Kyle Peterson
Quiz by , created more than 1 year ago

Quiz 4 given during Fall 2020 for CIS 440 at Minnesota State University, Mankato.

6
0
0
Kyle Peterson
Created by Kyle Peterson almost 4 years ago
Close

MNSU CIS 440 Fall 2020 Quiz 4

Question 1 of 35

1

Cursors are created using the DECLARE statement.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 35

1

What are the common threats to database security?

Select one of the following:

  • Disgruntled employees

  • Natural disasters

  • Technical failures

  • Poor physical security

  • b, c, and d

  • All of the above

Explanation

Question 3 of 35

1

Which law regulates the privacy and security of healthcare data?

Select one of the following:

  • HIPPA

  • FERPA

  • GLB

  • Patriot Act

Explanation

Question 4 of 35

1

Which law regulates privacy and security of student data?

Select one of the following:

  • HIPPA

  • FERPA

  • GLB

  • Patriot Act

Explanation

Question 5 of 35

1

The following method actually creates a new table when you insert data into a table.

Select one of the following:

  • INSERT INTO

  • SELECT INTO

  • UPDATE

  • None of the above

Explanation

Question 6 of 35

1

Which one of the following changes the structure of the database?

Select one of the following:

  • UPDATE

  • ALTER

  • CHANGE

  • RENAME

Explanation

Question 7 of 35

1

Unlike stored procedures, triggers are executed only when a user or application attempts to modify data.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 35

1

Which one is the most common type of trigger?

Select one of the following:

  • AFTER

  • INSTEAD OF

  • CLR

  • BEFORE

Explanation

Question 9 of 35

1

What do triggers enforce?

Select one of the following:

  • Data integrity

  • Referential integrity

  • Business Rules

  • All of the above

  • a and b only

Explanation

Question 10 of 35

1

Which one of the following is not generally classified as "restricted data" in public organizations?

Select one of the following:

  • Aggregate crime incidence data

  • Social Security numbers

  • Identifiable human subject research data

  • Credit card data

  • None of the above as all are examples of restricted data

Explanation

Question 11 of 35

1

An organization should avoid disclosing an incidence of public data breach.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 35

1

Which one of the following is NOT related to protecting data centers physically?

Select one of the following:

  • Video surveillance system

  • Environmental monitoring

  • Theft mitigation system

  • Firewalls

Explanation

Question 13 of 35

1

A special local network configuration designed to improve security by segregating computers on each side of a firewall is called _________.

Select one of the following:

  • Firewall perimeter

  • IDS

  • DMZ

  • Extranet

Explanation

Question 14 of 35

1

Which law is related to protecting credit card data?

Select one of the following:

  • HIPPA

  • FERPA

  • PCI-DSS

  • GLB

Explanation

Question 15 of 35

1

Which transaction property ensures that the schedule for the concurrent execution of several transactions should yield consistent results?

Select one of the following:

  • Atomicity

  • Consistency

  • Isolation

  • Durability

  • Serializability

Explanation

Question 16 of 35

1

Which one is a special DBMS table that contains a description of all the database transactions by the DBMS?

Select one of the following:

  • tempdb

  • master

  • scheduler

  • transaction log

Explanation

Question 17 of 35

1

If concurrency control is not maintained, which one of the following problems is least likely to occur?

Select one of the following:

  • Lost updates

  • Uncommitted date

  • Inconsistent retrievals

  • Database login issues

Explanation

Question 18 of 35

1

Which lock granularity is meant for a disk block of fixed size?

Select one of the following:

  • Table-Level

  • Database-Level

  • Page-Level

  • Field-Level

Explanation

Question 19 of 35

1

Which lock granularity is less likely to negatively affect concurrency of the database?

Select one of the following:

  • Database-Level

  • Table-Level

  • Field-Level

  • Page-Level

Explanation

Question 20 of 35

1

Which one of the following is NOT true about data lakes?

Select one of the following:

  • They are meant for primarily unstructured data.

  • They require schema on write.

  • They need distributed file system.

  • None of the above

Explanation

Question 21 of 35

1

Which one of the following is true about data warehouses?

Select one of the following:

  • They require schema on write.

  • They require schema on read.

  • They are schema-less.

  • They are key-value pairs.

Explanation

Question 22 of 35

1

Which one of the following statements is NOT true about data warehouses (DWs)?

Select one of the following:

  • They are historical repository of data.

  • They use normalization to reduce data duplication.

  • Batch updates are common with DWs.

  • They use the multi-dimensional cubes to store data.

Explanation

Question 23 of 35

1

The smallest detail in a warehouse is known as:

Select one of the following:

  • dimension

  • fact

  • grain

  • key-value pair

Explanation

Question 24 of 35

1

A historical data repository for marketing data:

Select one of the following:

  • data warehouse

  • data lake

  • data mart

  • metadata

Explanation

Question 25 of 35

1

Which one of the following is focused on consistent data definitions across an organization?

Select one of the following:

  • Master data

  • Metedata

  • Grain

  • Fact

Explanation

Question 26 of 35

1

The change of customer address is an example of the following type dimension in a DW.

Select one of the following:

  • SCD 0

  • SCD 1

  • SCD 2

  • SCD 25

Explanation

Question 27 of 35

1

The fact table maintains one-to-many relations with all the dimension tables in:

Select one of the following:

  • snowflake schema

  • star schema

  • galaxy schema

  • star cluster schema

Explanation

Question 28 of 35

1

Which module in the SQL Server is used for creating OLAP cubes?

Select one of the following:

  • SQL Server MDM

  • SQL Server Analysis Services

  • SQL Server Integration Services

  • SQL Server Data Transformation Services (DTS)

  • SQL Server Reporting Services

Explanation

Question 29 of 35

1

Which one of the following statements is INCORRECT?

Select one of the following:

  • If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with an asymmetric key.

  • If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with a symmetric key.

  • If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with a symmetric key.

  • If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with an asymmetric key.

Explanation

Question 30 of 35

1

Only full backups are available for the master database.

Select one of the following:

  • True
  • False

Explanation

Question 31 of 35

1

According to the rules of precedence, which of the following computations should be completed first?

Select one of the following:

  • performing additions and subtractions

  • performing multiplications and divisions

  • performing operations within parentheses

  • performing power operations

Explanation

Question 32 of 35

1

Which one of the following is NOT true about indexes?

Select one of the following:

  • Too many indexes can result in a slow database response.

  • When a table is updated, the indexes will need to be updated.

  • Indexes make the retrieval of data faster and efficient in most cases.

  • Indexes reside in the same file that has the associated table.

Explanation

Question 33 of 35

1

The top node of the B-tree index is called:

Select one of the following:

  • Leaf node

  • Root node

  • Index node

  • Intermediate node

Explanation

Question 34 of 35

1

Clustered indexes are NOT a good choice for the following attributes.

Select one of the following:

  • Attributes that are unique or contain many distinct values.

  • Attributes that need to be accessed sequentially.

  • Attributes that undergo frequent changes.

  • Attributes that are frequently used to sort the data retrieved from a table.

Explanation

Question 35 of 35

1

How many non-clustered indexes per table are allowed in SQL Server?

Select one of the following:

  • 1

  • 99

  • 999

  • Unlimited

Explanation