Database Administration Flashcards

1
Q

What is the role of a database administrator?

A
  1. Management of user accounts
  2. Security
  3. Management of database instances
  4. Space allocation
    • File system
    • Within the database: Quotas and tables
  5. Backups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of a deliberate Human Security threat?

A

Abuse of privilege Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an example of an accidental Human Security threat?

A

Operational error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of deliberate Software Security threats?

A
  1. SQL injection
    2 
Database rootkit
  2. 
Denial of Service

  3. Worms/viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of an accidental Human Security threat?

A

Incompatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of a deliberate Hardware Security threat?

A

Sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of accidental Hardware Security threats?

A

1 . Power failure


2. Disk failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of a deliberate Environmental Security threat?

A

Terrorist attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of an accidental Environmental Security threat?

A

Natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 stages in relation to Security Threats?

A
  1. Planning
  2. Prevention
  3. Detection
  4. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authentication?

A

Establishing identity – usually by means of shared codes eg passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Authorisation?

A

Giving permission to carry out certain actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the statement ‘GRANT CREATE SESSION TO bob;’ do?

A

Allow the user bob to start a session with the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the statement ‘GRANT DROP USER TO bob;

‘ do?

A

Allow the user bob to drop user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the statement REVOKE CREATE TRIGGER FROM bob; do?

A

Remove the ability to create triggers from user bob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GRANT CONNECT to bob IDENTIFIED BY b0b123;

A

Change Bob’s password

17
Q

What level does GRANT and REVOKE operate at?

A

The level of the object.

18
Q

What do full backups consist of?

A
  1. Long time required
  2. Very large
  3. Cost of offsite storage (per Gb?)
19
Q

What do Incremental backups consist of?

A
  1. Shorter time
  2. Smaller
  3. Restoring database requires multiple steps
20
Q

What is a transaction log?

A

Contains a record of all transactions since last backup

21
Q

What considerations have to be made before carrying out a backup?

A
  1. Time to create
  2. System availability
  3. Cost
  4. Time to recover