New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Data+ > DS0-001

DS0-001 CompTIA DataSys+ Certification Exam Question and Answers

Question # 4

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

Full Access
Question # 5

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examinefirstto troubleshoot the issue?

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance

Full Access
Question # 6

A server administrator wants to analyze a database server's disk throughput. Which of the following should the administrator measure?

A.

RPfvl

B.

Latency

C.

IOPS

D.

Reads

Full Access
Question # 7

A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.

Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?

A.

UNION

B.

JOIN

C.

IINTERSECT

D.

CROSS JOIN

Full Access
Question # 8

Which of the following commands is part of DDL?

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Full Access
Question # 9

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Full Access
Question # 10

Which of the following NoSQL database typesbestcategorizes MongoDB?

A.

Document

B.

Column-oriented

C.

Graph

D.

Key-value stores

Full Access
Question # 11

A new retail store employee needs to be able to authenticate to a database. Which of the following commands should a database administrator use for this task?

A.

INSERT USER

B.

ALLOW USER

C.

CREATE USER

D.

ALTER USER

Full Access
Question # 12

Which of the following is used to hide data in a database so the data can only be read by a user who has a key?

A.

Data security

B.

Data masking

C.

Data protection

D.

Data encryption

Full Access
Question # 13

Which of the following is a reason to create a stored procedure?

A.

To minimize storage space

B.

To improve performance

C.

To bypass case sensitivity requirements

D.

To give control of the query logic to the user

Full Access
Question # 14

Which of the following should a company develop to ensure preparedness for a fire in a data center?

A.

Deployment plan

B.

Backup plan

C.

Data retention policy

D.

Disaster recovery plan

Full Access
Question # 15

Which of the following database structures is a type of NoSQL database?

A.

Hierarchical

B.

Key-value stores

C.

Cloud

D.

Object-oriented

Full Access
Question # 16

Which of the following ismostlikely to prevent tampering with server hardware that houses data?

A.

Biometric locks

B.

Strong password policy

C.

Network firewall

D.

Surveillance cameras

Full Access
Question # 17

Which of the following resources is the best way to lock rows in SQL Server?

A.

TID

B.

SID

C.

RID

D.

PID

Full Access
Question # 18

A database administrator needs a tool to document and explain the relationships between data in an organization's database. Which of the following is thebesttool to accomplish this task?

A.

Text editor

B.

UML editor

C.

Word processor

D.

SQL query

Full Access
Question # 19

A database administrator is updating an organization's ERD. Which of the following is thebestoption for the database administrator to use?

A.

Word processor

B.

Spreadsheet

C.

UML tool

D.

HTML editor

Full Access
Question # 20

A developer is designing a table that does not have repeated values. Which of the following indexes should the developer use to prevent duplicate values from being inserted?

A.

Unique

B.

Single column

C.

Implicit

D.

Composite

Full Access
Question # 21

Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?

A.

Open access

B.

Least resistance

C.

Elevated privilege

D.

Least privilege

Full Access
Question # 22

Which of the following is the deployment phase in which a DBA ensures the most recent patches are applied to the new database?

A.

Importing

B.

Upgrading

C.

Provisioning

D.

Modifying

Full Access
Question # 23

A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?

A.

Audit access to tables with sensitive data.

B.

Remove sensitive data from tables

C.

Mask the sensitive data.

D.

Encrypt connections to the development environment.

Full Access