Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA DS0-001 CompTIA DataSys+ Certification Exam Exam Practice Test

Demo: 35 questions
Total 118 questions

CompTIA DataSys+ Certification Exam Questions and Answers

Question 1

(Which of the following are ORM tools? Select two.)

Options:

A.

PL/SQL

B.

XML

C.

Entity Framework

D.

T-SQL

E.

Hibernate

F.

PHP

Question 2

A developer is designing a table that does not have repeated values. Which of the following indexes should the developer use to prevent duplicate values from being inserted?

Options:

A.

Unique

B.

Single column

C.

Implicit

D.

Composite

Question 3

Which of the following resources is the best way to lock rows in SQL Server?

Options:

A.

TID

B.

SID

C.

RID

D.

PID

Question 4

A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is the most likely cause of the issue?

Options:

A.

The SQL Server codes are performing badly.

B.

The SQL Server has not been tested properly.

C.

The SQL Server ports to the main machine are closed.

D.

The SQL Server has many concurrent users.

Question 5

Which of the following best describes the category of SQL commands required to revoke access to database objects?

Options:

A.

DCL

B.

IDDL

C.

IDML

D.

TCL

Question 6

Which of the following is an attack in which an attacker hopes to profit from locking the database software?

Options:

A.

Spear phishing

B.

Ransomware

C.

SQL injection

D.

On-path

Question 7

(Which of the following best describes the function of PowerShell in a database environment?)

Options:

A.

It allows Python to connect to databases.

B.

It allows Linux systems to connect to databases.

C.

It allows connections to databases through ODBC.

D.

It allows connections to databases through scripts.

Question 8

A database administrator is new to a company and wants to create a document that illustrates the interaction between tables. Which of the following should the administrator create?

Options:

A.

Troubleshooting guide

B.

Entity relationship diagram

C.

Data dictionary

D.

Database reference manual

Question 9

(Before installing a new database instance for an organization, a DBA needs to verify the amount of space, the hardware, and the network resources. Which of the following best describes this process?)

Options:

A.

Performing patch management

B.

Upgrading the database instance

C.

Checking for database prerequisites

D.

Provisioning the configuration

Question 10

Which of the following is part of logical database infrastructure security?

Options:

A.

Surveillance

B.

Biometric access

C.

Perimeter network

D.

Cooling system

Question 11

A database administrator is updating an organization's ERD. Which of the following is the best option for the database administrator to use?

Options:

A.

Word processor

B.

Spreadsheet

C.

UML tool

D.

HTML editor

Question 12

(A database administrator wants users to be able to access resources remotely from home. Which of the following best describes how the administrator can enable this access without compromising the security of the stored data?)

Options:

A.

Implement a virtual private network.

B.

Implement strong password policies.

C.

Configure and deploy a firewall.

D.

Implement a perimeter network for internet-facing database applications.

Question 13

A database administrator has been asked to assign a user the ability to view a data set. Which of the following practices best describes this request?

Options:

A.

Access control

B.

Security audit

C Database audit

C.

Password policy implementation

Question 14

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examine first to troubleshoot the issue?

Options:

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance

Question 15

A database administrator needs to provide access to data from two different tables to multiple group users in order to facilitate ongoing reporting. However, some columns in each table are restricted, and users should not be able to see the values in these columns.

Which of the following is the best action for the administrator to take?

Options:

A.

Create a stored procedure.

B.

Create a view.

C.

Create a csv export.

D.

Create a trigger.

Question 16

(New users at a company are reporting that the system is not accepting new credentials when the users are asked to change the credentials for the first time. Which of the following is the reason the credentials are being rejected?)

Options:

A.

Identity management

B.

Access controls

C.

Service accounts

D.

Password policies

Question 17

(Which of the following would a database administrator monitor to gauge server health? Select two.)

Options:

A.

CPU usage

B.

Memory usage

C.

Transaction logs

D.

Network sniffer

E.

Domain controllers

F.

Firewall traffic

Question 18

(Which of the following best describes the function of a wildcard in the WHERE clause?)

Options:

A.

An exact match is not possible in a CREATE statement.

B.

An exact match is necessary in a SELECT statement.

C.

An exact match is not possible in a SELECT statement.

D.

An exact match is necessary in a CREATE statement.

Question 19

Which of the following best describes a collection of data that shares the same properties or attributes?

Options:

A.

Relation set

B.

ER model

C.

Entity set

D.

Tuples

Question 20

(A healthcare company relies on contact forms and surveys on its website to properly communicate with patients. To which of the following attacks is the company’s data most vulnerable?)

Options:

A.

DoS

B.

Ransomware

C.

SQL injection

D.

Brute-force

Question 21

(Which of the following describes the method in which data is encrypted first with an encryption key and then wrapped by a managed root key?)

Options:

A.

Asymmetric encryption

B.

DEK-based encryption

C.

Symmetric encryption

D.

Envelope encryption

Question 22

Which of the following constraints is used to enforce referential integrity?

Options:

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

Question 23

Which of the following database structures is a type of NoSQL database?

Options:

A.

Hierarchical

B.

Key-value stores

C.

Cloud

D.

Object-oriented

Question 24

Which of the following is used to hide data in a database so the data can only be read by a user who has a key?

Options:

A.

Data security

B.

Data masking

C.

Data protection

D.

Data encryption

Question 25

(Evidence from logs shows multiple ongoing attempts to connect with a default account that was disabled. Which of the following best describes this type of attack?)

Options:

A.

Malware

B.

Brute-force

C.

On-path

D.

SQL injection

Question 26

A database administrator wants to remove inactive customers from a database. Which of the following statements should the administrator use?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 27

Which of the following sets the age requirement for data that should be recovered after a major disaster?

Options:

A.

MTBF

B.

RTO

C.

MTTF

D.

RPO

Question 28

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

Options:

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Question 29

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 30

A database administrator is concerned about transactions in case the system fails. Which of the following properties addresses this concern?

Options:

A.

Durability

B.

Isolation

C.

Atomicity

D.

Consistency

Question 31

Which of the following tools is used for natively running a Linux system in Windows?

Options:

A.

WSL

B.

[Remote Desktop Protocol

C.

SSH

D.

ITelnet

Question 32

A database administrator needs to ensure database backups are occurring on a daily basis and at scheduled times. Which of the following actions should the administrator take?

Options:

A.

Query the database to observe entries.

B.

Check the database schema.

C.

Review the backup media.

D.

Review the server logs for entries.

Question 33

Which of the following computer services associates IP network addresses with text-based names in order to facilitate identification and connectivity?

Options:

A.

LDAP

B.

NTP

C.

DHCP

D.

IDNS

Question 34

(Which of the following statements is TRUNCATE an example of?)

Options:

A.

DDL statement

B.

DCL statement

C.

MCL statement

D.

DML statement

Question 35

(Five minutes after a power failure occurred in a data center, a CO₂ system was automatically triggered. Which of the following caused the CO₂ system to start?)

Options:

A.

High temperatures activated the fire suppression system.

B.

RPO settings were configured to be applied in a short time frame.

C.

A cooling system set off the CO₂ system in order to protect the equipment.

D.

RTO settings were configured to be applied in a short time frame.

Demo: 35 questions
Total 118 questions