Exercise: Data And Database Administration

Questions for: Data And Database Administration

The greatest threat to business security is often internal rather than external.
A:
True
B:
False
C:
D:
Answer: A
No answer description is available. Let's discuss.
A transaction log shows before and after images of records that have been modified by transactions.
A:
True
B:
False
C:
D:
Answer: B
No answer description is available. Let's discuss.
Authorization tables contain highly sensitive data and should be protected by stringent security rules.
A:
True
B:
False
C:
D:
Answer: A
No answer description is available. Let's discuss.
Failure to control confidentiality may lead to loss of competitiveness.
A:
True
B:
False
C:
D:
Answer: A
No answer description is available. Let's discuss.
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
A:
True
B:
False
C:
D:
Answer: A
No answer description is available. Let's discuss.
Ad Slot (Above Pagination)
Quiz