Data and Database Administration Authorization tables contain highly sensitive data and should be protected by stringent security rules. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Information repositories are replacing data dictionaries in many organizations. False True False True ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration The transaction log includes which of the following? The after-image of a record The essential data of the record The before and after-image of a record The before-image of a record The after-image of a record The essential data of the record The before and after-image of a record The before-image of a record ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Mirrored databases are almost always provided in high-availability systems. True False True False ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration Which of the following is part of an administrative policy to secure a database? Ensure appropriate responses rates are in external maintenance agreements Authentication policies All of these Limiting particular areas within a building to only authorized people Ensure appropriate responses rates are in external maintenance agreements Authentication policies All of these Limiting particular areas within a building to only authorized people ANSWER DOWNLOAD EXAMIANS APP
Data and Database Administration A transaction log shows before and after images of records that have been modified by transactions. False True False True ANSWER DOWNLOAD EXAMIANS APP