Cursors are created using the DECLARE statement.
What are the common threats to database security?
Disgruntled employees
Natural disasters
Technical failures
Poor physical security
b, c, and d
All of the above
Which law regulates the privacy and security of healthcare data?
HIPPA
FERPA
GLB
Patriot Act
Which law regulates privacy and security of student data?
The following method actually creates a new table when you insert data into a table.
INSERT INTO
SELECT INTO
UPDATE
None of the above
Which one of the following changes the structure of the database?
ALTER
CHANGE
RENAME
Unlike stored procedures, triggers are executed only when a user or application attempts to modify data.
Which one is the most common type of trigger?
AFTER
INSTEAD OF
CLR
BEFORE
What do triggers enforce?
Data integrity
Referential integrity
Business Rules
a and b only
Which one of the following is not generally classified as "restricted data" in public organizations?
Aggregate crime incidence data
Social Security numbers
Identifiable human subject research data
Credit card data
None of the above as all are examples of restricted data
An organization should avoid disclosing an incidence of public data breach.
Which one of the following is NOT related to protecting data centers physically?
Video surveillance system
Environmental monitoring
Theft mitigation system
Firewalls
A special local network configuration designed to improve security by segregating computers on each side of a firewall is called _________.
Firewall perimeter
IDS
DMZ
Extranet
Which law is related to protecting credit card data?
PCI-DSS
Which transaction property ensures that the schedule for the concurrent execution of several transactions should yield consistent results?
Atomicity
Consistency
Isolation
Durability
Serializability
Which one is a special DBMS table that contains a description of all the database transactions by the DBMS?
tempdb
master
scheduler
transaction log
If concurrency control is not maintained, which one of the following problems is least likely to occur?
Lost updates
Uncommitted date
Inconsistent retrievals
Database login issues
Which lock granularity is meant for a disk block of fixed size?
Table-Level
Database-Level
Page-Level
Field-Level
Which lock granularity is less likely to negatively affect concurrency of the database?
Which one of the following is NOT true about data lakes?
They are meant for primarily unstructured data.
They require schema on write.
They need distributed file system.
Which one of the following is true about data warehouses?
They require schema on read.
They are schema-less.
They are key-value pairs.
Which one of the following statements is NOT true about data warehouses (DWs)?
They are historical repository of data.
They use normalization to reduce data duplication.
Batch updates are common with DWs.
They use the multi-dimensional cubes to store data.
The smallest detail in a warehouse is known as:
dimension
fact
grain
key-value pair
A historical data repository for marketing data:
data warehouse
data lake
data mart
metadata
Which one of the following is focused on consistent data definitions across an organization?
Master data
Metedata
Grain
Fact
The change of customer address is an example of the following type dimension in a DW.
SCD 0
SCD 1
SCD 2
SCD 25
The fact table maintains one-to-many relations with all the dimension tables in:
snowflake schema
star schema
galaxy schema
star cluster schema
Which module in the SQL Server is used for creating OLAP cubes?
SQL Server MDM
SQL Server Analysis Services
SQL Server Integration Services
SQL Server Data Transformation Services (DTS)
SQL Server Reporting Services
Which one of the following statements is INCORRECT?
If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with an asymmetric key.
If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with a symmetric key.
If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with a symmetric key.
If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with an asymmetric key.
Only full backups are available for the master database.
According to the rules of precedence, which of the following computations should be completed first?
performing additions and subtractions
performing multiplications and divisions
performing operations within parentheses
performing power operations
Which one of the following is NOT true about indexes?
Too many indexes can result in a slow database response.
When a table is updated, the indexes will need to be updated.
Indexes make the retrieval of data faster and efficient in most cases.
Indexes reside in the same file that has the associated table.
The top node of the B-tree index is called:
Leaf node
Root node
Index node
Intermediate node
Clustered indexes are NOT a good choice for the following attributes.
Attributes that are unique or contain many distinct values.
Attributes that need to be accessed sequentially.
Attributes that undergo frequent changes.
Attributes that are frequently used to sort the data retrieved from a table.
How many non-clustered indexes per table are allowed in SQL Server?
1
99
999
Unlimited