One of the key responsibilities of a _______________ is to prepare for the possibility of media, hardware and software failure as well as to recover databases during a disaster.
database administrator
GRANT and REVOKE are two types of ___________ commands.
DCL
The purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially ___________ intentions.
malicious
If all data on a database is encrypted by a multitude of different applications then it becomes impossible to index or search data on the database.
True
____________________ will prevent inputting data in the foreign key column that is not listed in the lookup table.
Referential integrity
The ______________________ has all system privileges/
DBA or database administrator
A ____________ key can be accessed by anyone and is unique to one user whereas a ___________ key is a secret key that is unique to and only known by one user.
public; private
When using a relational database, this validation method can help to check entries in certain fields against values in other tables.
Referential Integrity
Which command is used to provide users with database objects?
GRANT
____________ rule property allows the database designer to set a rule, so that data inputted must follow a certain rule.
validation
__________ constraints are used to make certain that a statement about the data is true for all rows in a table.
check
A system privilege allows the user to _____________________ database objects.
CREATE, ALTER, or DROP
When LinkedIn's data was breached, the leaked passwords were encrypted but lacked the __________ feature, where more than just the passwords were encrypted.
salting
Name one of the main types of constraints in SQL.
check
Data mining is the extraction of data.
False
Which of the following is not a best practice for database security?
Be lax on security
It is a good idea to ensure that the default passwords that came with the initial installation of the RDBMS are kept the same.
False
In Application-level encryption, data is encrypted after it is written to the database.
False
The _________ constraint ensures that no two rows have the same values in their columns.
UNIQUE
Database backup and recovery procedures should have a simple backup plan that anyone can execute in the event that the database is hacked.
False
CREATE ANY object
a system privilege that allows users to create the specified object in any schema.
INSERT
an object privilege that allows users to add records of data into a table
SELECT
an object privilege that allows users to select data from a database object
UPDATE
an object privilege that allows users to modify data in a table
EXECUTE
an object privilege that allows users to execute a stored procedure or function