06_16 DBA & Security Flashcards

1
Q

A set of instructions generated at application compilation time that is created and managed by a DBMS

A

access plan

The access plan predetermines how an application’s query will access the database at run time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A data dictionary that is automatically updated by the database management system every time the database is accessed, thereby keeping its information current.

A

active data dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security feature of a DBMS that automatically records a brief description of the database operations performed by all users.

A

audit log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A computer-aided software tool that provides support for the coding and implementation phases of the SDLC.

A

back-end CASE tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Activities that meet data privacy and security reporting guidelines or requirements.

A

compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tools used to automate part or all of the SDLC.

A

computer-aided systems engineering (CASE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A backup that takes place while one or more users are working on a database.

A

concurrent backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the context of data security…

Ensuring that data is protected against unauthorized access, and if the data is accessed by an authorized user, that the data is used only for an authorized purpose.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The person responsible for managing the entire data resource.

Whether it is computerized or not.

A

data administrator (DA)
or
information resource manager (IRM)

The DA has broader authority and responsibility than the DBA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A comprehensive approach to ensuring the accuracy, validity, and timeliness of data.

A

data quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The person responsible for planning, organizing, controlling, and monitoring the centralized and shared corporate database.

A

database administrator (DBA)

The DBA is the GM of the database administration department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A complete copy of an entire database saved and periodically updated in a separate memory location.

A

full backup
or
database dump

A full backup ensures a full recovery of all data after a physical disaster or database integrity failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In an Oracle DBMS,

The collection of processes and data structures used to manage a specific database.

A

database instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The use of DBMS features and other related measures to comply with the security requirements of an organization.

A

database security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The person responsible for the security, integrity, backup, recovery of the database.

A

database secuirty officer (DSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A file on the hard drive or storage system where the data in a tablespace is physically stored.

A

datafile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Programs that analyze data and metadata to determine patterns that can help assess data quality.

A

data profiling software

18
Q

Data that contain inaccuracies and/or inconsistencies.

A

dirty data

19
Q

The set of DBA activities dedicated to securing data availability following a physical disaster or a database integrity failure.

A

disaster management

20
Q

The overall company data representation which proviides support for present and expected future needs.

A

enterprise database

21
Q

A computer-aided software tool that provides support for the planning, analysis, and design phases of the SDLC.

A

front-end CASE tool

22
Q

A process that only backs up data that has changed in the database since the last incremental or full backup.

A

incremental backup

23
Q

A methodology that translates a company’s strategic goals into helpful data and applications.

A

information engineering (IE)

IE focuses on the description of corporate data instead of the processes.

24
Q

A department responsible for all information technology services and production functions in an organization.

A

information systems (IS) department

25
Q

The output of the IE process that serves as the basis for planning, developing, and controlling future ISs.

A

information systems architecture (ISA)

26
Q

In a data security framework,

Keeping data consistent and free of errors or anomalies.

A

integrity

See also data integrity.

27
Q

In business intelligence,

A collection of concepts, techniques, and processes for the proper identification, definition, and management of data elements within an organization.

A

master data management (MDM)

28
Q

A DBMS data dictionary that requires a command initiated by an end user to update its data access statistics.

A

passive data dictionary

29
Q

General statement of direction that is used to manage company operations through the communication and support of the organization’s objectives.

A

policy

30
Q

The rights of individuals and organizations to determine access to data about themselves.

A

privacy

31
Q

Series of steps to be followed during the performance of an activity or process.

A

procedure

32
Q

In Oracle,

A named collection of settings that controls how much of the database resource a given user can use.

A

profile

33
Q

In Oracle,

A named collection of database access privileges that authorize a user to connect to a database and use its system resources.

A

role

34
Q

Activities and measures to ensure the CIA of an IS and its main asset, data.

A

security

35
Q

An event in which a security threat is exploited to endanger the CIA of the system.

A

security breach

36
Q

A collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

A

security policy

37
Q

An imminent security violation that could occur due to unchecked security vulnerabilities.

A

security threat

38
Q
A
39
Q

A detailed and specific set of instructions that describes the minimum requirements for a given activity.

A

standard

Standards are used to evaluate the quality of the output.

40
Q

The person responsible for coordinating and performing day-to-day data-processing activities.

A

systems administrator

41
Q

In a DBMS,

A logical storage space used to group related data.

A

tablespace
or
file group

42
Q

In a system,

A uniquely identifiable object that allows a given person or process to log on to the database.

A

user