1. The database attributes that individual users have permission to access are defined in the a. operating...

Question:

1. The database attributes that individual users have permission to access are defined in the
a. operating system.
b. user manual.
c. database schema.
d. user view.
e. application listing.

2. An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)
a. operating system.
b. database management system.
c. utility system.
d. facility system.
e. object system.

3. The purpose of a checkpoint procedure is to facilitate restarting after
a. data processing errors.
b. data input errors.
c. the failure to have all input data ready on time.
d. computer operator intervention.
e. echo check failures.

4. A user’s application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of
a. operating system controls.
b. data resource controls.
c. computer center and security controls.
d. application controls.

5. A program that attaches to another legitimate program but does NOT replicate itself is called a
a. virus.
b. worm.
c. Trojan horse.
d. logic bomb.

6. Which of the following is NOT a data communications control objective?
a. maintaining the critical application list
b. correcting message loss due to equipment failure
c. preventing illegal access
d. rendering useless any data that a perpetrator successfully captures

7. Reviewing database authority tables is a(n)
a. access control.
b. organizational structure control
c. data resource control.
d. operating resource control.

8. Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host’s network using a technique called
a. spoofing.
b. spooling.
c. dual-homed.
d. screening.

9. Transmitting numerous SYN packets to a targeted receiver, but NOT responding to an ACK, is
a. a DES message.
b. the request-response technique.
c. a denial of service attack.
d. a call-back device.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: