(Analysts are writing complex queries across live tables for a database administrator. Which of the following is the best solution for the analysts to implement in order to improve user performance?)
A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is the most likely cause of the issue?
(A company’s database was hacked. A security officer conducted an audit and discovered that an attacker used a rainbow table to break into one of the user accounts to access the database. Which of the following is the best immediate response to this attack?)
A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Which of the following best describes this backup plan?
A database administrator has been asked to assign a user the ability to view a data set. Which of the following practices best describes this request?
A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?
A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examine first to troubleshoot the issue?
Which of the following types of RAID, if configured with the same number and type of disks, would provide the best write performance?
A database administrator is updating an organization's ERD. Which of the following is the best option for the database administrator to use?
A DBA left the company, and the DBA's account was removed from the system. Soon after, scheduled jobs began failing.
Which of the following would have most likely prevented this issue?
(Which of the following is a CPU-intensive operation that improves database performance and information retrieval?)
Which of the following is used to write SQL queries in various programming languages?
Which of the following is a characteristic of all non-relational databases?
Which of the following is the best way to migrate a large data load from one table to another, considering total time and blocking?
(A shared folder can only be accessed by authorized users. Which of the following policies was applied in this scenario?)
A database administrator is conducting a stress test and providing feedback to a team that is developing an application that uses the Entity Framework. Which of the following explains the approach the administrator should use when conducting the stress test?
A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?
Which of the following is an attack in which an attacker hopes to profit from locking the database software?
A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company’s transactional data. Which of the following tasks should the administrator perform first?
Which of the following would a database administrator monitor to gauge server health? (Choose two.)
Which of the following describes a scenario in which a database administrator would use a relational database rather than a non-relational database?
A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is the best way for the administrator to accomplish this task?
A company is launching a proof-of-concept, cloud-based application. One of the requirements is to select a database engine that will allow administrators to perform quick and simple queries on unstructured data. Which of the following would be best suited for this task?
Which of the following is the correct order of the steps in the database deployment process?
A)
1. Connect
2. Install
3. Configure
4. Confirm prerequisites
5. Validate
6. Test
7. Release
B)
1. Configure
2. Install
3. Connect
4. Test
5. Confirm prerequisites
6. Validate
7. Release
C)
1. Confirm prerequisites
2. Install
3. Configure
4. Connect
5. Test
6. Validate
7. Release
D)
1. Install
2. Configure
3. Confirm prerequisites
4. Connect
5. Test
6. Validate
7. Release
(Which of the following normal forms (NFs) is considered the most preferable for relational database design?)
(A database administrator wants users to be able to access resources remotely from home. Which of the following best describes how the administrator can enable this access without compromising the security of the stored data?)
Which of the following is used to hide data in a database so the data can only be read by a user who has a key?
An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?