| < Free Open Study > |
|
1. | Which of the following types of databases supports the multi-parent concept?
|
|
2. | Which of the following best describes cardinality?
|
|
3. | Which type of agents can roam networks, make copies of themselves, and gather information?
|
|
4. | Which type of urgent update is released to repair bugs quickly?
|
|
5. | Which type of storage is used to create virtual memory?
|
|
6. | Which of the following is an incorrect matching of database terms?
|
|
7. | Which of the following methods is not used to fight inference attacks?
|
|
8. | Denormalization can have an adverse effect on which aspect of data?
|
|
9. | Which of the following is a tool used in Customer Relationship Management (CRM) techniques to find patterns in online behavior?
|
|
10. | In an MLS-based system, which of the following describes a threat exposed by linking high-classification data to low-classification data?
|
|
11. | Which process translates programming code one command at a time?
|
|
12. | Why is accreditation a necessary step before certification?
|
|
13. | Which type of programming language must all other languages ultimately be translated into?
|
|
14. | Which of the following defines the process of accessing high-level information by merging collections of low-level data?
|
|
15. | In a database, attributes are represented as ______.
|
|
16. | During the SDLC, which phase needs to be documented fully?
|
|
17. | Which database security mechanism prevents a database from displaying certain data to specific users or groups?
|
|
Answers
1. | Correct answer = A Children in network databases can have multiple parents. The hierarchical model has children with only one parent. Relational databases don't use the parent-child approach to making relationships. Flat databases also do not use the parent-child approach to making relationships. Data mining is a process that extracts trends and patterns from a data warehouse. |
2. | Correct answer = D Cardinality is the number of rows (or tuples) in a relation. Answers A, B, C, and E are invalid. |
3. | Correct answer = E Opposed to static agents, mobile agents can copy themselves, roam networks, and gather information. These characteristics enable mobile agents to do things such as deliver viruses. Answers A, B, C, and D are invalid. |
4. | Correct answer = B Hot-fixes are released when a quick remedy is needed for a bug. Upgrades indicate a shift in product versions as in 4.2 to 5.0. Service packs are collections of fully tested hot fixes and other utilities/updates. Answers C and E are invalid. |
5. | Correct answer = A Secondary storage devices such as HDDs are used to create virtual memory, which enables a system to run large applications that its primary storage area doesn't have the capacity for. Primary storage is the physical memory of a computer. Sequential storage refers to tapes or other storage devices that are periodically referenced. Real storage refers to the resident areas of memory that applications are assigned. Answer C is invalid. |
6. | Correct answer = E From traditional database terminology, records are synonymous with rows and tuples, not attributes. Refer to Table 7.1 to see that answers A, B, C, and D represent proper match-ups of interchangeable database terminology. |
7. | Correct answer = A Abstraction is the process of classifying objects in object-oriented programming. Perturbation and noise are synonymous terms for the process of inserting phony data into a database to fight inference attacks. Polyinstantiation combats inference attacks by inserting multiple instances of data into a database with different security levels. Partitioning protects against inference attacks by splitting a database into multiple parts. |
8. | Correct answer = C Denormalization can affect data integrity because it introduces the duplication of data into a database. Denormalization is not related to data confidentiality and its purpose is actually to reduce the time it takes to access data, which is a positive effect. Answers A and E are invalid. |
9. | Correct answer = B Web mining employs content, usage, and structure mining to uncover trends in online behavior. ODBMS is an object-oriented database management system. CORBA is an object request broker. Answers A and C are invalid. |
10. | Correct answer = B A covert channel is an exposed link between high-classification data and low-classification data. A security label specifies the security classification of an object. A security policy defines security labels. Mandatory access control is an authentication method. Answer E is invalid. |
11. | Correct answer = B Interpretation translates programming code one command at a time as in Java interpretation. A relation is a table of rows and columns in a relational database Decryption is the cryptographic process of decoding cipher text. Compilation translates programming code into a compiled executable all at once. Answer D is invalid. |
12. | Correct answer = E Certification actually comes before accreditation. The end goal of the certification/ accreditation process is to attain an approval to operate. Answers A, B, C, and D are invalid. |
13. | Correct answer = C Machine code is the 'native tongue' of computers and all other programming languages must eventually be translated into binary machine code. Logic bombs, a type of malicious program, contain slag code. Assembly code is programming language that uses symbols instead of raw binary data and it must be assembled into machine code. Programming in the high-level language of Java produces Java code. Object code is an OOP term. |
14. | Correct answer = A Aggregation is a condition where a combined assortment of low-level access rights provides access to information of a higher sensitivity. Polyinstantiation combats inference attacks by inserting multiple instances of data into a database with different security levels. Abstraction is the process of classifying objects in object-oriented programming. Answer E is invalid. |
15. | Correct answer = C Attributes, which describe an object or entity in a database, are represented as vertical named columns. Tuples are represented as horizontal named rows. Answers A, B, and E are invalid. |
16. | Correct answer = E During the SDLC, every step of the way should be fully documented. This includes all phases. Therefore, answers A, B, C, and D are all correct. |
17. | Correct answer = B Views are used to control who can change or view individual elements of a database-they can be set for individual users or entire groups. Filters are criteria used to include (or exclude) specific information in the results of a database query. Queries are commands used to fetch and display requested information from a database. A degree specifies the number of attributes in a relation. Metadata is data about a database. |
| < Free Open Study > |
|