A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.
Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?
(A systems analyst receives an error report and wants to quickly switch the rows to columns in order to match the format required for analysis. Which of the following spreadsheet functions should the analyst use to make this change?)
A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?
Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?
Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?
Which of the following NFs is considered the most preferable for relational database design?
(A company’s database was hacked. A security officer conducted an audit and discovered that an attacker used a rainbow table to break into one of the user accounts to access the database. Which of the following is the best immediate response to this attack?)
Which of the following is a potential issue raised by enterprise database users?
A database administrator wants to remove inactive customers from a database. Which of the following statements should the administrator use?
A)

B)

C)

D)

(Before installing a new database instance for an organization, a DBA needs to verify the amount of space, the hardware, and the network resources. Which of the following best describes this process?)