IdeasCuriosas - Every Question Deserves an Answer Logo

In History / College | 2025-07-03

What would be the best data center site for the Project Falcon team?

Question 11 Select one:

a. A location that has good sightlines to satellites for high-speed internet connections

b. A remote location in a geologically stable area where the probability of a significant disruption is less

c. A location in a jurisdiction that is willing to offer tax subsidies to compensate for lack of labor and other infrastructure

d. A location in a politically stable jurisdiction with good access to skilled labor, transportation systems and a strong internet backbone

If we need to design an SQL structure to eliminate a table that has been created and is not needed anymore, which of the following clauses should we include in the command syntax?

Question 12 Select one:

a. DROP TABLE tablename

b. ERASE TABLE tablename

c. DELETE TABLE tablename

d. REMOVE TABLE tablename

To address security concerns, the Project Falcon team has decided to use Secure Socket Layer (SSL). Why is it the most appropriate tool to address these concerns?

Question 13 Select one:

a. SSL uses both public key encryption and private key encryption

b. SSL uses private key encryption alone because public key encryption is too slow

c. SSL incorporates its own encryption scheme which is outside of public key and private key

d. SSL uses public key encryption only because there is not a practical way to get a private key involved

When implementing subject-object security to mitigate against security threats, which of the following is correct?

Question 14 Select one:

a. The subject and object are interchangeable, and their roles can switch depending on the situation

b. The subject is the data/resource being accessed, and the object is the person/system accessing it

c. Subject-object security does not apply to digital systems and is only relevant in physical security scenarios

d. The subject is the person/system accessing the object, and the object is the data/resource being accessed

Which type of user authorization on a relation allows a user to modify any tuple in the relation?

Question 15 Select one:

a. Grant authorization

b. Select authorization

c. Define authorization

d. Update authorization

In developing both internet and non-internet databases, which of the following represent major differences that the Project Falcon team will need to be aware of?

Question 16 Select one:

a. Control issues, reduced data types, and connectivity issues

b. Connectivity issues, control issues, and extraction into XML

c. Extraction into SQL, expanded data types, and control issues

d. Expanded data types, extraction into HTML, and connectivity issues

Which of the following security criteria is most effectively addressed by an authentication system?

Question 17 Select one:

a. Ensuring that data are available

b. Verifying that a given modification is valid

c. Ensuring that data integrity is not compromised

d. Verifying the identity of the user requesting access

The DBA on the project described in the case will be asked to make a recommendation on selecting a DBMS vendor that is cost effective. Which of the following factors would you include when calculating the cost of owning a DBMS?

Question 18 Select one:

a. The cost of the managers supporting the decision support system

b. The license cost of any required network support software and systems

c. The cost of the network administrators to manage the communications system

d. The cost of the database professionals to program, support, and administer the DBMS

Which of the following SQL symbols should be used in a query statement when we want to represent all of the columns in a single table?

Question 19 Select one:

a. # (pound)

b. * (asterisk)

c. % (percent)

d. ? (question mark)

Sometimes staff change roles and gain new permissions without eliminating outdated and unneeded privileges. Which of the following methods addresses this?

Question 20 Select one:

a. Pass the hash

b. Permissions creep

c. Role-based access

d. Principle of least privilege

Asked by phillyfaye123

Answer (2)

The best data center site for the Project Falcon team is a location in a politically stable jurisdiction with good access to skilled labor, transportation systems, and a strong internet backbone. This option ensures ongoing operations, access to necessary resources, and reliable connectivity. Therefore, option D is the most suitable choice.
;

Answered by Anonymous | 2025-07-04

Question 11: The best option for a data center site would be d. A location in a politically stable jurisdiction with good access to skilled labor, transportation systems, and a strong internet backbone . This choice ensures the facility is in an area with a reliable workforce, stable governance, and infrastructure that supports global communication needs.
Question 12: To eliminate a table that is no longer needed in SQL, the correct command would be a. DROP TABLE tablename . This command is used to remove the table and its data completely from the database.
Question 13: SSL is an appropriate tool to address security concerns because a. SSL uses both public key encryption and private key encryption . By using a combination of these encryption methods, SSL provides a secure protocol for transmitting data over the internet.
Question 14: When implementing subject-object security, the correct statement is d. The subject is the person/system accessing the object, and the object is the data/resource being accessed . This model helps in understanding who is accessing what and ensures proper access control.
Question 15: The type of user authorization that allows a user to modify any tuple in the relation is d. Update authorization . This type of authorization provides users the ability to change existing data within a table.
Question 16: Major differences in developing internet and non-internet databases include a. Control issues, reduced data types, and connectivity issues . These factors play a significant role in how data is managed and accessed.
Question 17: An authentication system primarily addresses d. Verifying the identity of the user requesting access . This ensures that the system authenticates individuals attempting to gain access, thus enhancing security.
Question 18: When calculating the cost of owning a DBMS, you would include d. The cost of the database professionals to program, support, and administer the DBMS . This recognition of ongoing personnel costs is crucial as the technical and operational support staff play an integral role in the effective use of a DBMS.
Question 19: In SQL, the symbol used to represent all the columns in a single table is b. * (asterisk) . This is commonly used in queries to select all fields from a table.
Question 20: The method that addresses gaining new permissions without eliminating outdated ones is d. Principle of least privilege . This principle suggests giving users the minimum level of access necessary to perform their job functions, reducing the risk of unnecessary permissions.

Answered by RyanHarmon181 | 2025-07-08