Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Cloud storage for database contents is more efficient in terms of easy access by employees anytime, anywhere. The updated information for the database is generated

Cloud storage for database contents is more efficient in terms of easy access by employees anytime, anywhere. The updated information for the database is generated with real-time information sent to a central server within the company. Updates to the cloud are made every hour during normal working hours. This could be considered a potential database __________.

A)

threat

B)

vulnerability

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

A)

threat to

B)

vulnerability of

Paul has been working long hours. He is tired and distracted by family issues, so he has not been doing record updates regularly. There is a sudden power outage in the building and the last 15 records he has been working on have not been saved to the database. Which of the following best describes this data issue?

A)

Malicious data loss

B)

Malicious data leak

C)

Accidental data loss

D)

Accidental data leak

A staff/faculty member uses proprietary (owned and protected by the university) data from the university's student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

A)

Malicious data loss

B)

Intentional data leak

C)

Accidental data loss

D)

Malicious data leak

Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

A) True
B) False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Prepare a constructive performance appraisal.

Answered: 1 week ago

Question

List the advantages of correct report formatting.

Answered: 1 week ago