Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Fundamentals of Database Management Systems
Quiz 11: Database Control Issues: Security, Backup and Recovery, Concurrency
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Passwords should appear on the terminal screen when they are typed in.
Question 22
Multiple Choice
All of the following are true about deadlock, except ____.
Question 23
True/False
With the combination of the logical view and the SQL GRANT command, users either individually or in groups can be restricted to accessing only certain database tables or only certain data within a database table.
Question 24
True/False
A computer virus is a malicious piece of software that has the goal of damaging hardware as a means of breaching data security.
Question 25
True/False
Data that has been encrypted has to be decrypted to be used again.
Question 26
Multiple Choice
The lost update problem can occur when ____.
Question 27
Multiple Choice
All of the following are disaster recovery tools or techniques, except ____.
Question 28
True/False
The SQL GRANT command is used both to control access to the database and to retrieve data.
Question 29
True/False
A computer virus attack is the computer version of the old concept of "wiretapping."
Question 30
True/False
Stealing disks is a method of breaching computer security.
Question 31
True/False
Unauthorized data access and unauthorized data modification are two types of data security breaches.
Question 32
True/False
Controlled access to the computer system is a method of breaching security.
Question 33
True/False
Passwords should not be so difficult to remember that the person herself has to write them down, which is security exposure in itself because someone else could potentially see it.