Which of the following will help him to accomplish the task?

Mark works as a Database Administrator for DataWorld Inc. The company has a SQL Server
database. Management instructs him to ensure that no inconsistent data is entered in the database.
Which of the following will help him to accomplish the task?

Mark works as a Database Administrator for DataWorld Inc. The company has a SQL Server
database. Management instructs him to ensure that no inconsistent data is entered in the database.
Which of the following will help him to accomplish the task?

A.
Referential integrity

B.
Abstraction

C.
Encryption

D.
Authentication

E.
Native auditing

Explanation:
Referential integrity is a feature or property that prevents users or applications from entering
inconsistent data which, when satisfied,
requires every value of one column of a table to exist as a value of another column in a different or
the same table.

Answer D is incorrect. Authentication is the process of verifying the identity of a user or software
connecting to a database. During the process of authentication, the user must submit sufficient
information validated either by the database itself, or by the operating system within which the
database is installed.
Answer B is incorrect. Abstraction is a method of coding that enables a user to focus on the coding
rather than the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for
database access.
Answer E is incorrect. Native auditing is the process of extracting trails on a regular basis so that
they can be transferred to a
designated security system where the database administrators do not have access. This ensures a
certain level of segregation of duties and
provides evidence that the native audit trails were not modified by authenticated administrators.
Answer C is incorrect. Encryption provides an additional security layer, protecting the data from
unauthorized viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher
encrypted data into a readable form.



Leave a Reply 0

Your email address will not be published. Required fields are marked *