Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?
A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examinefirstto troubleshoot the issue?
A server administrator wants to analyze a database server's disk throughput. Which of the following should the administrator measure?
A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.
Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?
Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?
A new retail store employee needs to be able to authenticate to a database. Which of the following commands should a database administrator use for this task?
Which of the following is used to hide data in a database so the data can only be read by a user who has a key?
Which of the following should a company develop to ensure preparedness for a fire in a data center?
Which of the following ismostlikely to prevent tampering with server hardware that houses data?
Which of the following resources is the best way to lock rows in SQL Server?
A database administrator needs a tool to document and explain the relationships between data in an organization's database. Which of the following is thebesttool to accomplish this task?
A database administrator is updating an organization's ERD. Which of the following is thebestoption for the database administrator to use?
A developer is designing a table that does not have repeated values. Which of the following indexes should the developer use to prevent duplicate values from being inserted?
Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?
Which of the following is the deployment phase in which a DBA ensures the most recent patches are applied to the new database?
A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?