Which of the following describes the purpose of a snapshot?
A. To create a dynamic data replication
B. To create a synonym
C. To create a
D. To create an image of a database
Which of the following is an advantage of creating indexes?
A. To help with space allocation
B. To provide quick and efficient access to data
C. To reduce memory
D. To update the query plan
A company wants to deploy a new application that will distribute the workload to five different database instances. The database administrator needs to ensure that, for each copy of the database, users are able to read and write data that will be synchronized across all of the instances.
Which of the following should the administrator use to achieve this objective?
A. [Peer-to-peer replication
B. Failover clustering
C. Log shipping
D. Availability groups
A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company's transactional data. Which of the following tasks should the administrator performfirst?
A. Create a new service account exclusively for the business intelligence application.
B. Build a separate data warehouse customized to the business intelligence application's specifications.
C. Set up a nightly FTP data transfer from the database server to the business intelligence application server.
D. Send the business intelligence administrator the approved TNS names file to configure the data mapping.
E. Open a new port on the database server exclusively for the business intelligence application.
Which of the following is used to hide data in a database so the data can only be read by a user who has a key?
A. Data security
B. Data masking
C. Data protection
D. Data encryption
Which of the following is the deployment phase in which a DBA ensures the most recent patches are applied to the new database?
A. Importing
B. Upgrading
C. Provisioning D. Modifying
Which of the following is a typical instruction that is found on a Linux command-line script and represents a system shell?
A. /bin/bash
B. #/bin/shell
C. >/bin/sh
D. #!/bin/bash
Which of the following tools is used for natively running a Linux system in Windows?
A. WSL
B. [Remote Desktop Protocol
C. SSH D. ITelnet
A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?
A. SOP
B. Data dictionaries
C. UML diaqrams
D. ERD
During a routine audit, a database administrator discovers that the department manager's birthday is next week. The database administrator decides to plan a birthday party for the manager. Which of the following guidelines would the administrator violate by planning the party?
A. PII
B. PCI DSS
C. SOX
D. ANSI