1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
10

Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man

agerial role of enforcing these functions
Computers and Technology
1 answer:
Mrrafil [7]3 years ago
7 0

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

You might be interested in
Which of the following statements Terminates the program andstops all threads?
Law Incorporation [45]

Answer:

(c) system.exist(1);

Explanation:

system.exist(1); is used for the termination of the program here both option c and d should be correct but in option d there is exit(0) and zero indicates return means program will return but besides zero if there is any non zero number then program will not return and in option c there is a non zero number which means program will not return so option c  system.exist(1); will be the correct option for the termination of program

8 0
3 years ago
Explain what qualifies a device to be called a computerized system​
Karolina [17]

Answer; A peripheral is a “device that is used to put information into or get information out of the computer.”[1]

There are three different types of peripherals:

Input, used to interact with, or send data to the computer (mouse, keyboards, etc.)

Output, which provides output to the user from the computer (monitors, printers, etc.)

Storage, which stores data processed by the computer (hard drives, flash drives, etc.)

Explanation:

7 0
3 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
Please select the word from the list that best fits the definition
Svetllana [295]

A pie graph shows the percent something takes of a whole. With a pie graph it is always out of 100%, therefor for this question the answer is B. Pie graph

I hope this helped!

7 0
3 years ago
What can we learn from the example of the wi-fi alliance with regard to the necessity of networking standards?
Vera_Pavlovna [14]
The Wi-Fi alliance is an alliance that promotes the wireless technologies and the interoperability between them. It defines the the security of the wireless technologies and the application protocols. From this example we can learn that is crucial to have one platform that defines the main characteristic of a type of network in order to have strictly defined standards and protocols, and by doing so, have interoperable networks. 
7 0
3 years ago
Other questions:
  • Critics are concerned about how easy it is to upload and download music on the Internet because:
    10·2 answers
  • Which statement is true of Web-based social media?
    12·1 answer
  • #Write a function called hide_and_seek. The function should #have no parameters and return no value; instead, when #called, it s
    7·1 answer
  • Which is a key component to participating in a school-to-work program? A. Dual enrollment opportunities B. Community service opp
    12·2 answers
  • Which one my guys I need help
    7·1 answer
  • Only need help on f and correct me if im wrong for the other questions please
    11·1 answer
  • Which interpersonal skill is the most important for a telecom technician to develop?
    7·1 answer
  • PLEASE ANSWER ASAP!!!!
    12·1 answer
  • When proofreading, you should do all of the following except _____.
    14·1 answer
  • The hardware and software that must be implemented to support the applications that the primary activities use are a part of the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!