MNSU CIS 440 Fall 2020 Quiz 4

Description

Quiz 4 given during Fall 2020 for CIS 440 at Minnesota State University, Mankato.
Kyle Peterson
Quiz by Kyle Peterson, updated more than 1 year ago
Kyle Peterson
Created by Kyle Peterson almost 4 years ago
6
0

Resource summary

Question 1

Question
Cursors are created using the DECLARE statement.
Answer
  • True
  • False

Question 2

Question
What are the common threats to database security?
Answer
  • Disgruntled employees
  • Natural disasters
  • Technical failures
  • Poor physical security
  • b, c, and d
  • All of the above

Question 3

Question
Which law regulates the privacy and security of healthcare data?
Answer
  • HIPPA
  • FERPA
  • GLB
  • Patriot Act

Question 4

Question
Which law regulates privacy and security of student data?
Answer
  • HIPPA
  • FERPA
  • GLB
  • Patriot Act

Question 5

Question
The following method actually creates a new table when you insert data into a table.
Answer
  • INSERT INTO
  • SELECT INTO
  • UPDATE
  • None of the above

Question 6

Question
Which one of the following changes the structure of the database?
Answer
  • UPDATE
  • ALTER
  • CHANGE
  • RENAME

Question 7

Question
Unlike stored procedures, triggers are executed only when a user or application attempts to modify data.
Answer
  • True
  • False

Question 8

Question
Which one is the most common type of trigger?
Answer
  • AFTER
  • INSTEAD OF
  • CLR
  • BEFORE

Question 9

Question
What do triggers enforce?
Answer
  • Data integrity
  • Referential integrity
  • Business Rules
  • All of the above
  • a and b only

Question 10

Question
Which one of the following is not generally classified as "restricted data" in public organizations?
Answer
  • Aggregate crime incidence data
  • Social Security numbers
  • Identifiable human subject research data
  • Credit card data
  • None of the above as all are examples of restricted data

Question 11

Question
An organization should avoid disclosing an incidence of public data breach.
Answer
  • True
  • False

Question 12

Question
Which one of the following is NOT related to protecting data centers physically?
Answer
  • Video surveillance system
  • Environmental monitoring
  • Theft mitigation system
  • Firewalls

Question 13

Question
A special local network configuration designed to improve security by segregating computers on each side of a firewall is called _________.
Answer
  • Firewall perimeter
  • IDS
  • DMZ
  • Extranet

Question 14

Question
Which law is related to protecting credit card data?
Answer
  • HIPPA
  • FERPA
  • PCI-DSS
  • GLB

Question 15

Question
Which transaction property ensures that the schedule for the concurrent execution of several transactions should yield consistent results?
Answer
  • Atomicity
  • Consistency
  • Isolation
  • Durability
  • Serializability

Question 16

Question
Which one is a special DBMS table that contains a description of all the database transactions by the DBMS?
Answer
  • tempdb
  • master
  • scheduler
  • transaction log

Question 17

Question
If concurrency control is not maintained, which one of the following problems is least likely to occur?
Answer
  • Lost updates
  • Uncommitted date
  • Inconsistent retrievals
  • Database login issues

Question 18

Question
Which lock granularity is meant for a disk block of fixed size?
Answer
  • Table-Level
  • Database-Level
  • Page-Level
  • Field-Level

Question 19

Question
Which lock granularity is less likely to negatively affect concurrency of the database?
Answer
  • Database-Level
  • Table-Level
  • Field-Level
  • Page-Level

Question 20

Question
Which one of the following is NOT true about data lakes?
Answer
  • They are meant for primarily unstructured data.
  • They require schema on write.
  • They need distributed file system.
  • None of the above

Question 21

Question
Which one of the following is true about data warehouses?
Answer
  • They require schema on write.
  • They require schema on read.
  • They are schema-less.
  • They are key-value pairs.

Question 22

Question
Which one of the following statements is NOT true about data warehouses (DWs)?
Answer
  • They are historical repository of data.
  • They use normalization to reduce data duplication.
  • Batch updates are common with DWs.
  • They use the multi-dimensional cubes to store data.

Question 23

Question
The smallest detail in a warehouse is known as:
Answer
  • dimension
  • fact
  • grain
  • key-value pair

Question 24

Question
A historical data repository for marketing data:
Answer
  • data warehouse
  • data lake
  • data mart
  • metadata

Question 25

Question
Which one of the following is focused on consistent data definitions across an organization?
Answer
  • Master data
  • Metedata
  • Grain
  • Fact

Question 26

Question
The change of customer address is an example of the following type dimension in a DW.
Answer
  • SCD 0
  • SCD 1
  • SCD 2
  • SCD 25

Question 27

Question
The fact table maintains one-to-many relations with all the dimension tables in:
Answer
  • snowflake schema
  • star schema
  • galaxy schema
  • star cluster schema

Question 28

Question
Which module in the SQL Server is used for creating OLAP cubes?
Answer
  • SQL Server MDM
  • SQL Server Analysis Services
  • SQL Server Integration Services
  • SQL Server Data Transformation Services (DTS)
  • SQL Server Reporting Services

Question 29

Question
Which one of the following statements is INCORRECT?
Answer
  • If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with an asymmetric key.
  • If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with a symmetric key.
  • If you are encrypting lots of data, you should encrypt the data using a symmetric key, and encrypt the symmetric key with a symmetric key.
  • If you are encrypting lots of data, you should encrypt the data using an asymmetric key, and encrypt the asymmetric key with an asymmetric key.

Question 30

Question
Only full backups are available for the master database.
Answer
  • True
  • False

Question 31

Question
According to the rules of precedence, which of the following computations should be completed first?
Answer
  • performing additions and subtractions
  • performing multiplications and divisions
  • performing operations within parentheses
  • performing power operations

Question 32

Question
Which one of the following is NOT true about indexes?
Answer
  • Too many indexes can result in a slow database response.
  • When a table is updated, the indexes will need to be updated.
  • Indexes make the retrieval of data faster and efficient in most cases.
  • Indexes reside in the same file that has the associated table.

Question 33

Question
The top node of the B-tree index is called:
Answer
  • Leaf node
  • Root node
  • Index node
  • Intermediate node

Question 34

Question
Clustered indexes are NOT a good choice for the following attributes.
Answer
  • Attributes that are unique or contain many distinct values.
  • Attributes that need to be accessed sequentially.
  • Attributes that undergo frequent changes.
  • Attributes that are frequently used to sort the data retrieved from a table.

Question 35

Question
How many non-clustered indexes per table are allowed in SQL Server?
Answer
  • 1
  • 99
  • 999
  • Unlimited
Show full summary Hide full summary

Similar

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
CCNA Answers – CCNA Exam
Abdul Demir
SQL Quiz
R M
Translations and transformations of functions
Christine Laurich
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler