Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA DataSys+ > DS0-001

DS0-001 CompTIA DataSys+ Certification Exam Question and Answers

Question # 4

(Analysts are writing complex queries across live tables for a database administrator. Which of the following is the best solution for the analysts to implement in order to improve user performance?)

A.

Creating views to support repeat queries

B.

Removing data redundancy

C.

Modifying the data in the table

D.

Deleting records from the table

Full Access
Question # 5

A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is the most likely cause of the issue?

A.

The SQL Server codes are performing badly.

B.

The SQL Server has not been tested properly.

C.

The SQL Server ports to the main machine are closed.

D.

The SQL Server has many concurrent users.

Full Access
Question # 6

Which of the following statements contains an error?

A.

Select EmpId from employee where EmpId=90030

B.

Select EmpId where EmpId=90030 and DeptId=34

C.

Select* from employee where EmpId=90030

D.

Select EmpId from employee

Full Access
Question # 7

(A company’s database was hacked. A security officer conducted an audit and discovered that an attacker used a rainbow table to break into one of the user accounts to access the database. Which of the following is the best immediate response to this attack?)

A.

Security and awareness training

B.

Implementation of security policies and procedures

C.

Strong passwords

D.

Password hash salting

Full Access
Question # 8

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Which of the following best describes this backup plan?

A.

Monthly full, daily differential

B.

Daily differential

C.

Daily full

D.

Weekly full, daily incremental

Full Access
Question # 9

A database administrator has been asked to assign a user the ability to view a data set. Which of the following practices best describes this request?

A.

Access control

B.

Security audit

C Database audit

C.

Password policy implementation

Full Access
Question # 10

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

Full Access
Question # 11

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examine first to troubleshoot the issue?

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance

Full Access
Question # 12

Which of the following types of RAID, if configured with the same number and type of disks, would provide the best write performance?

A.

RAID 3

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 13

A database administrator is updating an organization's ERD. Which of the following is the best option for the database administrator to use?

A.

Word processor

B.

Spreadsheet

C.

UML tool

D.

HTML editor

Full Access
Question # 14

A DBA left the company, and the DBA's account was removed from the system. Soon after, scheduled jobs began failing.

Which of the following would have most likely prevented this issue?

A.

Load balancing

B.

Business continuity plan

C.

Service accounts

D.

Assigning a data steward

Full Access
Question # 15

Which of the following is an advantage of creating indexes?

A.

To help with space allocation

B.

To provide quick and efficient access to data

C.

To reduce memory

D.

To update the query plan

Full Access
Question # 16

(Which of the following is a CPU-intensive operation that improves database performance and information retrieval?)

A.

Database compression

B.

Patch management

C.

Index optimization

D.

Data corruption checks

Full Access
Question # 17

(Which of the following statements is TRUNCATE an example of?)

A.

DDL statement

B.

DCL statement

C.

MCL statement

D.

DML statement

Full Access
Question # 18

Which of the following is used to write SQL queries in various programming languages?

A.

Indexing

B.

Object-relational mapping

C.

Excel

D.

Normalization

Full Access
Question # 19

Which of the following indexes stores records in a tabular format?

A.

Columnstore

B.

Non-clustered

C.

Unique

D.

Secondary

Full Access
Question # 20

Which of the following is a characteristic of all non-relational databases?

A.

Columns with the same data type

B.

Unstructured data

C.

Logical record groupings

D.

Tabular schema

Full Access
Question # 21

Which of the following is the best way to migrate a large data load from one table to another, considering total time and blocking?

A.

Split the load size into many transactions.

B.

Split the load size in half and run simultaneously.

C.

Batch into small loads and run in parallel.

D.

Batch large loads into one transaction.

Full Access
Question # 22

(A shared folder can only be accessed by authorized users. Which of the following policies was applied in this scenario?)

A.

Password policies

B.

Rights and privileges

C.

Service accounts

D.

Firewall policy

Full Access
Question # 23

A database administrator is conducting a stress test and providing feedback to a team that is developing an application that uses the Entity Framework. Which of the following explains the approach the administrator should use when conducting the stress test?

A.

Capture business logic, check the performance of codes, and report findings.

B.

Check the clustered and non-clustered indexes, and report findings.

C.

Review application tables and columns, and report findings.

D.

Write queries directly into the database and report findings.

Full Access
Question # 24

A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?

A.

Audit access to tables with sensitive data.

B.

Remove sensitive data from tables

C.

Mask the sensitive data.

D.

Encrypt connections to the development environment.

Full Access
Question # 25

Which of the following is an attack in which an attacker hopes to profit from locking the database software?

A.

Spear phishing

B.

Ransomware

C.

SQL injection

D.

On-path

Full Access
Question # 26

A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company’s transactional data. Which of the following tasks should the administrator perform first?

A.

Create a new service account exclusively for the business intelligence application.

B.

Build a separate data warehouse customized to the business intelligence application's specifications.

C.

Set up a nightly FTP data transfer from the database server to the business intelligence application server.

D.

Send the business intelligence administrator the approved TNS names file to configure the data mapping.

E.

Open a new port on the database server exclusively for the business intelligence application.

Full Access
Question # 27

Which of the following would a database administrator monitor to gauge server health? (Choose two.)

A.

CPU usage

B.

Memory usage

C.

Transaction logs

D.

Network sniffer

E.

Domain controllers

F.

Firewall traffic

Full Access
Question # 28

Which of the following describes a scenario in which a database administrator would use a relational database rather than a non-relational database?

A.

An organization wants to maintain consistency among the data in the database.

B.

An organization requires data encryption.

C.

An organization wants to process complex data sets.

D.

An organization wants to store a large number of videos, photos, and documents.

Full Access
Question # 29

A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is the best way for the administrator to accomplish this task?

A.

Create a materialized view.

B.

Create indexes on those tables

C.

Create a new database.

D.

Create a function.

Full Access
Question # 30

A company is launching a proof-of-concept, cloud-based application. One of the requirements is to select a database engine that will allow administrators to perform quick and simple queries on unstructured data. Which of the following would be best suited for this task?

A.

MonogoDB

B.

MS SQL

C.

Oracle

D.

Graph database

Full Access
Question # 31

Which of the following is the correct order of the steps in the database deployment process?

A)

1. Connect

2. Install

3. Configure

4. Confirm prerequisites

5. Validate

6. Test

7. Release

B)

1. Configure

2. Install

3. Connect

4. Test

5. Confirm prerequisites

6. Validate

7. Release

C)

1. Confirm prerequisites

2. Install

3. Configure

4. Connect

5. Test

6. Validate

7. Release

D)

1. Install

2. Configure

3. Confirm prerequisites

4. Connect

5. Test

6. Validate

7. Release

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 32

(Which of the following normal forms (NFs) is considered the most preferable for relational database design?)

A.

1NF

B.

2NF

C.

3NF

D.

4NF

Full Access
Question # 33

(A database administrator wants users to be able to access resources remotely from home. Which of the following best describes how the administrator can enable this access without compromising the security of the stored data?)

A.

Implement a virtual private network.

B.

Implement strong password policies.

C.

Configure and deploy a firewall.

D.

Implement a perimeter network for internet-facing database applications.

Full Access
Question # 34

Which of the following is used to hide data in a database so the data can only be read by a user who has a key?

A.

Data security

B.

Data masking

C.

Data protection

D.

Data encryption

Full Access
Question # 35

An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?

A.

Bandwidth

B.

Encryption

C.

Redundancy

D.

Masking

Full Access