Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CompTIA Data Systems Certification Exam Question and Answers

CompTIA Data Systems Certification Exam

Last Update May 2, 2024
Total Questions : 80

We are offering FREE DS0-001 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare DS0-001 free exam questions and then go for complete pool of CompTIA Data Systems Certification Exam test questions that will help you more.

DS0-001 pdf

DS0-001 PDF

$35  $99.99
DS0-001 Engine

DS0-001 Testing Engine

$42  $119.99
DS0-001 PDF + Engine

DS0-001 PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following database structures is a type of NoSQL database?

Options:

A.  

Hierarchical

B.  

Key-value stores

C.  

Cloud

D.  

Object-oriented

Discussion 0
Questions 2

A developer is designing a table that does not have repeated values. Which of the following indexes should the developer use to prevent duplicate values from being inserted?

Options:

A.  

Unique

B.  

Single column

C.  

Implicit

D.  

Composite

Discussion 0
Questions 3

A programmer wants to configure a database to only allow read or write access when requests are coming from specific IP addresses. Which of the following can be used to configure IP addresses to allow access to the database?

Options:

A.  

Static IP address

B.  

Firewall

C.  

Dynamic IP address

D.  

IDNS

Discussion 0
Questions 4

Over the weekend, a company’s transaction database was moved to an upgraded server. All validations performed after the migration indicated that the database was functioning as expected. However, on Monday morning, multiple users reported that the corporate reporting application was not working.

Which of the following are the most likely causes? (Choose two.)

Options:

A.  

The access permissions for the service account used by the reporting application were not changed.

B.  

The new database server has its own reporting system, so the old one is not needed.

C.  

The reporting jobs that could not process during the database migration have locked the application.

D.  

The reporting application's mapping to the database location was not updated.

E.  

The database server is not permitted to fulfill requests from a reporting application.

F.  

The reporting application cannot keep up with the new, faster response from the database.

Discussion 0
Questions 5

A database administrator is creating a table, which will contain customer data, for an online business. Which of the following SQL syntaxes should the administrator use to create an object?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 6

Which of the following services is responsible for assigning, managing, and reclaiming IP addresses on a TCP/IP-based network?

Options:

A.  

DNS

B.  

DHCP

C.  

LDAP

D.  

ISMTP

Discussion 0
Questions 7

Which of the following tools is used for natively running a Linux system in Windows?

Options:

A.  

WSL

B.  

[Remote Desktop Protocol

C.  

SSH

D.  

ITelnet

Discussion 0
Questions 8

Which of the following sets the age requirement for data that should be recovered after a major disaster?

Options:

A.  

MTBF

B.  

RTO

C.  

MTTF

D.  

RPO

Discussion 0
Questions 9

Which of the following is a reason to create a stored procedure?

Options:

A.  

To minimize storage space

B.  

To improve performance

C.  

To bypass case sensitivity requirements

D.  

To give control of the query logic to the user

Discussion 0
Questions 10

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 11

Which of the following are the best resources for monitoring potential server issues? (Choose two.)

Options:

A.  

User connections

B.  

Firewall usage

C.  

Index usage

D.  

CPU usage

E.  

Query execution

F.  

Memory usage

Discussion 0
Questions 12

A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company’s transactional data. Which of the following tasks should the administrator performfirst?

Options:

A.  

Create a new service account exclusively for the business intelligence application.

B.  

Build a separate data warehouse customized to the business intelligence application's specifications.

C.  

Set up a nightly FTP data transfer from the database server to the business intelligence application server.

D.  

Send the business intelligence administrator the approved TNS names file to configure the data mapping.

E.  

Open a new port on the database server exclusively for the business intelligence application.

Discussion 0
Questions 13

Which of the following have data manipulation and procedural scripting power? (Choose two.)

Options:

A.  

PQL

B.  

PL/SQL

C.  

Advanced

D.  

SQL

E.  

SQL

F.  

T-SQL

Discussion 0
Questions 14

Which of the followingbestdescribes the category of SQL commands required to revoke access to database objects?

Options:

A.  

DCL

B.  

IDDL

C.  

IDML

D.  

TCL

Discussion 0
Questions 15

A group of developers needs access to a database in a development environment, but the database contains sensitive data. Which of the following should the database administrator do before giving the developers access to the environment?

Options:

A.  

Audit access to tables with sensitive data.

B.  

Remove sensitive data from tables

C.  

Mask the sensitive data.

D.  

Encrypt connections to the development environment.

Discussion 0
Questions 16

A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is thebestway for the administrator to accomplish this task?

Options:

A.  

Create a materialized view.

B.  

Create indexes on those tables

C.  

Create a new database.

D.  

Create a function.

Discussion 0
Questions 17

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Which of the followingbestdescribes this backup plan?

Options:

A.  

Monthly full, daily differential

B.  

Daily differential

C.  

Daily full

D.  

Weekly full, daily incremental

Discussion 0
Questions 18

A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is themostlikely cause of the issue?

Options:

A.  

The SQL Server codes are performing badly.

B.  

The SQL Server has not been tested properly.

C.  

The SQL Server ports to the main machine are closed.

D.  

The SQL Server has many concurrent users.

Discussion 0
Questions 19

A database administrator has been asked to assign a user the ability to view a data set. Which of the following practices best describes this request?

Options:

A.  

Access control

B.  

Security audit

C Database audit

C.  

Password policy implementation

Discussion 0
Questions 20

A new retail store employee needs to be able to authenticate to a database. Which of the following commands should a database administrator use for this task?

Options:

A.  

INSERT USER

B.  

ALLOW USER

C.  

CREATE USER

D.  

ALTER USER

Discussion 0
Questions 21

A database administrator needs a tool to document and explain the relationships between data in an organization's database. Which of the following is thebesttool to accomplish this task?

Options:

A.  

Text editor

B.  

UML editor

C.  

Word processor

D.  

SQL query

Discussion 0
Questions 22

A company needs to prepare a document that establishes the responsibilities, metrics, penalties, and other generalities that a provider would have to fulfill for customers to use its platforms.

Which of the following documents meets these requirements?

Options:

A.  

DOU

B.  

SLA

C.  

MOU

D.  

SOW

Discussion 0
Questions 23

Which of the following constraints is used to enforce referential integrity?

Options:

A.  

Surrogate key

B.  

Foreign key

C.  

Unique key

D.  

Primary key

Discussion 0
Questions 24

Which of the following computer services associates IP network addresses with text-based names in order to facilitate identification and connectivity?

Options:

A.  

LDAP

B.  

NTP

C.  

DHCP

D.  

IDNS

Discussion 0