Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following computer services associates IP network addresses with text-based names in order to facilitate identification and connectivity?

A.

LDAP

B.

NTP

C.

DHCP

D.

IDNS

Full Access
Question # 5

Which of the following would a database administrator monitor to gauge server health? (Choose two.)

A.

CPU usage

B.

Memory usage

C.

Transaction logs

D.

Network sniffer

E.

Domain controllers

F.

Firewall traffic

Full Access
Question # 6

A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:

Which of the followingbestdescribes this backup plan?

A.

Monthly full, daily differential

B.

Daily differential

C.

Daily full

D.

Weekly full, daily incremental

Full Access
Question # 7

Which of the followingbestdescribes a collection of data that shares the same properties or attributes?

A.

Relation set

B.

ER model

C.

Entity set

D.

Tuples

Full Access
Question # 8

A database administrator is new to a company and wants to create a document that illustrates the interaction between tables. Which of the following should the administrator create?

A.

Troubleshooting guide

B.

Entity relationship diagram

C.

Data dictionary

D.

Database reference manual

Full Access
Question # 9

A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?

A.

ETL

B.

Replication

C.

Database dumping

D.

Backup and restore

Full Access
Question # 10

Given the following customer table:

Which of the following ORM snippets would return the ID, state, and country of all customers with the newest customers appearingfirst?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

A database is configured to use undo management with temporary undo enabled. AnUPDATEis run on the table.

Which of the following describes where the undo is stored?

A.

In the system global area

B.

In the undo

C.

In the SYSAUX

D.

In the temporary

Full Access
Question # 12

An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?

A.

DoS

B.

Brute-force

C.

SQL injection

D.

Phishing

Full Access
Question # 13

Which of the following is part of logical database infrastructure security?

A.

Surveillance

B.

Biometric access

C.

Perimeter network

D.

Cooling system

Full Access
Question # 14

Which of the following is an attack in which an attacker hopes to profit from locking the database software?

A.

Spear phishing

B.

Ransomware

C.

SQL injection

D.

On-path

Full Access
Question # 15

Which of the following commands is part of DDL?

A.

UPDATE

B.

GRANT

C.

CREATE

D.

INSERT

Full Access
Question # 16

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examinefirstto troubleshoot the issue?

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance

Full Access
Question # 17

Which of the following concepts applies to situations that require court files to be scanned for permanent reference and original documents be stored for ten years before they can be discarded?

A.

Data loss prevention

B.

Data retention policies

C.

Data classification

D.

Global regulations

Full Access
Question # 18

Which of the following is the correct order of the steps in the database deployment process?

A)

1. Connect

2. Install

3. Configure

4. Confirm prerequisites

5. Validate

6. Test

7. Release

B)

1. Configure

2. Install

3. Connect

4. Test

5. Confirm prerequisites

6. Validate

7. Release

C)

1. Confirm prerequisites

2. Install

3. Configure

4. Connect

5. Test

6. Validate

7. Release

D)

1. Install

2. Configure

3. Confirm prerequisites

4. Connect

5. Test

6. Validate

7. Release

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is themostlikely cause of the issue?

A.

The SQL Server codes are performing badly.

B.

The SQL Server has not been tested properly.

C.

The SQL Server ports to the main machine are closed.

D.

The SQL Server has many concurrent users.

Full Access
Question # 20

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Full Access
Question # 21

Which of the following tools is used for natively running a Linux system in Windows?

A.

WSL

B.

[Remote Desktop Protocol

C.

SSH

D.

ITelnet

Full Access
Question # 22

Which of the following are the best resources for monitoring potential server issues? (Choose two.)

A.

User connections

B.

Firewall usage

C.

Index usage

D.

CPU usage

E.

Query execution

F.

Memory usage

Full Access
Question # 23

Which of the following is a typical instruction that is found on a Linux command-line script and represents a system shell?

A.

/bin/bash

B.

#/bin/shell

C.

>/bin/sh

D.

#!/bin/bash

Full Access
Question # 24

Which of the following statements contains an error?

A.

Select EmpId from employee where EmpId=90030

B.

Select EmpId where EmpId=90030 and DeptId=34

C.

Select* from employee where EmpId=90030

D.

Select EmpId from employee

Full Access