Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CompTIA DS0-001 Dumps

Page: 1 / 6
Total 80 questions

CompTIA Data Systems Certification Exam Questions and Answers

Question 1

Which of the following scripts would set the database recovery model for sys.database?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 2

Which of the following describes the purpose of a snapshot?

Options:

A.

To create a dynamic data replication

B.

To create a synonym

C.

To create a

D.

To create an image of a database

Question 3

Which of the following is the correct order of the steps in the database deployment process?

A)

1. Connect

2. Install

3. Configure

4. Confirm prerequisites

5. Validate

6. Test

7. Release

B)

1. Configure

2. Install

3. Connect

4. Test

5. Confirm prerequisites

6. Validate

7. Release

C)

1. Confirm prerequisites

2. Install

3. Configure

4. Connect

5. Test

6. Validate

7. Release

D)

1. Install

2. Configure

3. Confirm prerequisites

4. Connect

5. Test

6. Validate

7. Release

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 4

An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?

Options:

A.

DoS

B.

Brute-force

C.

SQL injection

D.

Phishing

Question 5

Which of the following is thebestway to migrate a large data load from one table to another, considering total time and blocking?

Options:

A.

Split the load size into many transactions.

B.

Split the load size in half and run simultaneously.

C.

Batch into small loads and run in parallel.

D.

Batch large loads into one transaction.

Question 6

Which of the following constraints is used to enforce referential integrity?

Options:

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

Question 7

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 8

Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?

Options:

A.

Open access

B.

Least resistance

C.

Elevated privilege

D.

Least privilege

Question 9

A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?

Options:

A.

SOP

B.

Data dictionaries

C.

UML diaqrams

D.

ERD

Question 10

Which of the following describes a scenario in which a database administrator would use a relational database rather than a non-relational database?

Options:

A.

An organization wants to maintain consistency among the data in the database.

B.

An organization requires data encryption.

C.

An organization wants to process complex data sets.

D.

An organization wants to store a large number of videos, photos, and documents.

Question 11

A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.

Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?

Options:

A.

UNION

B.

JOIN

C.

IINTERSECT

D.

CROSS JOIN

Question 12

A database administrator needs to ensure database backups are occurring on a daily basis and at scheduled times. Which of the following actions should the administrator take?

Options:

A.

Query the database to observe entries.

B.

Check the database schema.

C.

Review the backup media.

D.

Review the server logs for entries.

Question 13

Which of the followingbestdescribes a collection of data that shares the same properties or attributes?

Options:

A.

Relation set

B.

ER model

C.

Entity set

D.

Tuples

Question 14

A DBA left the company, and the DBA's account was removed from the system. Soon after, scheduled jobs began failing.

Which of the following would have most likely prevented this issue?

Options:

A.

Load balancing

B.

Business continuity plan

C.

Service accounts

D.

Assigning a data steward

Question 15

Which of the following is a typical instruction that is found on a Linux command-line script and represents a system shell?

Options:

A.

/bin/bash

B.

#/bin/shell

C.

>/bin/sh

D.

#!/bin/bash

Question 16

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

Options:

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

Question 17

A database administrator is conducting a stress test and providing feedback to a team that is developing an application that uses the Entity Framework. Which of the following explains the approach the administrator should use when conducting the stress test?

Options:

A.

Capture business logic, check the performance of codes, and report findings.

B.

Check the clustered and non-clustered indexes, and report findings.

C.

Review application tables and columns, and report findings.

D.

Write queries directly into the database and report findings.

Question 18

Which of the following tools is used for natively running a Linux system in Windows?

Options:

A.

WSL

B.

[Remote Desktop Protocol

C.

SSH

D.

ITelnet

Question 19

A business analyst is using a client table and an invoice table to create a database view that shows clients who have not made purchases yet. Which of the following joins ismostappropriate for the analyst to use to create this database view?

Options:

A.

INNER JOIN ON Client.Key = Invoice.Key

B.

RIGHT JOIN ON Client.Key = Invoice.Key WHERE BY Client.Key ISNOLL

C.

LEFT JOIN ON Client.Key = Invoice.Key

D.

LEFT JOIN ON Client.Key = Invoice.Key WHEREBY Invoice.Key ISNOLL

Question 20

Which of the following is used to hide data in a database so the data can only be read by a user who has a key?

Options:

A.

Data security

B.

Data masking

C.

Data protection

D.

Data encryption

Question 21

Which of the following database structures is a type of NoSQL database?

Options:

A.

Hierarchical

B.

Key-value stores

C.

Cloud

D.

Object-oriented

Question 22

Which of the following ismostlikely to prevent tampering with server hardware that houses data?

Options:

A.

Biometric locks

B.

Strong password policy

C.

Network firewall

D.

Surveillance cameras

Question 23

A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?

Options:

A.

Audit access to tables with sensitive data.

B.

Remove sensitive data from tables

C.

Mask the sensitive data.

D.

Encrypt connections to the development environment.

Page: 1 / 6
Total 80 questions