Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Database Management Quiz All of the following are disaster recovery tools or tec

ID: 422028 • Letter: D

Question

Database Management

Quiz

All of the following are disaster recovery tools or techniques, except ____.

a. totally mirrored systems

b. hot sites

c. cold sites

d. multiple versions

e. reciprocal agreements

QUESTION 3

In Secure Socket Layer (SSL) technology on the World Wide Web ____.

a. the server, using a random number generator, creates a session key, the key for the private key algorithm with which the secure transaction (the actual online shopping) will be conducted

b. the actual online shopping is conducted with a public key algorithm

c. the key with which the actual online shopping will be conducted is transmitted with a private key algorithm

d. the client sends the server its public key for its public key algorithm

e. a public key algorithm is used to transmit the session key for a private key algorithm with which the secure transaction (the actual online shopping) will be conducted

QUESTION 4

All of the following are types of data security breaches, except ____.

a. unauthorized data access

b. unauthorized data modification

c. unauthorized data indexing

d. unauthorized program modification

e. malicious mischief

QUESTION 5

All of the following are good rules for employees to follow for data security purposes, except ____.

a. don t take diskettes or other storage media out of the building

b. avoid using public key encryption because of the insecure nature of transmitting keys

c. don t write your computer password down anywhere

d. don t respond to any unusual requests for information about the computer system from anyone over the telephone

e. logoff your computer or at least lock your office door when you leave your office, even for just a few minutes

QUESTION 6

All of the following are true about computer viruses, except ____.

a. they can travel from one computer to another on electric power lines

b. they can travel from one computer to another on diskettes

c. they can travel from one computer to another on telecommunications lines

d. they are capable of copying themselves

e. some are capable of corrupting data

QUESTION 7

A private key encryption algorithm ____.

a. can be used to encrypt data on a disk but not to encrypt data for transmission over telecommunications lines

b. executes faster than a public key encryption algorithm

c. is asymmetric

d. requires one key for encryption and another key for decryption

e. allows its encryption key to be openly published

QUESTION 8

Of the following actions or events that can result in a breach of data security, the one that is not necessarily deliberate is ____.

a. unauthorized computer access

b. intercepting data communications

c. spreading computer viruses

d. stealing disks or computers

e. damaging computer hardware

QUESTION 9

A biometric security system is associated with ____.

a. something a person knows

b. something a person has

c. some part of a person

d. some item of a person s clothing

e. something a person selects

QUESTION 10

All of the following are true about mirrored databases, except ____.

a. it is not a good idea to have both copies of the database on the same disk

b. two copies of the entire database are maintained and both are updated simultaneously

c. the greater the distance between the two mirrored copies of the database, the greater the security

d. it is a relatively expensive proposition, but allows continuous operation in the event of a disk failure

e. it is an alternative to backward recovery

QUESTION 11

Of the following choices, the most advisable location for a mainframe computer or a group of servers in a 20 story office building is ____.

a. the basement

b. the ground floor

c. floors two through eight

d. floors nine through nineteen

e. the top floor (floor twenty)

QUESTION 12

The combination of views and the SQL GRANT command can do all of the following, except ____.

a. limit access to a table

b. limit access to part of a table

c. restrict access to a table to read-only access

d. restrict access to a table to create a new table

e. restrict access to a table to read-only and update access

QUESTION 13

All of the following are characteristics of forward recovery, except ____.

a. one of the inputs is the last database backup copy

b. one of the inputs is the log starting with the first change to the database after the last backup copy was made

c. one of the inputs is the current database

d. the recovery program makes changes to the backup copy in the same order in which the changes were originally made to the databasein

e. forward recovery is used to recover a destroyed table or database

  

QUESTION 14

All of the following are likely data dictionary entities in the relational database environment, except ____.

a. tables

b. disks

c. queries

d. application programs

e. operational data

a. totally mirrored systems

b. hot sites

c. cold sites

d. multiple versions

e. reciprocal agreements

Explanation / Answer

Q1. All of the mentioned below are disaster recovery tools except multiple versions

The right answer is D)

Q3. SSL uses both asymmetric and symmetric encryption.

The right answer is E) a public key algorithm is used to transmit the session key for a private key algorithm with which the secure transaction (the actual online shopping) will be conducted

Q4. All of the following are types of data security breaches, except unauthorized data indexing

The right answer is C)

Q5. All of the following are good rules for employees to follow for data security purposes, except

Avoid using public key encryption because of the insecure nature of transmitting keys. Transmitting keys are important in order to initiate sessions.

The right answer is B)