Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA DS0-001 - CompTIA DataSys+ Certification Exam

Page: 2 / 3
Total 80 questions

Which of the following is a reason to create a stored procedure?

A.

To minimize storage space

B.

To improve performance

C.

To bypass case sensitivity requirements

D.

To give control of the query logic to the user

Which of the following is a characteristic of all non-relational databases?

A.

Columns with the same data type

B.

Unstructured data

C.

Logical record groupings

D.

Tabular schema

A database administrator is concerned about transactions in case the system fails. Which of the following properties addresses this concern?

A.

Durability

B.

Isolation

C.

Atomicity

D.

Consistency

A business analyst is using a client table and an invoice table to create a database view that shows clients who have not made purchases yet. Which of the following joins ismostappropriate for the analyst to use to create this database view?

A.

INNER JOIN ON Client.Key = Invoice.Key

B.

RIGHT JOIN ON Client.Key = Invoice.Key WHERE BY Client.Key ISNOLL

C.

LEFT JOIN ON Client.Key = Invoice.Key

D.

LEFT JOIN ON Client.Key = Invoice.Key WHEREBY Invoice.Key ISNOLL

Which of the following have data manipulation and procedural scripting power? (Choose two.)

A.

PQL

B.

PL/SQL

C.

Advanced

D.

SQL

E.

SQL

F.

T-SQL

An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?

A.

Bandwidth

B.

Encryption

C.

Redundancy

D.

Masking

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which of the following commands is part of DDL?

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Which of the following is a result of an on-path attack on a system?

A.

A Wi-Fi networkthat redirects to clones of legitimate websites

B.

A website that has crashed and is no longer accessible

C.

An email from an unknown source requesting bank account details

D.

A web application that returns the addresses of its customers

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examinefirstto troubleshoot the issue?

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance