Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA DS0-001 Dumps Questions Answers

Page: 1 / 9
Total 118 questions

CompTIA DataSys+ Certification Exam Questions and Answers

Question 1

(Which of the following is used to store product quantities in a table while ensuring the minimal amount of storage is consumed?)

Options:

A.

DOUBLE

B.

INTEGER

C.

COUNT

D.

FLOAT

Buy Now
Question 2

Which of the following commands is part of DDL?

Options:

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Question 3

(An analyst in the United States configured a database server so it could be accessed remotely by users in Brazil and Canada. Users in Brazil can connect to the server, but users in Canada cannot connect to the server. Which of the following is the reason for the issue?)

Options:

A.

The perimeter network is rejecting remote connections.

B.

The rule set was configured to allow specific IP addresses.

C.

The firewall was configured to deny all connections.

D.

The server port security is disabled.

Question 4

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Which of the following best describes this backup plan?

Options:

A.

Monthly full, daily differential

B.

Daily differential

C.

Daily full

D.

Weekly full, daily incremental

Question 5

Which of the following constraints is used to enforce referential integrity?

Options:

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

Question 6

(A database administrator has configured a Resource Governor with three resource pools. The first resource pool is assigned a minimum CPU and memory value of 25%. The second resource pool is assigned a minimum CPU and memory value of 35%. The database administrator wants to assign the maximum CPU and the maximum resource pool to the third resource. Which of the following is the maximum the database administrator should assign to the third resource?)

Options:

A.

20%

B.

40%

C.

60%

D.

100%

Question 7

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examine first to troubleshoot the issue?

Options:

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance

Question 8

(Which of the following would a database administrator monitor to gauge server health? Select two.)

Options:

A.

CPU usage

B.

Memory usage

C.

Transaction logs

D.

Network sniffer

E.

Domain controllers

F.

Firewall traffic

Question 9

Which of the following describes a scenario in which a database administrator would use a relational database rather than a non-relational database?

Options:

A.

An organization wants to maintain consistency among the data in the database.

B.

An organization requires data encryption.

C.

An organization wants to process complex data sets.

D.

An organization wants to store a large number of videos, photos, and documents.

Question 10

(Which of the following is used to store product quantities in a table while ensuring the minimal amount of storage is consumed?)

Options:

A.

DOUBLE

B.

INTEGER

C.

COUNT

D.

FLOAT

Question 11

(A shared folder can only be accessed by authorized users. Which of the following policies was applied in this scenario?)

Options:

A.

Password policies

B.

Rights and privileges

C.

Service accounts

D.

Firewall policy

Question 12

A business analyst is using a client table and an invoice table to create a database view that shows clients who have not made purchases yet. Which of the following joins is most appropriate for the analyst to use to create this database view?

Options:

A.

INNER JOIN ON Client.Key = Invoice.Key

B.

RIGHT JOIN ON Client.Key = Invoice.Key WHERE BY Client.Key IS NOLL

C.

LEFT JOIN ON Client.Key = Invoice.Key

D.

LEFT JOIN ON Client.Key = Invoice.Key WHERE BY Invoice.Key IS NOLL

Question 13

Which of the following database structures is a type of NoSQL database?

Options:

A.

Hierarchical

B.

Key-value stores

C.

Cloud

D.

Object-oriented

Question 14

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

Options:

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Question 15

(A healthcare company relies on contact forms and surveys on its website to properly communicate with patients. To which of the following attacks is the company’s data most vulnerable?)

Options:

A.

DoS

B.

Ransomware

C.

SQL injection

D.

Brute-force

Question 16

(Five minutes after a power failure occurred in a data center, a CO₂ system was automatically triggered. Which of the following caused the CO₂ system to start?)

Options:

A.

High temperatures activated the fire suppression system.

B.

RPO settings were configured to be applied in a short time frame.

C.

A cooling system set off the CO₂ system in order to protect the equipment.

D.

RTO settings were configured to be applied in a short time frame.

Question 17

(A database manager would like to reduce the overhead caused by log-based recoveries. Which of the following should the manager use to best mitigate the situation?)

Options:

A.

Deadlocks

B.

Checkpoints

C.

Locks

D.

Indexes

Question 18

A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.

Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?

Options:

A.

UNION

B.

JOIN

C.

IINTERSECT

D.

CROSS JOIN

Question 19

Which of the following is a characteristic of all non-relational databases?

Options:

A.

Columns with the same data type

B.

Unstructured data

C.

Logical record groupings

D.

Tabular schema

Question 20

Which of the following is an attack in which an attacker hopes to profit from locking the database software?

Options:

A.

Spear phishing

B.

Ransomware

C.

SQL injection

D.

On-path

Question 21

An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?

Options:

A.

Bandwidth

B.

Encryption

C.

Redundancy

D.

Masking

Question 22

Which of the following database instances are created by default when SQL Server is installed? (Choose two.)

Options:

A.

Root

B.

Master

C.

Log

D.

Model

E.

View

F.

Index

Question 23

Which of the following is a result of an on-path attack on a system?

Options:

A.

A Wi-Fi network that redirects to clones of legitimate websites

B.

A website that has crashed and is no longer accessible

C.

An email from an unknown source requesting bank account details

D.

A web application that returns the addresses of its customers

Question 24

(Which of the following are ORM tools? Select two.)

Options:

A.

PL/SQL

B.

XML

C.

Entity Framework

D.

T-SQL

E.

Hibernate

F.

PHP

Question 25

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

Options:

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

Question 26

(Which of the following is a CPU-intensive operation that improves database performance and information retrieval?)

Options:

A.

Database compression

B.

Patch management

C.

Index optimization

D.

Data corruption checks

Question 27

A new retail store employee needs to be able to authenticate to a database. Which of the following commands should a database administrator use for this task?

Options:

A.

INSERT USER

B.

ALLOW USER

C.

CREATE USER

D.

ALTER USER

Question 28

(Which of the following normal forms (NFs) is considered the most preferable for relational database design?)

Options:

A.

1NF

B.

2NF

C.

3NF

D.

4NF

Question 29

(Before installing a new database instance for an organization, a DBA needs to verify the amount of space, the hardware, and the network resources. Which of the following best describes this process?)

Options:

A.

Performing patch management

B.

Upgrading the database instance

C.

Checking for database prerequisites

D.

Provisioning the configuration

Question 30

A DBA left the company, and the DBA's account was removed from the system. Soon after, scheduled jobs began failing.

Which of the following would have most likely prevented this issue?

Options:

A.

Load balancing

B.

Business continuity plan

C.

Service accounts

D.

Assigning a data steward

Question 31

A database administrator is concerned about transactions in case the system fails. Which of the following properties addresses this concern?

Options:

A.

Durability

B.

Isolation

C.

Atomicity

D.

Consistency

Question 32

Which of the following NFs is considered the most preferable for relational database design?

Options:

A.

1 NF

B.

3 NF

C.

4 NF

D.

2NF

Question 33

Which of the following can be used to protect physical database appliances from damage in a server room? (Choose two.)

Options:

A.

Biometric access systems

B.

Database control systems

C.

Fire suppression systems

D.

Camera systems

E.

Key card systems

F.

Cooling systems

Question 34

Which of the following have data manipulation and procedural scripting power? (Choose two.)

Options:

A.

PQL

B.

PL/SQL

C.

Advanced

D.

SQL

E.

SQL

F.

T-SQL

Question 35

A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is the best way for the administrator to accomplish this task?

Options:

A.

Create a materialized view.

B.

Create indexes on those tables

C.

Create a new database.

D.

Create a function.

Page: 1 / 9
Total 118 questions