Question: Cloud storage for database contents is more efficient in terms of easy access by employees anytime, anywhere. The updated information for the database is generated

Cloud storage for database contents is more efficient in terms of easy access by employees anytime, anywhere. The updated information for the database is generated with real-time information sent to a central server within the company. Updates to the cloud are made every hour during normal working hours. This could be considered a potential database __________.

A)

threat

B)

vulnerability

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

A)

threat to

B)

vulnerability of

Paul has been working long hours. He is tired and distracted by family issues, so he has not been doing record updates regularly. There is a sudden power outage in the building and the last 15 records he has been working on have not been saved to the database. Which of the following best describes this data issue?

A)

Malicious data loss

B)

Malicious data leak

C)

Accidental data loss

D)

Accidental data leak

A staff/faculty member uses proprietary (owned and protected by the university) data from the university's student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

A)

Malicious data loss

B)

Intentional data leak

C)

Accidental data loss

D)

Malicious data leak

Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

A) True
B) False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!