INNER JOIN
Retrieve data from tables and will only retrieve data when there is a match in both tables.
LEFT JOIN
The order matters when using this clause. Data that does not have a match will be returned as well.
Di
h
Archival in Data Life Cycle
Following the decline in need of specific data sets, data sets are moved from active systems to passive systems for archiving
Publication in Data Life Cycle
After data is prepared for internal use, the data may also be shared with external users.
The data is considered published and the internal
company no longer has sole control of how that data will be used, further shared,
archived, or purged.
Once the data has been obtained, there are two steps in the life cycle that must be completed before the data is ready for analysis or use.
What are the two steps?
Preparation and Synthesis
Data Life Cycle
What is a Field Check?
Checks input type to ensure consistency with field requirement (e.g., date, time, number, etc.).
Data Life Cycle
What is a Reasonableness Check?
Compares inputs against expected norms based on
the context of the data.
Data Life Cycle
What is a Completeness Check?
Checks for missing mandatory fields.
Data Life Cycle
What is a Validity Check?
Verifies data against predefined rules or reference data.
Data Life Cycle
What is a Limit Check?
Checks data values against predefined upper and lower limits.
Data Life Cycle
What is a Size Check?
Checks if the number of characters exceeds the maximum allowed for the field.
System Availability Controls
What is a Full Backup and some characteristics?
System Availability Controls
What is an Incremental Backup and some characteristics?
System Availability Controls
What is an Differential Backup and some characteristics?
-Copies all changes made since the last full backup.
-Restoration is simpler, however, because the last full backup needs to be supplemented with only
the most recent differential backup, instead of a set of daily incremental backup files.
-Recovery using a differential backup is slower than a full backup but faster than an incremental one because only two copies are needed for restoration:
-the most recent full backup; and the single differential backup.
Network Infrastructure
Circuit-Level Gateway Firewall
A firewall that verifies the source of a packet and meets rules and policies set by the team.
Network Infrastructure
Application-Level Gateway Firewall
Firewall that inspects the packet itself.
Network Infrastructure
Network Address Translation Firewall
Assigns an internal network address to specific, approved external sources
Network Infrastructure
Stateful Multilayer Inspection Firewall
Combines packet-filtering and network address translation
Network Infrastructure
Next Gen Firewalls
Assigns different firewall rules to different applications as well as users. Low-threat applications has more permissive rules assigned while high-security applications have less permissive rules.