Part 5
Which of the following is a type of network security? A) Authentication of the client workstation B) Password naming conventions C) Guidelines for frequency of password changes D) All of the above
A) Authentication of the client workstation
Which of the following functions do cost/benefit models? A) Database planning B) Database analysis C) Database design D) Operations
A) Database planning
Which of the following is a principal type of authorization table? A) Subject B) Transaction C) View D) Index
A) Subject
An open-source DBMS is: A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS. B) a beta release of a commercial RDBMS. C) an object-oriented database management system. D) source code for a commercial RDBMS.
A) a free source-code RBMS that provides the functionality of an SQL-compliant DBMS.
While views promote security by restricting user access to data, they are not adequate security measures because: A) an unauthorized person may gain access to a view through experimentation. B) all users can read any view. C) a view's data does not change. D) none of the above.
A) an unauthorized person may gain access to a view through experimentation.
A device to measure or detect fingerprints or signatures is called a(n) ________ device. A) biometric B) view C) ink D) laser
A) biometric
Guidelines for server security should include all of the following EXCEPT: A) securing the network between client and server. B) guidelines for password lengths. C) password naming conventions. D) guidelines for frequency of password changes.
A) securing the network between client and server.
An organization should have one data warehouse administrator for every: A) 100 users. B) 100 gigabytes of data in the enterprise data warehouse. C) department. D) processor.
B) 100 gigabytes of data in the enterprise data warehouse.
________ is a technical function responsible for database design, security, and disaster recovery. A) Data administration B) Database administration C) Tech support D) Operations
B) Database administration
Which of the following functions model business rules? A) Database planning B) Database analysis C) Database design D) Operations
B) Database analysis
The W3C standard for Web privacy is called: A) the Web privacy act. B) Platform for Privacy Preferences. C) Freedom of Web Information Act. D) the Magna Carta.
B) Platform for Privacy Preferences.
A credit-card sized plastic card with an embedded microprocessor chip with the ability to store, process and output electronic data in a secure manner is called a(n): A) smart chip. B) smart card. C) e-credit card. D) secure card.
B) smart card.
Which of the following threats involves outside parties using information to embarrass a company? A) Accidental loss B) Theft and fraud C) Loss of confidentiality D) Loss of data integrity
C) Loss of confidentiality
Security measures for dynamic Web pages are different from static HTML pages because: A) dynamic Web pages are built "on the fly." B) static Web pages contain more sensitive data. C) the connection requires full access to the database for dynamic pages. D) all of the above.
C) the connection requires full access to the database for dynamic pages.
A data warehouse administrator has which of the following responsibilities? A) Build and administer an environment supportive of decision-support applications B) Build a stable architecture for the data warehouse C) Develop service level agreements with suppliers and consumers of data for the data warehouse D) All of the above
D) All of the above
A trigger can be used as a security measure in which of the following ways? A) To prohibit inappropriate actions B) To cause special handling procedures to be executed C) To cause a row to be written to a log file D) All of the above
D) All of the above
Which of the following is true of poor data and/or database administration? A) Data timing problems B) Multiple entity definitions C) Unknown meanings of stored data D) All of the above
D) All of the above
Which of the following functions develop integrity controls? A) Database planning B) Database analysis C) Database implementation D) Database design
D) Database design
An information repository supplies information to: A) users. B) automated CASE tools. C) database management systems. D) all of the above.
D) all of the above.
Controls designed to restrict access and activities are called: A) schemas. B) business rules. C) encryption controls. D) authorization rules.
D) authorization rules.
A domain is a way to create a structure that acts like a table.
False
Databases are generally the property of a single department within an organization.
False
Loss of data integrity does not impact the quality of data in a database.
False
Open-source software always comes with complete documentation.
False
Specifications for transactions do not need to be reviewed quickly.
False
A trigger can be used for security purposes to prohibit inappropriate actions, such as changing a salary value outside of a business day.
True
A view can be built to present only the data to which a user requires access.
True
Authorization rules are controls incorporated in the data management system that restrict access to data and also restrict the actions that people may take when they access the data.
True
The data administrator takes responsibility for the overall management of data resources.
True
The goal of database security is the protection of data from accidental or intentional threats to its integrity and access.
True
The role of a data warehouse administrator emphasizes integration and coordination of metadata and data across many data sources.
True
The role of database administration is typically a more hands-on, physical involvement with the management of databases.
True