Data and Database Administration Authorization tables contain highly sensitive data and should be protected by stringent security rules. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Mirrored databases are almost always provided in high-availability systems. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally? Rollforward Rollback Switch to duplicate database Reprocess transactions Rollforward Rollback Switch to duplicate database Reprocess transactions ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration A traditional data administrator performs which of the following roles? Protect the security of the database Resolve data ownership issues Tune database performance Establish backup and recovery procedures Protect the security of the database Resolve data ownership issues Tune database performance Establish backup and recovery procedures ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Failure to control confidentiality may lead to loss of competitiveness. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration The restore/rerun technique involves reprocessing the day's transactions up to the point of failure. True False True False ANSWER DOWNLOAD EXAMIANS APP