Question 1 :
To build a data warehouse and develop business intelligence applications, it is important that an organization build and maintain a comprehensive repository.
Question 2 :
Failure to control confidentiality may lead to loss of competitiveness.
Question 3 :
Authorization tables contain highly sensitive data and should be protected by stringent security rules.
Question 4 :
A transaction log shows before and after images of records that have been modified by transactions.
Question 5 :
The greatest threat to business security is often internal rather than external.