DBMS 110 M08 Quiz

One of the key responsibilities of a _______________ is to prepare for the possibility of media, hardware and software failure as well as to recover databases during a disaster.

database administrator

GRANT and REVOKE are two types of ___________ commands.

DCL

The purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially ___________ intentions.

malicious

If all data on a database is encrypted by a multitude of different applications then it becomes impossible to index or search data on the database.

True

____________________ will prevent inputting data in the foreign key column that is not listed in the lookup table.

Referential integrity

The ______________________ has all system privileges/

DBA or database administrator

A ____________ key can be accessed by anyone and is unique to one user whereas a ___________ key is a secret key that is unique to and only known by one user.

public; private

When using a relational database, this validation method can help to check entries in certain fields against values in other tables.

Referential Integrity

Which command is used to provide users with database objects?

GRANT

____________ rule property allows the database designer to set a rule, so that data inputted must follow a certain rule.

validation

__________ constraints are used to make certain that a statement about the data is true for all rows in a table.

check

A system privilege allows the user to _____________________ database objects.

CREATE, ALTER, or DROP

When LinkedIn's data was breached, the leaked passwords were encrypted but lacked the __________ feature, where more than just the passwords were encrypted.

salting

Name one of the main types of constraints in SQL.

check

Data mining is the extraction of data.

False

Which of the following is not a best practice for database security?

Be lax on security

It is a good idea to ensure that the default passwords that came with the initial installation of the RDBMS are kept the same.

False

In Application-level encryption, data is encrypted after it is written to the database.

False

The _________ constraint ensures that no two rows have the same values in their columns.

UNIQUE

Database backup and recovery procedures should have a simple backup plan that anyone can execute in the event that the database is hacked.

False

CREATE ANY object

a system privilege that allows users to create the specified object in any schema.

INSERT

an object privilege that allows users to add records of data into a table

SELECT

an object privilege that allows users to select data from a database object

UPDATE

an object privilege that allows users to modify data in a table

EXECUTE

an object privilege that allows users to execute a stored procedure or function