100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
DBS 401 Full Test Bank | Questions and Answers (Complete Solutions) €24,56   In winkelwagen

Tentamen (uitwerkingen)

DBS 401 Full Test Bank | Questions and Answers (Complete Solutions)

 7 keer bekeken  0 keer verkocht
  • Vak
  • DBS 401
  • Instelling
  • DBS 401

DBS 401 Full Test Bank | Questions and Answers (Complete Solutions) A(n) ____ is an application that allows others to search stored data in order to locate specific information. A.SQL B.POS C.TDS D.DBMS Symmetric cryptography has advantages and disadvantages. Which of the following is not conside...

[Meer zien]

Voorbeeld 4 van de 41  pagina's

  • 19 september 2024
  • 41
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • DBS 401
  • DBS 401
avatar-seller
DBS 401 Full Test Bank


A(n) ____ is an application that allows others to search stored data in order to locate
specific information.

A.SQL
B.POS
C.TDS
D.DBMS

Symmetric cryptography has advantages and disadvantages. Which of the following is
not considered a disadvantage?

A. Key management
B. Confidentiality
C. Scalability
D. Key distribution

External ____ tests are often not focused on one particular area of the network because
little is known about the environment.

A. Black box
B. White box
C. Bottom
D. Top

Password ____ traverse the network searching for passwords from remote
authentication systems.

A.trackers
B.scanners
C.diggers
D.loggers

____ testing will identify attacks and the damage that can be caused within the
database environment itself.

A.Audit
B.Black box
C.Internal
D.Local

A virus that installs itself or takes residence directly in the main system memory of a
computer is known as a ____ virus.

,A.direct
B.Trojan
C.time bomb
D.resident

The ____ server contains applications that enforce business and database rules.

A.top layer
B.main layer
C.middleware
D.scripting

Oracle ____ offers a sophisticated suite of artificial intelligence tools designed to locate
trends and predictive behavior within stored data.

A.Encryption
B.Robotics
C.Business Intelligence
D.Data Mining

Audits can be enabled, reviewed, and created using the ____ explorer in the SQL
Server Management Studio.

A.Inbox
B.Object
C.Cycle
D.Class

Computer-literate users are not likely to cause problems to a network.

A.True
B.False

What is the backdoor?

A. Another name of the trojan horse
B.A method to deny service by causing a computer to perform an unproductive task
C.A piggyback-entry wiretapping
D.A hidden access method in programs or systems

A ____ file is a file that contains code that can be read by machines and run as an
executable file.

A.computing
B.boot

,C.server
D.binary

SQL Server data is stored, retrieved, and manipulated within a ____ architecture.

A.triangular
B.flat
C.node-outposts
D.client-server

Computer security is a set of established procedures, standards, policies, and tools that
are used to protect a network from theft, misuse, and unwanted intrusions, activities,
and attacks.
A.True
B.False

____ linked databases can only be accessed by the user who created the link itself.

A.Local
B.Secure
C.Policy
D.Private

A(n) ____ key is a field that contains a unique label by which we can identify a record or
row in a table.

A.identity
B.foreign
C.primary
D.local

Oracle Partitioning is designed for small databases.
A.True
B.False

Which of the following best describes a rootkit?

A.Software that reports data such as surfing habits and sites visited
B.Software used for the collection of personal data
C.Software that provides the originator with the venue to propagate
D.Software hidden on a computer for the purpose of compromising the system

Kerberos uses symmetric-key ____ to verify the identity of a client to a server and a
server to a client.

A.cryptology

, B.synchronization
C.authentication
D.masking

An example of a(n) ____ reconnaissance attack is a user who utilizes tools such as a
network sniffer to obtain information about a system or network infrastructure.

A.active
B.passive
C.dynamic
D.static

The ____ of a database is the process of sharing recent changes made to a database
with all other network databases in hopes of remaining consistent and in sync with one
another.

A.replication
B.translation
C.backup
D.mirroring

____ are the most common way to access resources available throughout the
environment.

A.System boosters
B.Network ports
C.Firewalls
D.Data scopes

The two types of information reconnaissance are ____.

A.internal and external
B.static and dynamic
C.open and closed
D.passive and active

MySQL is written using C and ____ programming languages.

A. Java
B.C++
C.ASP.NET
D.JSP

The ____ requires manual installation and configuration, making this package the most
difficult to apply.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper NurseHenny. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €24,56. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67474 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€24,56
  • (0)
  Kopen