Which of the following NFs is considered themostpreferable for relational database design?
Which of the following is a potential issue raised by enterprise database users?
A database administrator has been asked to assign a user the ability to view a data set. Which of the following practices best describes this request?
Which of the following is used to write SQL queries in various programming languages?
Which of the following is an attack in which an attacker hopes to profit from locking the database software?
Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?
A database administrator needs to ensure database backups are occurring on a daily basis and at scheduled times. Which of the following actions should the administrator take?
A database administrator is conducting a stress test and providing feedback to a team that is developing an application that uses the Entity Framework. Which of the following explains the approach the administrator should use when conducting the stress test?
An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?
(Which of the following types of scripting can be executed on a web browser?)