CISSP Practice question #191

Relational databases uses:
A: A hierarchy model.
B: An object model..
C: Star schema model.
D: Tables with rows and columns.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


D: Relational model: Organizes data into one or more tables (or relations) of columns and rows, with a unique key identifying each row. Rows are also called records or tuples. Generally, each table/relation represents one entity type. The rows represent instances of that type of entity and the columns representing values attributed to that instance.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

You may also like

5 Comments

  1. A RD system can provide the features to let people do anything they want in it and still be called ‘relational’!
    You can interrogate the DB structure itself through an Object Model, and the low level aspects of it, well, yeah, it all comes down to tables with Rows and Columns. But it’s how you define the structure if it’s relational or not.
    Isn’t a Star Scheme also relational, just a different hierarchy? You’ve still got the primary/foreign keys defining a structure and thus relations to other tables, thus relational database.

    But there’s more than one correct answer in those options, just what level are you looking at it? From a ‘getting things done’ it’s D, from a ‘how do we perceive the structure’ it’d usually be A. But the others could be argued. In fact… the more I think about this, and the direction Microsoft is moving here, if D is the right answer now, then B will be the right answer soon, as they really want you to stop thinking about the low level of the DB and thinking about getting the data out in a ‘simpler’ manner. (I disagree with all this, but MS will be MS).

    Might be worth asking as a follow up question;
    “Does a RD REQUIRE a primary key?”
    and
    “when would you use a ‘natural key’ over a system generate key”

    Then you could delve off into GUIDs etc.

Leave a Reply