New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CompTIA DS0-001 CompTIA DataSys+ Certification Exam Exam Practice Test

Page: 1 / 8
Total 80 questions

CompTIA DataSys+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following database instances are created by default when SQL Server is installed? (Choose two.)

Options:

A.

Root

B.

Master

C.

Log

D.

Model

E.

View

F.

Index

Question 2

A server administrator wants to analyze a database server's disk throughput. Which of the following should the administrator measure?

Options:

A.

RPfvl

B.

Latency

C.

IOPS

D.

Reads

Question 3

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

Options:

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Question 4

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

Options:

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

Question 5

Which of the following is used to hide data in a database so the data can only be read by a user who has a key?

Options:

A.

Data security

B.

Data masking

C.

Data protection

D.

Data encryption

Question 6

A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?

Options:

A.

Audit access to tables with sensitive data.

B.

Remove sensitive data from tables

C.

Mask the sensitive data.

D.

Encrypt connections to the development environment.

Question 7

A database administrator is updating an organization's ERD. Which of the following is thebestoption for the database administrator to use?

Options:

A.

Word processor

B.

Spreadsheet

C.

UML tool

D.

HTML editor

Question 8

Which of the following cloud storage options provides users with endpoints to retrieve data via REST API?

Options:

A.

Network file

B.

Object

C.

Ephemeral

D.

iBIock

Question 9

Which of the following types of RAID, if configured with the same number and type of disks, would provide thebestwrite performance?

Options:

A.

RAID 3

B.

RAID 5

C.

RAID 6

D.

RAID 10

Question 10

A database is configured to use undo management with temporary undo enabled. AnUPDATEis run on the table.

Which of the following describes where the undo is stored?

Options:

A.

In the system global area

B.

In the undo

C.

In the SYSAUX

D.

In the temporary

Question 11

A company wants to deploy a new application that will distribute the workload to five different database instances. The database administrator needs to ensure that, for each copy of the database, users are able to read and write data that will be synchronized across all of the instances.

Which of the following should the administrator use to achieve this objective?

Options:

A.

[Peer-to-peer replication

B.

Failover clustering

C.

Log shipping

D.

Availability groups

Question 12

A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is thebestway for the administrator to accomplish this task?

Options:

A.

Create a materialized view.

B.

Create indexes on those tables

C.

Create a new database.

D.

Create a function.

Question 13

Which of the following is the correct order of the steps in the database deployment process?

A)

1. Connect

2. Install

3. Configure

4. Confirm prerequisites

5. Validate

6. Test

7. Release

B)

1. Configure

2. Install

3. Connect

4. Test

5. Confirm prerequisites

6. Validate

7. Release

C)

1. Confirm prerequisites

2. Install

3. Configure

4. Connect

5. Test

6. Validate

7. Release

D)

1. Install

2. Configure

3. Confirm prerequisites

4. Connect

5. Test

6. Validate

7. Release

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 15

A database administrator needs to provide access to data from two different tables to multiple group users in order to facilitate ongoing reporting. However, some columns in each table are restricted, and users should not be able to see the values in these columns.

Which of the following is thebestaction for the administrator to take?

Options:

A.

Create a stored procedure.

B.

Create a view.

C.

Create a csv export.

D.

Create a trigger.

Question 16

Which of the following is thebestway to migrate a large data load from one table to another, considering total time and blocking?

Options:

A.

Split the load size into many transactions.

B.

Split the load size in half and run simultaneously.

C.

Batch into small loads and run in parallel.

D.

Batch large loads into one transaction.

Question 17

A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?

Options:

A.

SOP

B.

Data dictionaries

C.

UML diaqrams

D.

ERD

Question 18

Which of the following commands is part of DDL?

Options:

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Question 19

Which of the following concepts applies to situations that require court files to be scanned for permanent reference and original documents be stored for ten years before they can be discarded?

Options:

A.

Data loss prevention

B.

Data retention policies

C.

Data classification

D.

Global regulations

Question 20

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

Options:

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

Question 21

Which of the following is an attack in which an attacker hopes to profit from locking the database software?

Options:

A.

Spear phishing

B.

Ransomware

C.

SQL injection

D.

On-path

Question 22

A business analyst is using a client table and an invoice table to create a database view that shows clients who have not made purchases yet. Which of the following joins ismostappropriate for the analyst to use to create this database view?

Options:

A.

INNER JOIN ON Client.Key = Invoice.Key

B.

RIGHT JOIN ON Client.Key = Invoice.Key WHERE BY Client.Key ISNOLL

C.

LEFT JOIN ON Client.Key = Invoice.Key

D.

LEFT JOIN ON Client.Key = Invoice.Key WHEREBY Invoice.Key ISNOLL

Question 23

Which of the following describes a scenario in which a database administrator would use a relational database rather than a non-relational database?

Options:

A.

An organization wants to maintain consistency among the data in the database.

B.

An organization requires data encryption.

C.

An organization wants to process complex data sets.

D.

An organization wants to store a large number of videos, photos, and documents.

Question 24

Which of the following resources is the best way to lock rows in SQL Server?

Options:

A.

TID

B.

SID

C.

RID

D.

PID

Page: 1 / 8
Total 80 questions