Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA DS0-001 CompTIA Data Systems Certification Exam Exam Practice Test

Page: 1 / 8
Total 80 questions

CompTIA Data Systems Certification Exam Questions and Answers

Question 1

A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?

Options:

A.

Audit access to tables with sensitive data.

B.

Remove sensitive data from tables

C.

Mask the sensitive data.

D.

Encrypt connections to the development environment.

Question 2

Which of the following is thebestway to migrate a large data load from one table to another, considering total time and blocking?

Options:

A.

Split the load size into many transactions.

B.

Split the load size in half and run simultaneously.

C.

Batch into small loads and run in parallel.

D.

Batch large loads into one transaction.

Question 3

A database administrator is new to a company and wants to create a document that illustrates the interaction between tables. Which of the following should the administrator create?

Options:

A.

Troubleshooting guide

B.

Entity relationship diagram

C.

Data dictionary

D.

Database reference manual

Question 4

Which of the following cloud delivery models provides users with thehighestlevel of flexibility regarding resource provisioning and administration?

Options:

A.

DBaaS

B.

IaaS

C.

SaaS

D.

PaaS

Question 5

Which of the following is a typical instruction that is found on a Linux command-line script and represents a system shell?

Options:

A.

/bin/bash

B.

#/bin/shell

C.

>/bin/sh

D.

#!/bin/bash

Question 6

A company is launching a proof-of-concept, cloud-based application. One of the requirements is to select a database engine that will allow administrators to perform quick and simple queries on unstructured data.Which of the following would bebestsuited for this task?

Options:

A.

MonogoDB

B.

MS SQL

C.

Oracle

D.

Graph database

Question 7

Which of the following scripts would set the database recovery model for sys.database?

A)

Question # 7

B)

Question # 7

C)

Question # 7

D)

Question # 7

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 8

Which of the following database instances are created by default when SQL Server is installed? (Choose two.)

Options:

A.

Root

B.

Master

C.

Log

D.

Model

E.

View

F.

Index

Question 9

Which of the following is an attack in which an attacker hopes to profit from locking the database software?

Options:

A.

Spear phishing

B.

Ransomware

C.

SQL injection

D.

On-path

Question 10

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

Options:

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

Question 11

A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.

Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?

Options:

A.

UNION

B.

JOIN

C.

IINTERSECT

D.

CROSS JOIN

Question 12

A database administrator is concerned about transactions in case the system fails. Which of the following properties addresses this concern?

Options:

A.

Durability

B.

Isolation

C.

Atomicity

D.

Consistency

Question 13

A database is configured to use undo management with temporary undo enabled. AnUPDATEis run on the table.

Which of the following describes where the undo is stored?

Options:

A.

In the system global area

B.

In the undo

C.

In the SYSAUX

D.

In the temporary

Question 14

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Question # 14

Which of the followingbestdescribes this backup plan?

Options:

A.

Monthly full, daily differential

B.

Daily differential

C.

Daily full

D.

Weekly full, daily incremental

Question 15

Which of the following database structures is a type of NoSQL database?

Options:

A.

Hierarchical

B.

Key-value stores

C.

Cloud

D.

Object-oriented

Question 16

Which of the following is a reason to create a stored procedure?

Options:

A.

To minimize storage space

B.

To improve performance

C.

To bypass case sensitivity requirements

D.

To give control of the query logic to the user

Question 17

Which of the following sets the age requirement for data that should be recovered after a major disaster?

Options:

A.

MTBF

B.

RTO

C.

MTTF

D.

RPO

Question 18

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

Options:

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

Question 19

Which of the following is the correct order of the steps in the database deployment process?

A)

1. Connect

2. Install

3. Configure

4. Confirm prerequisites

5. Validate

6. Test

7. Release

B)

1. Configure

2. Install

3. Connect

4. Test

5. Confirm prerequisites

6. Validate

7. Release

C)

1. Confirm prerequisites

2. Install

3. Configure

4. Connect

5. Test

6. Validate

7. Release

D)

1. Install

2. Configure

3. Confirm prerequisites

4. Connect

5. Test

6. Validate

7. Release

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 20

A database administrator manages a database server that is running low on disk space. A lot of backup files are stored on the server's disks.

Which of the following is thebestaction for the administrator to take?

Options:

A.

Move all the backup files to external disks.

B.

Delete all the backup files containing data that is rated as classified.

C.

Delete all the backup files that are not required by the backup retention policy.

D.

Delete all the backup files except for the most recent one.

Question 21

An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?

Options:

A.

DoS

B.

Brute-force

C.

SQL injection

D.

Phishing

Question 22

A business analyst is using a client table and an invoice table to create a database view that shows clients who have not made purchases yet. Which of the following joins ismostappropriate for the analyst to use to create this database view?

Options:

A.

INNER JOIN ON Client.Key = Invoice.Key

B.

RIGHT JOIN ON Client.Key = Invoice.Key WHERE BY Client.Key ISNOLL

C.

LEFT JOIN ON Client.Key = Invoice.Key

D.

LEFT JOIN ON Client.Key = Invoice.Key WHEREBY Invoice.Key ISNOLL

Question 23

A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?

Options:

A.

SOP

B.

Data dictionaries

C.

UML diaqrams

D.

ERD

Question 24

Which of the following resources is the best way to lock rows in SQL Server?

Options:

A.

TID

B.

SID

C.

RID

D.

PID

Page: 1 / 8
Total 80 questions