Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the CompTIA DataSys+ DS0-001 Questions and answers with ValidTests

Exam DS0-001 All Questions
Exam DS0-001 Premium Access

View all detail and faqs for the DS0-001 exam

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.

Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?

Options:

A.

UNION

B.

JOIN

C.

IINTERSECT

D.

CROSS JOIN

Questions # 32:

(A systems analyst receives an error report and wants to quickly switch the rows to columns in order to match the format required for analysis. Which of the following spreadsheet functions should the analyst use to make this change?)

Options:

A.

Concat

B.

VLOOKUP

C.

Transpose

D.

Clean

Questions # 33:

A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?

Options:

A.

Audit access to tables with sensitive data.

B.

Remove sensitive data from tables

C.

Mask the sensitive data.

D.

Encrypt connections to the development environment.

Questions # 34:

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

Options:

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Questions # 35:

Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?

Options:

A.

Open access

B.

Least resistance

C.

Elevated privilege

D.

Least privilege

Questions # 36:

Which of the following NFs is considered the most preferable for relational database design?

Options:

A.

1 NF

B.

3 NF

C.

4 NF

D.

2NF

Questions # 37:

(A company’s database was hacked. A security officer conducted an audit and discovered that an attacker used a rainbow table to break into one of the user accounts to access the database. Which of the following is the best immediate response to this attack?)

Options:

A.

Security and awareness training

B.

Implementation of security policies and procedures

C.

Strong passwords

D.

Password hash salting

Questions # 38:

Which of the following is a potential issue raised by enterprise database users?

Options:

A.

The need for multiple views or windows into the same database

B.

The need to manage long transactions

C.

The need for concurrent access and multiuser updates

D.

The need to manually transfer records to paper

Questions # 39:

A database administrator wants to remove inactive customers from a database. Which of the following statements should the administrator use?

A)

Question # 39

B)

Question # 39

C)

Question # 39

D)

Question # 39

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions # 40:

(Before installing a new database instance for an organization, a DBA needs to verify the amount of space, the hardware, and the network resources. Which of the following best describes this process?)

Options:

A.

Performing patch management

B.

Upgrading the database instance

C.

Checking for database prerequisites

D.

Provisioning the configuration

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions