1. To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
A. True
B. False
2. Failure to control confidentiality may lead to loss of competitiveness.
A. True
B. False
3. Authorization tables contain highly sensitive data and should be protected by stringent security rules.
A. True
B. False
4. A transaction log shows before and after images of records that have been modified by transactions.
A. True
B. False
5. The greatest threat to business security is often internal rather than external.
A. True
B. False
Warning: Undefined variable $in_same_cat in /www/wwwroot/mtexam.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27
Warning: Undefined variable $excluded_categories in /www/wwwroot/mtexam.com/public_html/wp-content/plugins/EXP.GKFEED.COM/function.php on line 27
< PREVIOUS POSTData and Database Administration - General Questions