Winter Sale Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA DS0-001 CompTIA DataSys+ Certification Exam Exam Practice Test

Page: 1 / 12
Total 118 questions

CompTIA DataSys+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

Which of the following database structures is a type of NoSQL database?

Options:

A.

Hierarchical

B.

Key-value stores

C.

Cloud

D.

Object-oriented

Question 2

Which of the following is a result of an on-path attack on a system?

Options:

A.

A Wi-Fi network that redirects to clones of legitimate websites

B.

A website that has crashed and is no longer accessible

C.

An email from an unknown source requesting bank account details

D.

A web application that returns the addresses of its customers

Question 3

Which of the following commands is part of DDL?

Options:

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Question 4

Which of the following resources is the best way to lock rows in SQL Server?

Options:

A.

TID

B.

SID

C.

RID

D.

PID

Question 5

(A business analyst queries the same few tables every quarter and does not want to write new SQL code every time. Which of the following would best support the business analyst’s needs and allow the database administrator to optimize disk space?)

Options:

A.

Table

B.

View

C.

Function

D.

Stored procedure

Question 6

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

Options:

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

Question 7

(Before installing a new database instance for an organization, a DBA needs to verify the amount of space, the hardware, and the network resources. Which of the following best describes this process?)

Options:

A.

Performing patch management

B.

Upgrading the database instance

C.

Checking for database prerequisites

D.

Provisioning the configuration

Question 8

A server administrator wants to analyze a database server's disk throughput. Which of the following should the administrator measure?

Options:

A.

RPfvl

B.

Latency

C.

IOPS

D.

Reads

Question 9

(An analyst in the United States configured a database server so it could be accessed remotely by users in Brazil and Canada. Users in Brazil can connect to the server, but users in Canada cannot connect to the server. Which of the following is the reason for the issue?)

Options:

A.

The perimeter network is rejecting remote connections.

B.

The rule set was configured to allow specific IP addresses.

C.

The firewall was configured to deny all connections.

D.

The server port security is disabled.

Question 10

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

Options:

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

Question 11

(Five minutes after a power failure occurred in a data center, a CO₂ system was automatically triggered. Which of the following caused the CO₂ system to start?)

Options:

A.

High temperatures activated the fire suppression system.

B.

RPO settings were configured to be applied in a short time frame.

C.

A cooling system set off the CO₂ system in order to protect the equipment.

D.

RTO settings were configured to be applied in a short time frame.

Question 12

(A database system crashed during a routine migration process. Which of the following should the systems administrator refer to for guidance in this situation?)

Options:

A.

The data retention policy

B.

The access control policy

C.

The database compliance policy

D.

The continuity of operations policy

Question 13

Which of the following statements contains an error?

Options:

A.

Select EmpId from employee where EmpId=90030

B.

Select EmpId where EmpId=90030 and DeptId=34

C.

Select* from employee where EmpId=90030

D.

Select EmpId from employee

Question 14

A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is the best way for the administrator to accomplish this task?

Options:

A.

Create a materialized view.

B.

Create indexes on those tables

C.

Create a new database.

D.

Create a function.

Question 15

Which of the following describes a scenario in which a database administrator would use a relational database rather than a non-relational database?

Options:

A.

An organization wants to maintain consistency among the data in the database.

B.

An organization requires data encryption.

C.

An organization wants to process complex data sets.

D.

An organization wants to store a large number of videos, photos, and documents.

Question 16

Which of the following types of RAID, if configured with the same number and type of disks, would provide the best write performance?

Options:

A.

RAID 3

B.

RAID 5

C.

RAID 6

D.

RAID 10

Question 17

(A healthcare company relies on contact forms and surveys on its website to properly communicate with patients. To which of the following attacks is the company’s data most vulnerable?)

Options:

A.

DoS

B.

Ransomware

C.

SQL injection

D.

Brute-force

Question 18

Which of the following concepts applies to situations that require court files to be scanned for permanent reference and original documents be stored for ten years before they can be discarded?

Options:

A.

Data loss prevention

B.

Data retention policies

C.

Data classification

D.

Global regulations

Question 19

(Which of the following best describes the function of PowerShell in a database environment?)

Options:

A.

It allows Python to connect to databases.

B.

It allows Linux systems to connect to databases.

C.

It allows connections to databases through ODBC.

D.

It allows connections to databases through scripts.

Question 20

A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?

Options:

A.

SOP

B.

Data dictionaries

C.

UML diaqrams

D.

ERD

Question 21

(Which of the following statements is TRUNCATE an example of?)

Options:

A.

DDL statement

B.

DCL statement

C.

MCL statement

D.

DML statement

Question 22

Which of the following tools is used for natively running a Linux system in Windows?

Options:

A.

WSL

B.

[Remote Desktop Protocol

C.

SSH

D.

ITelnet

Question 23

(New users at a company are reporting that the system is not accepting new credentials when the users are asked to change the credentials for the first time. Which of the following is the reason the credentials are being rejected?)

Options:

A.

Identity management

B.

Access controls

C.

Service accounts

D.

Password policies

Question 24

A company needs information about the performance of users in the sales department. Which of the following commands should a database administrator use for this task?

Options:

A.

DROP

B.

InPDATE

C.

[delete

D.

ISELECT

Question 25

Which of the following is an attack in which an attacker hopes to profit from locking the database software?

Options:

A.

Spear phishing

B.

Ransomware

C.

SQL injection

D.

On-path

Question 26

Given the following customer table:

Which of the following ORM snippets would return the ID, state, and country of all customers with the newest customers appearing first?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 27

(Which of the following would a database administrator monitor to gauge server health? Select two.)

Options:

A.

CPU usage

B.

Memory usage

C.

Transaction logs

D.

Network sniffer

E.

Domain controllers

F.

Firewall traffic

Question 28

Which of the following is the correct order of the steps in the database deployment process?

A)

1. Connect

2. Install

3. Configure

4. Confirm prerequisites

5. Validate

6. Test

7. Release

B)

1. Configure

2. Install

3. Connect

4. Test

5. Confirm prerequisites

6. Validate

7. Release

C)

1. Confirm prerequisites

2. Install

3. Configure

4. Connect

5. Test

6. Validate

7. Release

D)

1. Install

2. Configure

3. Confirm prerequisites

4. Connect

5. Test

6. Validate

7. Release

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 29

Which of the following best describes the category of SQL commands required to revoke access to database objects?

Options:

A.

DCL

B.

IDDL

C.

IDML

D.

TCL

Question 30

Which of the following constraints is used to enforce referential integrity?

Options:

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

Question 31

(Which of the following types of scripting can be executed on a web browser?)

Options:

A.

Server-side

B.

PowerShell

C.

Client-side

D.

Command-line

Question 32

(Which of the following describes the method in which data is encrypted first with an encryption key and then wrapped by a managed root key?)

Options:

A.

Asymmetric encryption

B.

DEK-based encryption

C.

Symmetric encryption

D.

Envelope encryption

Question 33

Which of the following have data manipulation and procedural scripting power? (Choose two.)

Options:

A.

PQL

B.

PL/SQL

C.

Advanced

D.

SQL

E.

SQL

F.

T-SQL

Question 34

A developer is designing a table that does not have repeated values. Which of the following indexes should the developer use to prevent duplicate values from being inserted?

Options:

A.

Unique

B.

Single column

C.

Implicit

D.

Composite

Question 35

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Which of the following best describes this backup plan?

Options:

A.

Monthly full, daily differential

B.

Daily differential

C.

Daily full

D.

Weekly full, daily incremental

Page: 1 / 12
Total 118 questions