Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CompTIA DS0-001 Dumps

Page: 1 / 12
Total 118 questions

CompTIA DataSys+ Certification Exam Questions and Answers

Question 1

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

as

Which of the following best describes this backup plan?

Options:

A.

Monthly full, daily differential

B.

Daily differential

C.

Daily full

D.

Weekly full, daily incremental

Question 2

Which of the following is most likely to prevent tampering with server hardware that houses data?

Options:

A.

Biometric locks

B.

Strong password policy

C.

Network firewall

D.

Surveillance cameras

Question 3

Which of the following is part of logical database infrastructure security?

Options:

A.

Surveillance

B.

Biometric access

C.

Perimeter network

D.

Cooling system

Question 4

A database administrator needs a tool to document and explain the relationships between data in an organization's database. Which of the following is the best tool to accomplish this task?

Options:

A.

Text editor

B.

UML editor

C.

Word processor

D.

SQL query

Question 5

A developer is designing a table that does not have repeated values. Which of the following indexes should the developer use to prevent duplicate values from being inserted?

Options:

A.

Unique

B.

Single column

C.

Implicit

D.

Composite

Question 6

A database is configured to use undo management with temporary undo enabled. An UPDATE is run on the table.

Which of the following describes where the undo is stored?

Options:

A.

In the system global area

B.

In the undo

C.

In the SYSAUX

D.

In the temporary

Question 7

Which of the following would a database administrator monitor to gauge server health? (Choose two.)

Options:

A.

CPU usage

B.

Memory usage

C.

Transaction logs

D.

Network sniffer

E.

Domain controllers

F.

Firewall traffic

Question 8

(An analyst in the United States configured a database server so it could be accessed remotely by users in Brazil and Canada. Users in Brazil can connect to the server, but users in Canada cannot connect to the server. Which of the following is the reason for the issue?)

Options:

A.

The perimeter network is rejecting remote connections.

B.

The rule set was configured to allow specific IP addresses.

C.

The firewall was configured to deny all connections.

D.

The server port security is disabled.

Question 9

(Analysts are writing complex queries across live tables for a database administrator. Which of the following is the best solution for the analysts to implement in order to improve user performance?)

Options:

A.

Creating views to support repeat queries

B.

Removing data redundancy

C.

Modifying the data in the table

D.

Deleting records from the table

Question 10

Which of the following is the deployment phase in which a DBA ensures the most recent patches are applied to the new database?

Options:

A.

Importing

B.

Upgrading

C.

Provisioning

D.

Modifying

Question 11

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

Options:

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Question 12

A company needs to prepare a document that establishes the responsibilities, metrics, penalties, and other generalities that a provider would have to fulfill for customers to use its platforms.

Which of the following documents meets these requirements?

Options:

A.

DOU

B.

SLA

C.

MOU

D.

SOW

Question 13

Which of the following is a reason to create a stored procedure?

Options:

A.

To minimize storage space

B.

To improve performance

C.

To bypass case sensitivity requirements

D.

To give control of the query logic to the user

Question 14

A database administrator needs to provide access to data from two different tables to multiple group users in order to facilitate ongoing reporting. However, some columns in each table are restricted, and users should not be able to see the values in these columns.

Which of the following is the best action for the administrator to take?

Options:

A.

Create a stored procedure.

B.

Create a view.

C.

Create a csv export.

D.

Create a trigger.

Question 15

A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?

Options:

A.

SOP

B.

Data dictionaries

C.

UML diaqrams

D.

ERD

Question 16

Which of the following is a typical instruction that is found on a Linux command-line script and represents a system shell?

Options:

A.

/bin/bash

B.

#/bin/shell

C.

>/bin/sh

D.

#!/bin/bash

Question 17

(Which of the following types of scripting can be executed on a web browser?)

Options:

A.

Server-side

B.

PowerShell

C.

Client-side

D.

Command-line

Question 18

Which of the following computer services associates IP network addresses with text-based names in order to facilitate identification and connectivity?

Options:

A.

LDAP

B.

NTP

C.

DHCP

D.

IDNS

Question 19

(Which of the following best describes the function of a wildcard in the WHERE clause?)

Options:

A.

An exact match is not possible in a CREATE statement.

B.

An exact match is necessary in a SELECT statement.

C.

An exact match is not possible in a SELECT statement.

D.

An exact match is necessary in a CREATE statement.

Question 20

(A database administrator wants to create a database that does not have a predefined schema. Which of the following tools should the administrator use to create this type of database? Select two.)

Options:

A.

PostgreSQL

B.

MariaDB

C.

MySQL

D.

SQL Server

E.

MongoDB

F.

Cosmos

Question 21

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 22

Which of the following is an advantage of creating indexes?

Options:

A.

To help with space allocation

B.

To provide quick and efficient access to data

C.

To reduce memory

D.

To update the query plan

Question 23

Which of the following is the best way to migrate a large data load from one table to another, considering total time and blocking?

Options:

A.

Split the load size into many transactions.

B.

Split the load size in half and run simultaneously.

C.

Batch into small loads and run in parallel.

D.

Batch large loads into one transaction.

Question 24

An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?

Options:

A.

DoS

B.

Brute-force

C.

SQL injection

D.

Phishing

Question 25

Which of the following best describes a collection of data that shares the same properties or attributes?

Options:

A.

Relation set

B.

ER model

C.

Entity set

D.

Tuples

Question 26

A database administrator is conducting a stress test and providing feedback to a team that is developing an application that uses the Entity Framework. Which of the following explains the approach the administrator should use when conducting the stress test?

Options:

A.

Capture business logic, check the performance of codes, and report findings.

B.

Check the clustered and non-clustered indexes, and report findings.

C.

Review application tables and columns, and report findings.

D.

Write queries directly into the database and report findings.

Question 27

A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is the most likely cause of the issue?

Options:

A.

The SQL Server codes are performing badly.

B.

The SQL Server has not been tested properly.

C.

The SQL Server ports to the main machine are closed.

D.

The SQL Server has many concurrent users.

Question 28

(Which of the following statements is TRUNCATE an example of?)

Options:

A.

DDL statement

B.

DCL statement

C.

MCL statement

D.

DML statement

Question 29

Which of the following commands is part of DDL?

Options:

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Question 30

Which of the following can be used to protect physical database appliances from damage in a server room? (Choose two.)

Options:

A.

Biometric access systems

B.

Database control systems

C.

Fire suppression systems

D.

Camera systems

E.

Key card systems

F.

Cooling systems

Question 31

Which of the following have data manipulation and procedural scripting power? (Choose two.)

Options:

A.

PQL

B.

PL/SQL

C.

Advanced

D.

SQL

E.

SQL

F.

T-SQL

Question 32

Which of the following tools is used for natively running a Linux system in Windows?

Options:

A.

WSL

B.

[Remote Desktop Protocol

C.

SSH

D.

ITelnet

Question 33

Which of the following constraints is used to enforce referential integrity?

Options:

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

Question 34

(Which of the following are ORM tools? Select two.)

Options:

A.

PL/SQL

B.

XML

C.

Entity Framework

D.

T-SQL

E.

Hibernate

F.

PHP

Question 35

(A company’s database was hacked. A security officer conducted an audit and discovered that an attacker used a rainbow table to break into one of the user accounts to access the database. Which of the following is the best immediate response to this attack?)

Options:

A.

Security and awareness training

B.

Implementation of security policies and procedures

C.

Strong passwords

D.

Password hash salting

Page: 1 / 12
Total 118 questions