Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA DS0-001 - CompTIA DataSys+ Certification Exam

Page: 2 / 4
Total 118 questions

(Which of the following statements is TRUNCATE an example of?)

A.

DDL statement

B.

DCL statement

C.

MCL statement

D.

DML statement

Which of the following constraints is used to enforce referential integrity?

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Which of the following best describes this backup plan?

A.

Monthly full, daily differential

B.

Daily differential

C.

Daily full

D.

Weekly full, daily incremental

(A developer needs to integrate a trigger to execute an action in a database. Which of the following SQL snippets is a correct use of a trigger?)

A.

CREATE TRIGGER trigger_test

BEFORE ALTER

ON flights

FOR EACH ROW

SET add_ons = 0;

B.

CREATE TRIGGER trigger_test

DURING UPDATE

ON flights

FOR EACH ROW

SET flight_status = 'booked';

C.

CREATE TRIGGER trigger_test

AFTER DROP

ON flights

FOR EACH ROW

SET add_ons = 0;

D.

CREATE TRIGGER trigger_test

BEFORE UPDATE

ON flights

FOR EACH ROW

SET flight_count = flight_count_prev + 1;

Which of the following sets the age requirement for data that should be recovered after a major disaster?

A.

MTBF

B.

RTO

C.

MTTF

D.

RPO

A company wants to deploy a new application that will distribute the workload to five different database instances. The database administrator needs to ensure that, for each copy of the database, users are able to read and write data that will be synchronized across all of the instances.

Which of the following should the administrator use to achieve this objective?

A.

[Peer-to-peer replication

B.

Failover clustering

C.

Log shipping

D.

Availability groups

(An IT manager needs to create a workflow for a new application. Which of the following tools should the manager use to facilitate the creation of a workflow?)

A.

ERD

B.

UML

C.

ETL

D.

ORM

A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company’s transactional data. Which of the following tasks should the administrator perform first?

A.

Create a new service account exclusively for the business intelligence application.

B.

Build a separate data warehouse customized to the business intelligence application's specifications.

C.

Set up a nightly FTP data transfer from the database server to the business intelligence application server.

D.

Send the business intelligence administrator the approved TNS names file to configure the data mapping.

E.

Open a new port on the database server exclusively for the business intelligence application.

(New users at a company are reporting that the system is not accepting new credentials when the users are asked to change the credentials for the first time. Which of the following is the reason the credentials are being rejected?)

A.

Identity management

B.

Access controls

C.

Service accounts

D.

Password policies

A database administrator needs to provide access to data from two different tables to multiple group users in order to facilitate ongoing reporting. However, some columns in each table are restricted, and users should not be able to see the values in these columns.

Which of the following is the best action for the administrator to take?

A.

Create a stored procedure.

B.

Create a view.

C.

Create a csv export.

D.

Create a trigger.