Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

DS0-001 Questions and Answers

Question # 6

Which of the following describes the purpose of a snapshot?

A.

To create a dynamic data replication

B.

To create a synonym

C.

To create a

D.

To create an image of a database

Full Access
Question # 7

Which of the following resources is the best way to lock rows in SQL Server?

A.

TID

B.

SID

C.

RID

D.

PID

Full Access
Question # 8

Which of the following is a reason to create a stored procedure?

A.

To minimize storage space

B.

To improve performance

C.

To bypass case sensitivity requirements

D.

To give control of the query logic to the user

Full Access
Question # 9

Which of the following is a typical instruction that is found on a Linux command-line script and represents a system shell?

A.

/bin/bash

B.

#/bin/shell

C.

>/bin/sh

D.

#!/bin/bash

Full Access
Question # 10

(Which of the following is the purpose of including a COLLATE clause in a column definition?)

A.

To create a computed column that is included in an index

B.

To specify how data is sorted in a database

C.

To support functional dependency

D.

To ensure all values entered into a column fall within a data range

Full Access
Question # 11

Which of the following types of RAID, if configured with the same number and type of disks, would provide the best write performance?

A.

RAID 3

B.

RAID 5

C.

RAID 6

D.

RAID 10

Full Access
Question # 12

(A database administrator has configured a Resource Governor with three resource pools. The first resource pool is assigned a minimum CPU and memory value of 25%. The second resource pool is assigned a minimum CPU and memory value of 35%. The database administrator wants to assign the maximum CPU and the maximum resource pool to the third resource. Which of the following is the maximum the database administrator should assign to the third resource?)

A.

20%

B.

40%

C.

60%

D.

100%

Full Access
Question # 13

A new retail store employee needs to be able to authenticate to a database. Which of the following commands should a database administrator use for this task?

A.

INSERT USER

B.

ALLOW USER

C.

CREATE USER

D.

ALTER USER

Full Access
Question # 14

Over the weekend, a company’s transaction database was moved to an upgraded server. All validations performed after the migration indicated that the database was functioning as expected. However, on Monday morning, multiple users reported that the corporate reporting application was not working.

Which of the following are the most likely causes? (Choose two.)

A.

The access permissions for the service account used by the reporting application were not changed.

B.

The new database server has its own reporting system, so the old one is not needed.

C.

The reporting jobs that could not process during the database migration have locked the application.

D.

The reporting application's mapping to the database location was not updated.

E.

The database server is not permitted to fulfill requests from a reporting application.

F.

The reporting application cannot keep up with the new, faster response from the database.

Full Access
Question # 15

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

Full Access
Question # 16

Which of the following commands is part of DDL?

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Full Access
Question # 17

An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?

A.

Bandwidth

B.

Encryption

C.

Redundancy

D.

Masking

Full Access
Question # 18

Which of the following statements contains an error?

A.

Select EmpId from employee where EmpId=90030

B.

Select EmpId where EmpId=90030 and DeptId=34

C.

Select* from employee where EmpId=90030

D.

Select EmpId from employee

Full Access
Question # 19

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examine first to troubleshoot the issue?

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance

Full Access
Question # 20

(Before installing a new database instance for an organization, a DBA needs to verify the amount of space, the hardware, and the network resources. Which of the following best describes this process?)

A.

Performing patch management

B.

Upgrading the database instance

C.

Checking for database prerequisites

D.

Provisioning the configuration

Full Access
Question # 21

Which of the following is used to write SQL queries in various programming languages?

A.

Indexing

B.

Object-relational mapping

C.

Excel

D.

Normalization

Full Access
Question # 22

(Analysts are writing complex queries across live tables for a database administrator. Which of the following is the best solution for the analysts to implement in order to improve user performance?)

A.

Creating views to support repeat queries

B.

Removing data redundancy

C.

Modifying the data in the table

D.

Deleting records from the table

Full Access
Question # 23

(A financial institution is running a database that contains PII. Database administrators need to provide table access to junior developers. Which of the following is the best option?)

A.

Role assignment

B.

Data masking

C.

View creation

D.

Policy enforcement

Full Access
Question # 24

Which of the following indexes stores records in a tabular format?

A.

Columnstore

B.

Non-clustered

C.

Unique

D.

Secondary

Full Access
Question # 25

(Which of the following are ORM tools? Select two.)

A.

PL/SQL

B.

XML

C.

Entity Framework

D.

T-SQL

E.

Hibernate

F.

PHP

Full Access
Question # 26

Which of the following is part of logical database infrastructure security?

A.

Surveillance

B.

Biometric access

C.

Perimeter network

D.

Cooling system

Full Access
Question # 27

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

Full Access
Question # 28

(Which of the following normal forms (NFs) is considered the most preferable for relational database design?)

A.

1NF

B.

2NF

C.

3NF

D.

4NF

Full Access
Question # 29

(Which of the following best describes the function of a wildcard in the WHERE clause?)

A.

An exact match is not possible in a CREATE statement.

B.

An exact match is necessary in a SELECT statement.

C.

An exact match is not possible in a SELECT statement.

D.

An exact match is necessary in a CREATE statement.

Full Access
Question # 30

Which of the following should a company develop to ensure preparedness for a fire in a data center?

A.

Deployment plan

B.

Backup plan

C.

Data retention policy

D.

Disaster recovery plan

Full Access
Question # 31

Which of the following constraints is used to enforce referential integrity?

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

Full Access
Question # 32

(A database manager would like to reduce the overhead caused by log-based recoveries. Which of the following should the manager use to best mitigate the situation?)

A.

Deadlocks

B.

Checkpoints

C.

Locks

D.

Indexes

Full Access
Question # 33

A database administrator is concerned about transactions in case the system fails. Which of the following properties addresses this concern?

A.

Durability

B.

Isolation

C.

Atomicity

D.

Consistency

Full Access
Question # 34

A company wants to deploy a new application that will distribute the workload to five different database instances. The database administrator needs to ensure that, for each copy of the database, users are able to read and write data that will be synchronized across all of the instances.

Which of the following should the administrator use to achieve this objective?

A.

[Peer-to-peer replication

B.

Failover clustering

C.

Log shipping

D.

Availability groups

Full Access
Question # 35

(Which of the following types of scripting can be executed on a web browser?)

A.

Server-side

B.

PowerShell

C.

Client-side

D.

Command-line

Full Access