S2 Flashcards

(20 cards)

1
Q

INNER JOIN

A

Retrieve data from tables and will only retrieve data when there is a match in both tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LEFT JOIN

A

The order matters when using this clause. Data that does not have a match will be returned as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Di

A

h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Archival in Data Life Cycle

A

Following the decline in need of specific data sets, data sets are moved from active systems to passive systems for archiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Publication in Data Life Cycle

A

After data is prepared for internal use, the data may also be shared with external users.

The data is considered published and the internal
company no longer has sole control of how that data will be used, further shared,
archived, or purged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Once the data has been obtained, there are two steps in the life cycle that must be completed before the data is ready for analysis or use.

What are the two steps?

A

Preparation and Synthesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Life Cycle

What is a Field Check?

A

Checks input type to ensure consistency with field requirement (e.g., date, time, number, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Life Cycle

What is a Reasonableness Check?

A

Compares inputs against expected norms based on
the context of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Life Cycle

What is a Completeness Check?

A

Checks for missing mandatory fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Life Cycle

What is a Validity Check?

A

Verifies data against predefined rules or reference data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Life Cycle

What is a Limit Check?

A

Checks data values against predefined upper and lower limits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Life Cycle

What is a Size Check?

A

Checks if the number of characters exceeds the maximum allowed for the field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

System Availability Controls

What is a Full Backup and some characteristics?

A
  • Exact copy of the entire database
  • Time consuming
  • While time-consuming to create, full backups are the least time-consuming to restore.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System Availability Controls

What is an Incremental Backup and some characteristics?

A
  • Involves copying only the data items that have changed since the last backup.
  • set of incremental backup files, each containing the results of one day’s transactions.
  • Recovery is generally the slowest of the three because a full backup copy must be restored as well as each incremental backup.
  • Initial creation of the backup file for each incremental load is fast.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System Availability Controls

What is an Differential Backup and some characteristics?

A

-Copies all changes made since the last full backup.

-Restoration is simpler, however, because the last full backup needs to be supplemented with only
the most recent differential backup, instead of a set of daily incremental backup files.

-Recovery using a differential backup is slower than a full backup but faster than an incremental one because only two copies are needed for restoration:
-the most recent full backup; and the single differential backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Infrastructure

Circuit-Level Gateway Firewall

A

A firewall that verifies the source of a packet and meets rules and policies set by the team.

16
Q

Network Infrastructure

Application-Level Gateway Firewall

A

Firewall that inspects the packet itself.

17
Q

Network Infrastructure

Network Address Translation Firewall

A

Assigns an internal network address to specific, approved external sources

17
Q

Network Infrastructure

Stateful Multilayer Inspection Firewall

A

Combines packet-filtering and network address translation

18
Q

Network Infrastructure

Next Gen Firewalls

A

Assigns different firewall rules to different applications as well as users. Low-threat applications has more permissive rules assigned while high-security applications have less permissive rules.