In addition, the DBMS should also have a versioning facility to track and record changes made to data over time through the history of design changes. The version management system should track version successors and predecessors. Although the rollback approach uses before images, the roll-forward approach uses after images. Both of these images are stored on a log tape. If a database is damaged, the after image copies can be added to a backup copy of the database. The database is rolled forward from a point in time when it is known to be correct to a later time.
152. Which of the following statements is true with respect to data dictionaries?
a. A data dictionary must always be active to be useful.
b. An active data dictionary must be dependent on database management systems.
c. A passive data dictionary is an important feature of database management systems.
d. A data dictionary can exist only with a database system.
The other three choices are not correct because (i) both active and passive data dictionaries are useful, (ii) a passive data dictionary may or may not require a check for currency of data descriptions before a program is executed, and (iii) nondatabase systems can have data dictionaries.
153. Deadly embraces or deadlock situations in a database can best be handled through which of the following?
a. Prevention
b. Detection
c. Correction
d. Ignoring
154. Which of the following is
a. Policies and procedures
b. Internal controls
c. Audit trails and logs
d. Training, awareness, and education
155. Which of the following is an example of last line-of-defense?
a. Employee vigilance
b. Program change controls
c. Fault-tolerant techniques
d. Exterior protection
The line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
156. The principal aspects of the defense-in-depth strategy to achieve an effective information-assurance posture do
a. People
b. Processes
c. Technology
d. Operations
157. Operations, one of the principal aspects of the defense-in-depth strategy does
a. Certification and accreditation
b. Attack sensing and warning
c. System risk assessment
d. Recovery and reconstitution