Which of the following will help him to accomplish the task?

Mark works as a Database Administrator for DataWorld Inc. The company has a SQL Server database.
Management instructs him to ensure that no inconsistent data is entered in the database. Which of the
following will help him to accomplish the task?

Mark works as a Database Administrator for DataWorld Inc. The company has a SQL Server database.
Management instructs him to ensure that no inconsistent data is entered in the database. Which of the
following will help him to accomplish the task?

A.
Referential integrity

B.
Abstraction

C.
Encryption

D.
Authentication

E.
Native auditing

Explanation:
Referential integrity is a feature or property thatprevents users or applications from entering inconsistent data
which, when satisfied,
requires every value of one column of a table to exist as a value of another column in a different or the same
table.

Answer D is incorrect. Authentication is the process of verifying the identity of a user or software connecting to
a database. During the process of authentication, the user must submit sufficient information validated either
by the database itself, or by the operating system within which the database is installed.
Answer B is incorrect. Abstraction is a method of coding that enables a user to focus on the coding rather than
the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for database
access.
Answer E is incorrect. Native auditing is the process of extracting trails on a regular basis so that they can be
transferred to a
designated security system where the database administrators do not have access. This ensures a certain
level of segregation of duties and
provides evidence that the native audit trails werenot modified by authenticated administrators. Answer C is
incorrect. Encryption provides an additional security layer, protecting the data from unauthorized viewing with
the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.



Leave a Reply 0

Your email address will not be published. Required fields are marked *