Question: Question 1 ( 2 0 pts ) The following table below provides information on members of a mountain climbing club. ` ` ` Climber -

Question 1(20 pts)
The following table below provides information on members of a mountain climbing club.
```
Climber-ID Name Skill Level Age
123 Edmund Experienced 80
214 Arnold Beginner 25
313 Bridget Experienced 33
212 James Medium 27
```
The primary key is Climber-ID . Explain whether or not each of the following rows can be added to the table.
Question 2(10 pts)
We wish to create a Customer table for a bank account holder. The table contains the Bank Account Number, Bank Balance, Checking, Savings. Write an SQL statement to accomplish this.
Question 3(10 pts)
This question relates to the statistical database below.
Assume no query size restriction and that a questioner knows that Dodd is a female CS professor. Show a queries that the questioner could use to determine Dodd's salary. Table 5.8 Statistical Database Problem
Question 4(30 pts)
Explain the strengths and weaknesses of each of the following firewall deployment scenarios in defending servers, desktop machines, and laptops against network threats.
a. A firewall at the network perimeter.
b. Firewalls on every end host machine.
c. A network perimeter firewall and firewalls on every end host machine
Question 5(20 pts)
Consider an automated audit log analysis tool (e.g., swatch). Can you propose some rules which could be used to distinguish "suspicious activities" from normal user behavior on a system for some organization?
Question 6(10 pts)
State some threats that result from a process running with administrator or root privileges on a system.
Question 1 ( 2 0 pts ) The following table below

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!