Which of the following is part of an administrative policy to secure a database? Limiting particular areas within a building to only authorized people Ensure appropriate responses rates are in external maintenance agreements All of these Authentication policies TRUE ANSWER : ? YOUR ANSWER : ?
The transaction log includes which of the following? The before and after-image of a record The essential data of the record The after-image of a record The before-image of a record TRUE ANSWER : ? YOUR ANSWER : ?
A traditional data administrator performs which of the following roles? Establish backup and recovery procedures Tune database performance Protect the security of the database Resolve data ownership issues TRUE ANSWER : ? YOUR ANSWER : ?
Authorization tables contain highly sensitive data and should be protected by stringent security rules. True False TRUE ANSWER : ? YOUR ANSWER : ?
Backward recovery is used to reverse the changes made by transactions that have aborted, or terminated abnormally. True False TRUE ANSWER : ? YOUR ANSWER : ?
Failure to control confidentiality may lead to loss of competitiveness. False True TRUE ANSWER : ? YOUR ANSWER : ?
Mirrored databases are almost always provided in high-availability systems. True False TRUE ANSWER : ? YOUR ANSWER : ?
A transaction log shows before and after images of records that have been modified by transactions. True False TRUE ANSWER : ? YOUR ANSWER : ?
The restore/rerun technique involves reprocessing the day's transactions up to the point of failure. True False TRUE ANSWER : ? YOUR ANSWER : ?