Chapter 16: Database Administration and Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

flashcard set

Earn XP

Description and Tags

ch16

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

An enterprise database can be defined as the company's data representation that provides support for all present and expected future operations.

(True/False)

True

2
New cards

Having a computerized DBMS guarantees that the data will be properly used to provide the best solutions required by managers.

(True/False)

False

3
New cards

The DBA interacts with the end user by providing data and information support services to the organization's departments.

(True/False)

True

4
New cards

In the context of database administration, standards are written instructions that describe a series of steps to be followed during the performance of a given activity.

(True/False)

False

5
New cards

The security, privacy, and integrity of data in a database are of minimal concern to DBAs who manage current DBMS installations.

(True/False)

False

6
New cards

Disaster management includes all the end-user activities designed to secure data availability before a physical disaster or a database integrity failure.

(True/False)

False

7
New cards

A full backup, or database dump, produces a complete copy of the entire database.

(True/False)

True

8
New cards

Incremental backups produce a backup of all data.

(True/False)

False

9
New cards

Concurrent backups take place while the user is working on the database.

(True/False)

True

10
New cards

Backups must be clearly identified through detailed descriptions and date information, assuring that the correct backup is used to recover the database.

(True/False)

True

11
New cards

The storage locations for multiple backups must include sites inside and outside the organization.

(True/False)

True

12
New cards

The DBA or security officer must secure an insurance policy to provide financial protection in the event of a database failure.

(True/False)

True

13
New cards

The DBA is responsible for ensuring that the data are distributed to the right persons, at the right time, and in the right format.

(True/False)

True

14
New cards

The DBA must supervise the installation of all software and hardware designated to support the data administration strategy.

(True/False)

True

15
New cards

The DBA function provides data modeling and design services to the end-user community, often through coordination with an application development group within the data-processing department.

(True/False)

True

16
New cards

Testing procedures and standards must already be in place before any application program can be approved for use in the company.

(True/False)

True

17
New cards

System support activities cover all tasks directly related to the day-to-day operations of a DBMS and its applications.

(True/False)

True

18
New cards

A security breach is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

(True/False)

False

19
New cards

A security vulnerability is a collection of standards and policies created to guarantee the security of a system and ensure auditing and compliance.

(True/False)

False

20
New cards

A passive data dictionary is one that is updated automatically with every database access to keep its access information up to date.

(True/False)

False

21
New cards

In the context of the data-information-decision cycle, decisions made by high-level managers trigger actions in an organization's:

lower levels

22
New cards

At the level of middle management, the database must be able to provide _____.

data necessary for tactical decisions and planning

23
New cards

When introducing a database into an organization, the database approach creates a more controlled and structured information flow and thus affects people, functions, and interactions. This leads to a(n) _____ impact of the new database system.

cultural

24
New cards

The person responsible for the control of the centralized and shared database is the database _____.

administrator

25
New cards

Database administration operations are commonly defined and divided according to the phases of the _____.

DBLC

26
New cards

A data administrator is also known as a(n) _____.

information resource manager

27
New cards

The _____ administrator is responsible for strategic planning.

data

28
New cards

Coordinating, monitoring, and allocating database administration resources is included in a DBA's _____ role.

managerial

29
New cards

_____ are more detailed and specific than policies and describe the minimum requirements of a given DBA activity.

Standards

30
New cards

"All users must have passwords" is an example of a _____.

policy

31
New cards

"A password must have a minimum of five characters" is an example of a _____.

standard

32
New cards

Instructions to create a password are an example of a _____.

procedure

33
New cards

In the context of data backup and recovery, the activities of a _____ includes the DBA operations that are classified as disaster management.

database security officer

34
New cards

Which of the following is a reason why a DBMS's daily operations must be clearly documented?

Documentation of the daily operations help pinpoint causes and solutions of database problems.

35
New cards

A(n) _____ plan is a set of instructions generated at application compilation time that predetermines how the application will connect to and communicate with the database at run time.

access

36
New cards

_____ activities cover all tasks directly related to the day-to-day operations of the DBMS and its applications.

System support

37
New cards

_____ deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

Confidentiality

38
New cards

_____ security breaches include database access by computer viruses and by hackers whose actions are designed to destroy or alter data.

Corrupting

39
New cards

When performing user access management, a DBA defines each user to the database at the _____ levels.

operating system and DBMS

40
New cards

User-access management is a subset of _____.

authorization management

41
New cards

In the context of database usage monitoring, a(n) _____ is a file that automatically records a brief description of the database operations performed by all users.

audit log

42
New cards

A(n) _____ data dictionary is automatically updated by the DBMS with every database access.

active

43
New cards

A(n) _____ data dictionary is not updated automatically and usually requires a batch process to be run.

passive

44
New cards

_____ CASE tools provide support for the planning, analysis, and design phases.

Front-end

45
New cards

_____ CASE tools provide support for the coding and implementation phases.

Back-end

46
New cards

The _____ component of a CASE tool produces the information system's input/output formats.

screen painter and report generator

47
New cards

_____ allows for the translation of the company's strategic goals into the data and applications that will help the company achieve those goals.

Information engineering (IE)

48
New cards

In the context of developing a data administration strategy, a(n) _____ provides a framework that includes computerized, automated, and integrated tools such as a DBMS and CASE tools.

information systems architecture

49
New cards

A(n) _____ is a logical storage area in Oracle.

tablespace

50
New cards

One of the important functions provided by the database _____ is to reserve the resources that must be used by the database at run time.

initialization parameters

51
New cards

In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources and metadata to determine patterns, and compares the patterns against standards that the organization has defined.

data-profiling

52
New cards

In the context of an organization's managerial structure, _____ decisions are short term and affect only daily operations - for example, deciding to change the price of a product to clear it from inventory.

operational

53
New cards

In the context of database administration, _____ is the extent to which individuals and organizations have the right to determine the "who, what, when, where, and how" of data usage.

privacy

54
New cards

The _____ aspect of introducing a DBMS in an organization deals with hardware and software changes in the organization.

technological

55
New cards

In the context of the advancements in DBMS technology, the use of _____ data services can free the DBA from many lower-level technology-oriented tasks.

cloud

56
New cards

In case a company installs several incompatible databases and assigns a DBA for each of them, the general coordinator of all such DBAs is known as the _____ administrator.

systems

57
New cards

The _____, also known as the information resource manager (IRM), usually reports directly to top management and is given a higher degree of responsibility and authority than the DBA, although the two roles can overlap.

data administrator

58
New cards

Based on the type of decision-making support required, database users may be classified into: operational, tactical, or _____.

strategic

59
New cards

The DSO's activities are often classified as _____ management, which includes all DBA activities designed to ensure data availability following a physical calamity or a database integrity failure.

disaster

60
New cards

In the context of ensuring integrity of a database, a(n) _____ transaction is one that does not overload the DBMS.

Efficient

61
New cards

The DBA must review the database application design to ensure that transactions are _____, meaning that they mirror real-world events.

correct

62
New cards

Performance monitoring and _____ activities are designed to ensure that the DBMS, utilities, and applications maintain satisfactory performance levels.

tuning

63
New cards

Within the data security framework, _____ is concerned with keeping data consistent and free of errors or anomalies.

integrity

64
New cards

A security _____ is a weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions.

vulnerability

65
New cards

A(n) _____ physically stores the database's data.

datafile

66
New cards

In the context of Oracle Enterprise Manager, a(n) _____ is a uniquely identifiable object that allows a given person to log on to the database.

user

67
New cards

In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of database access privileges that authorize a user to connect to the database and use its system resources.

role

68
New cards

In the context of Oracle Enterprise Manager, a(n) _____ is a named collection of settings that control how much of the database resource a given user can access.

profile

69
New cards

In the context of Oracle Enterprise Manager, "CONNECT" allows a user to connect to the database and then create and modify tables, views, and other data-related objects. This is an example of a(n) _____.

role

70
New cards

Each database has an associated _____ file that is read at instance startup, stores run-time configuration parameters, and is used to set the working environment for the database.

initialization