Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A database administrator needs to aggregate data from multiple tables in a way that does not impact the original tables, and then provide this information to a department. Which of the following is thebestway for the administrator to accomplish this task?

A.

Create a materialized view.

B.

Create indexes on those tables

C.

Create a new database.

D.

Create a function.

Which of the following ismostlikely to prevent tampering with server hardware that houses data?

A.

Biometric locks

B.

Strong password policy

C.

Network firewall

D.

Surveillance cameras

Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?

A.

TCP/IP

B.

NFS

C.

SMB

D.

TLS

Which of the following is used to hide data in a database so the data can only be read by a user who has a key?

A.

Data security

B.

Data masking

C.

Data protection

D.

Data encryption

Which of the following cloud delivery models provides users with thehighestlevel of flexibility regarding resource provisioning and administration?

A.

DBaaS

B.

IaaS

C.

SaaS

D.

PaaS

An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?

A.

Bandwidth

B.

Encryption

C.

Redundancy

D.

Masking

A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company’s transactional data. Which of the following tasks should the administrator performfirst?

A.

Create a new service account exclusively for the business intelligence application.

B.

Build a separate data warehouse customized to the business intelligence application's specifications.

C.

Set up a nightly FTP data transfer from the database server to the business intelligence application server.

D.

Send the business intelligence administrator the approved TNS names file to configure the data mapping.

E.

Open a new port on the database server exclusively for the business intelligence application.

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is themostlikely cause of the issue?

A.

The SQL Server codes are performing badly.

B.

The SQL Server has not been tested properly.

C.

The SQL Server ports to the main machine are closed.

D.

The SQL Server has many concurrent users.

Which of the following is part of logical database infrastructure security?

A.

Surveillance

B.

Biometric access

C.

Perimeter network

D.

Cooling system