of middle management, the database must be able to ____. represent and support the company operations as closely as possible deliver the data necessary for tactical decisions and planning produce query results within specified performance levels provide access to external and internal data to identify growth opportunities and to chart the direction of such growth
answer
deliver the data necessary for tactical decisions and planning
question
The person responsible for the control of the centralized and shared database is the database ____. analyst administrator programmer user
answer
administrator
question
It is common practice to define the DBA function by dividing the DBA operations according to the ____ phases. SLA DBLC SDLC MRA
answer
DBLC
question
There is a growing trend toward ____ in the data-management function. cross-training encapsulation specialization centralization
answer
specialization
question
The DBA's ____ role is focused on personnel management and on interactions with the end-user community. administrative arbitration technical managerial
answer
managerial
question
As a manager, the DBA must concentrate on the ____ dimensions of the database administration function. control and planning conflict and problem-resolution policies and standards security and privacy
answer
control and planning
question
The DBA's ____ role covers activities involving the use of the DBMS. administrative arbitration technical managerial
answer
technical
question
____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity. Guidelines Standards Procedures Documentation
answer
Standards
question
____ are written instructions that describe a series of steps to be followed during the performance of a given activity. Policies Standards Documentation Procedures
answer
Procedures
question
"All users must have passwords" is an example of a ____. rule policy standard procedure
answer
policy
question
The ____ is responsible for ensuring database security and integrity. database programmer systems analyst data administrator database security officer
answer
database security officer
question
Procedures and standards must be revised at least ____ to keep them up-to-date. weekly monthly every six months annually
answer
annually
question
Current data distribution philosophy makes it easy for ____ end users to access the database. limited unauthorized authorized any
answer
authorized
question
____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications. Backup and recovery System support Performance monitoring and tuning Security auditing and monitoring
answer
System support
question
____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose. Integrity Compliance Availability Confidentiality
answer
Confidentiality
question
____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data. Dangerous Preserving Corrupting Authorized
answer
Corrupting
question
Some common physical security practices found in large database installations include secured entrances, password-protected workstations, ____, closed-circuit video, and voice-recognition technology. drug testing fingerprinting electronic personnel badges retina scans
answer
electronic personnel badges
question
User-access management is a subset of ____. password protection authorization management data integrity managerial control
answer
authorization management
question
Classifying users into ____ according to common access needs facilitates the DBA's job of controlling and managing the access privileges of individual users. user groups sections authorization schemes policy definitions
answer
user groups
question
A(n) ____ data dictionary is automatically updated by the DBMS with every database access. dynamic active passive static
answer
active
question
A(n) ____ data dictionary is not updated automatically and usually requires a batch process to be run. active passive static dynamic
answer
passive
question
____ CASE tools provide support for the planning, analysis, and design phases. Front-end Back-end Vertical Horizontal
answer
Front-end
question
The ____ component of a CASE tool produces the information system's input/output formats. analysis graphics program document generator screen painter and report generator
answer
screen painter and report generator
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New