When an Access application connected to a database does something to cause JET/ACE to flag the database for a need to be required, the Suspect State can often be set to True for the possible offender.
If the Suspect State is every set to true, I have often have found there is a reason for concern.