What is value of using access control database transaction and firewall log files?

1 Answer

Answer :

Need answer

Related questions

Description : What are database files, control files and log files. How many of these files should a database have at least? Why?

Last Answer : ∙ Database Files The database files hold the actual data and are typically the largest in size. Depending on their sizes, the tables (and other objects) for all the user accounts can go in one ... or redo log file to the database, the information is recorded in the control files. ∙ Redo Logs

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : What are the prerequisites to assigning Printing Assistant for Landscapes (PAL) printers to a printer group? A. Distribute the printer group to a target system group. B. Check the ... output device using transaction Spool Administration(SPAD) H. Create the output device as a PAL printer

Last Answer : D. Assign the target system to a target system group

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Is it possible to use Transaction control Statements such a ROLLBACK or COMMIT in Database Trigger ? Why ?

Last Answer : It is not possible. As triggers are defined for each table, if you use COMMIT of ROLLBACK in a trigger, it affects logical transaction processing.

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : Ms. Sita trying to log into your Internet Banking account for online transaction activity. However, as strange as it may seem, -Technology

Last Answer : I. (i)Source code is available.(ii) Money need not to be paid for procuring the license for usage and further distribution.II. She could be under a DoS attack!She should deploy an ... into her network if not already done. This helps in restricting the bandwidth usage to authenticated users only.

Description : During a merger and acquisition transaction, the ability to find and use good comparable data for a valuation is relatively ____________. a) easy because each successful company within an industry ... depth, product diversity and access to lines of credit seldom match the company being valued

Last Answer : d) difficult because size differential, management depth, product diversity and access to lines of credit seldom match the company being valued

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Which among the following is correct: a) A firewall is a system designed to prevent unauthorized access to or from a private network. b) Firewalls can be implemented in both hardware and software or a combination of both. c) Both of Above d) None of these

Last Answer : c) Both of Above

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : You have just had to restore from backup and do not have any control files. How would you go about bringing up this database?

Last Answer : I would create a text based backup control file, stipulating where on disk all the data files where and then issue the recover command with the using backup control file clause.

Description : How to implement the multiple control files for an existing database ?

Last Answer : Shutdown the database Copy one of the existing control file to new location Edit Config ora file by adding new control file. name Restart the database.

Description : In a Bank’s database, there are two tables ‘Customer’ and ‘Transaction’ as shown below. -Technology

Last Answer : (i)Acc_No, Cust_Phone(ii)All the columns having capability to become Primary Key are known as Candidate Keys.(iii)Acc_No(iv)Trans_Id

Description : In a Bank’s database, there are two tables ‘Customer’ and ‘Transaction’ as shown below. Write a query to display customer’s name who has -Technology

Last Answer : (i) Select cust_name from customer c,transaction t where c.Acc_No=t.Acc_No and Transaction_Type= 'Debit';(ii)Select cust_name, t.* from customer c, transaction t where c.Acc_No=t.Acc_No;(iii) ... total amount of all type of transactions, it will only display the total of credit transactions only.

Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry

Last Answer : Data Entry

Description : Which of the following is/are the Database server functions? i) Data management ii) Transaction management iii) Compile queries iv) Query optimization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv

Last Answer : A) i, ii, and iv only

Description : Which log would you check if a database has a problem?

Last Answer : Alert log

Description : n(log n) is referred to A. A measure of the desired maximal complexity of data mining algorithms B. A database containing volatile data used for the daily operation of an organization C. Relational database management system D. None of these

Last Answer : A. A measure of the desired maximal complexity of data mining algorithms

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : Where can I find Windows NT server log files?

Last Answer : The Windows NT operating system is full of issues. The fact they do not have specific server file is one of them. Any file can be converted to a server file.

Description : How does one backup archived log files? (for DBA

Last Answer : One can backup archived log files using RMAN or any operating system backup utility. Remember to delete files after backing them up to prevent the archive log directory from filling up. If the ... oracle/arch_backup/log_t%t_s%s_p%p' 5> (archivelog all delete input); 6> release channel dev1; 7> }

Description : What is the purpose of Redo Log files?

Last Answer : Before Oracle changes data in a datafile it writes these changes to the redo log. If something happens to one of the datafiles, a backed up datafile can be restored and the redo, that was written since, replied, which brings the datafile to the state it had before it became unavailable.

Description : Which of the following is not a type of volatile evidence a) Routing Tables b) Main Memory c) Log files d) Cached Data

Last Answer : c) Log files

Description : Which of the following is not type of volatile evidence: A)Routing Tables B) Main Memory C)Log Files D) Cached Data

Last Answer : D) Cached Data

Description : Which of the following is not a type of volatile evidence? a. Routing Table b. Main memory c. Log files d. Cached Data

Last Answer : c. Log files

Description : Which of the following is not type of volatile evidence: A)Routing Tables B) Main Memory C)Log Files D) Cached Data

Last Answer : D) Cached Data

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : A transaction file is a type of: a) Master File b) Data File c) Access Method d) None of The Above

Last Answer : b) Data File

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above

Last Answer : 1) Real time system

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1 Real time system 2 time sharing system 3 both of above 4 None of above

Last Answer : 1 Real time system

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : b. Serial access

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : b. Serial access

Description : How do I recover access to my blogspot blog when it seems I have forgotten how to log in to the account?

Last Answer : Sounds like you missed the date.

Description : Is it true that if you don't log off from a site, you leave certain ports open allowing access to your 'puter?

Last Answer : My bank's website specifically warns you to not only log out, but to close the browser window due to possible security breaches. I always assumed it meant someone might access your records on that site, ... on sites with sensitive personal data on them (financial, medical, etc.). Perhaps I'm wrong?

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : What are the keyboard commands for saving database files ?

Last Answer : The keyboard command for saving database files is Ctrl + S

Description : Name two files used for network connection to a database.

Last Answer : TNSNAMES.ORA and SQLNET.ORA

Description : In SQL, the CREATE TABLESPACE isused A. to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace B. to createa database trigger C. to add/rename data files, to change storage D. All of theabove E. None of the above

Last Answer : to createa place in the databasefor storageof scheme objects, rollback segments, andnaming the data files to comprise the tablespace

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)