Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Over the weekend, a company’s transaction database was moved to an upgraded server. All validations performed after the migration indicated that the database was functioning as expected. However, on Monday morning, multiple users reported that the corporate reporting application was not working.

Which of the following are the most likely causes? (Choose two.)

A.

The access permissions for the service account used by the reporting application were not changed.

B.

The new database server has its own reporting system, so the old one is not needed.

C.

The reporting jobs that could not process during the database migration have locked the application.

D.

The reporting application's mapping to the database location was not updated.

E.

The database server is not permitted to fulfill requests from a reporting application.

F.

The reporting application cannot keep up with the new, faster response from the database.

A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is the best way for the administrator to accomplish this task?

A.

Create a materialized view.

B.

Create indexes on those tables

C.

Create a new database.

D.

Create a function.

A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is the most likely cause of the issue?

A.

The SQL Server codes are performing badly.

B.

The SQL Server has not been tested properly.

C.

The SQL Server ports to the main machine are closed.

D.

The SQL Server has many concurrent users.

A database is configured to use undo management with temporary undo enabled. An UPDATE is run on the table.

Which of the following describes where the undo is stored?

A.

In the system global area

B.

In the undo

C.

In the SYSAUX

D.

In the temporary

(Which of the following types of scripting can be executed on a web browser?)

A.

Server-side

B.

PowerShell

C.

Client-side

D.

Command-line

(An IT manager needs to create a workflow for a new application. Which of the following tools should the manager use to facilitate the creation of a workflow?)

A.

ERD

B.

UML

C.

ETL

D.

ORM

(New users at a company are reporting that the system is not accepting new credentials when the users are asked to change the credentials for the first time. Which of the following is the reason the credentials are being rejected?)

A.

Identity management

B.

Access controls

C.

Service accounts

D.

Password policies

Which of the following would a database administrator monitor to gauge server health? (Choose two.)

A.

CPU usage

B.

Memory usage

C.

Transaction logs

D.

Network sniffer

E.

Domain controllers

F.

Firewall traffic

An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?

A.

Bandwidth

B.

Encryption

C.

Redundancy

D.

Masking

Which of the following is a result of an on-path attack on a system?

A.

A Wi-Fi network that redirects to clones of legitimate websites

B.

A website that has crashed and is no longer accessible

C.

An email from an unknown source requesting bank account details

D.

A web application that returns the addresses of its customers