100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
DBS 401 Full Test Bank | Questions and Answers (Complete Solutions) $24.99   Add to cart

Exam (elaborations)

DBS 401 Full Test Bank | Questions and Answers (Complete Solutions)

 1 view  0 purchase
  • Course
  • DBS 401
  • Institution
  • DBS 401

DBS 401 Full Test Bank | Questions and Answers (Complete Solutions) A(n) ____ is an application that allows others to search stored data in order to locate specific information. A.SQL B.POS C.TDS D.DBMS Symmetric cryptography has advantages and disadvantages. Which of the following is not conside...

[Show more]

Preview 4 out of 41  pages

  • September 19, 2024
  • 41
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • DBS 401
  • DBS 401
avatar-seller
NurseHenny
DBS 401 Full Test Bank


A(n) ____ is an application that allows others to search stored data in order to locate
specific information.

A.SQL
B.POS
C.TDS
D.DBMS

Symmetric cryptography has advantages and disadvantages. Which of the following is
not considered a disadvantage?

A. Key management
B. Confidentiality
C. Scalability
D. Key distribution

External ____ tests are often not focused on one particular area of the network because
little is known about the environment.

A. Black box
B. White box
C. Bottom
D. Top

Password ____ traverse the network searching for passwords from remote
authentication systems.

A.trackers
B.scanners
C.diggers
D.loggers

____ testing will identify attacks and the damage that can be caused within the
database environment itself.

A.Audit
B.Black box
C.Internal
D.Local

A virus that installs itself or takes residence directly in the main system memory of a
computer is known as a ____ virus.

,A.direct
B.Trojan
C.time bomb
D.resident

The ____ server contains applications that enforce business and database rules.

A.top layer
B.main layer
C.middleware
D.scripting

Oracle ____ offers a sophisticated suite of artificial intelligence tools designed to locate
trends and predictive behavior within stored data.

A.Encryption
B.Robotics
C.Business Intelligence
D.Data Mining

Audits can be enabled, reviewed, and created using the ____ explorer in the SQL
Server Management Studio.

A.Inbox
B.Object
C.Cycle
D.Class

Computer-literate users are not likely to cause problems to a network.

A.True
B.False

What is the backdoor?

A. Another name of the trojan horse
B.A method to deny service by causing a computer to perform an unproductive task
C.A piggyback-entry wiretapping
D.A hidden access method in programs or systems

A ____ file is a file that contains code that can be read by machines and run as an
executable file.

A.computing
B.boot

,C.server
D.binary

SQL Server data is stored, retrieved, and manipulated within a ____ architecture.

A.triangular
B.flat
C.node-outposts
D.client-server

Computer security is a set of established procedures, standards, policies, and tools that
are used to protect a network from theft, misuse, and unwanted intrusions, activities,
and attacks.
A.True
B.False

____ linked databases can only be accessed by the user who created the link itself.

A.Local
B.Secure
C.Policy
D.Private

A(n) ____ key is a field that contains a unique label by which we can identify a record or
row in a table.

A.identity
B.foreign
C.primary
D.local

Oracle Partitioning is designed for small databases.
A.True
B.False

Which of the following best describes a rootkit?

A.Software that reports data such as surfing habits and sites visited
B.Software used for the collection of personal data
C.Software that provides the originator with the venue to propagate
D.Software hidden on a computer for the purpose of compromising the system

Kerberos uses symmetric-key ____ to verify the identity of a client to a server and a
server to a client.

A.cryptology

, B.synchronization
C.authentication
D.masking

An example of a(n) ____ reconnaissance attack is a user who utilizes tools such as a
network sniffer to obtain information about a system or network infrastructure.

A.active
B.passive
C.dynamic
D.static

The ____ of a database is the process of sharing recent changes made to a database
with all other network databases in hopes of remaining consistent and in sync with one
another.

A.replication
B.translation
C.backup
D.mirroring

____ are the most common way to access resources available throughout the
environment.

A.System boosters
B.Network ports
C.Firewalls
D.Data scopes

The two types of information reconnaissance are ____.

A.internal and external
B.static and dynamic
C.open and closed
D.passive and active

MySQL is written using C and ____ programming languages.

A. Java
B.C++
C.ASP.NET
D.JSP

The ____ requires manual installation and configuration, making this package the most
difficult to apply.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseHenny. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $24.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75619 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$24.99
  • (0)
  Add to cart