Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

DS0-001 CompTIA DataSys+ Certification Exam Questions and Answers

Questions 4

(A developer needs to integrate a trigger to execute an action in a database. Which of the following SQL snippets is a correct use of a trigger?)

Options:

A.

CREATE TRIGGER trigger_test

BEFORE ALTER

ON flights

FOR EACH ROW

SET add_ons = 0;

B.

CREATE TRIGGER trigger_test

DURING UPDATE

ON flights

FOR EACH ROW

SET flight_status = 'booked';

C.

CREATE TRIGGER trigger_test

AFTER DROP

ON flights

FOR EACH ROW

SET add_ons = 0;

D.

CREATE TRIGGER trigger_test

BEFORE UPDATE

ON flights

FOR EACH ROW

SET flight_count = flight_count_prev + 1;

Buy Now
Questions 5

(A database administrator realizes that certain data was not captured correctly when it was imported. Which of the following commands should the administrator use to fix the issue?)

Options:

A.

UPDATE

B.

DROP TABLE

C.

DELETE

D.

ALTER TABLE

Buy Now
Questions 6

Which of the following is an advantage of creating indexes?

Options:

A.

To help with space allocation

B.

To provide quick and efficient access to data

C.

To reduce memory

D.

To update the query plan

Buy Now
Questions 7

A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examine first to troubleshoot the issue?

Options:

A.

CPU usage

B.

Disk space

C.

Event log

D.

OS performance

Buy Now
Questions 8

(A financial institution is running a database that contains PII. Database administrators need to provide table access to junior developers. Which of the following is the best option?)

Options:

A.

Role assignment

B.

Data masking

C.

View creation

D.

Policy enforcement

Buy Now
Questions 9

(A shared folder can only be accessed by authorized users. Which of the following policies was applied in this scenario?)

Options:

A.

Password policies

B.

Rights and privileges

C.

Service accounts

D.

Firewall policy

Buy Now
Questions 10

(Which of the following types of scripting can be executed on a web browser?)

Options:

A.

Server-side

B.

PowerShell

C.

Client-side

D.

Command-line

Buy Now
Questions 11

Which of the following services is responsible for assigning, managing, and reclaiming IP addresses on a TCP/IP-based network?

Options:

A.

DNS

B.

DHCP

C.

LDAP

D.

ISMTP

Buy Now
Questions 12

(A database administrator wants users to be able to access resources remotely from home. Which of the following best describes how the administrator can enable this access without compromising the security of the stored data?)

Options:

A.

Implement a virtual private network.

B.

Implement strong password policies.

C.

Configure and deploy a firewall.

D.

Implement a perimeter network for internet-facing database applications.

Buy Now
Questions 13

A database administrator is new to a company and wants to create a document that illustrates the interaction between tables. Which of the following should the administrator create?

Options:

A.

Troubleshooting guide

B.

Entity relationship diagram

C.

Data dictionary

D.

Database reference manual

Buy Now
Questions 14

(Evidence from logs shows multiple ongoing attempts to connect with a default account that was disabled. Which of the following best describes this type of attack?)

Options:

A.

Malware

B.

Brute-force

C.

On-path

D.

SQL injection

Buy Now
Questions 15

A database administrator is concerned about transactions in case the system fails. Which of the following properties addresses this concern?

Options:

A.

Durability

B.

Isolation

C.

Atomicity

D.

Consistency

Buy Now
Questions 16

A business analyst is using a client table and an invoice table to create a database view that shows clients who have not made purchases yet. Which of the following joins is most appropriate for the analyst to use to create this database view?

Options:

A.

INNER JOIN ON Client.Key = Invoice.Key

B.

RIGHT JOIN ON Client.Key = Invoice.Key WHERE BY Client.Key IS NOLL

C.

LEFT JOIN ON Client.Key = Invoice.Key

D.

LEFT JOIN ON Client.Key = Invoice.Key WHERE BY Invoice.Key IS NOLL

Buy Now
Questions 17

A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?

Options:

A.

SOP

B.

Data dictionaries

C.

UML diaqrams

D.

ERD

Buy Now
Questions 18

(Which of the following is used to store product quantities in a table while ensuring the minimal amount of storage is consumed?)

Options:

A.

DOUBLE

B.

INTEGER

C.

COUNT

D.

FLOAT

Buy Now
Questions 19

Which of the following database structures is a type of NoSQL database?

Options:

A.

Hierarchical

B.

Key-value stores

C.

Cloud

D.

Object-oriented

Buy Now
Questions 20

A company is launching a proof-of-concept, cloud-based application. One of the requirements is to select a database engine that will allow administrators to perform quick and simple queries on unstructured data. Which of the following would be best suited for this task?

Options:

A.

MonogoDB

B.

MS SQL

C.

Oracle

D.

Graph database

Buy Now
Questions 21

Which of the following firewall types allows an administrator to control traffic and make decisions based on factors such as connection information and data flow communications?

Options:

A.

Circuit-level

B.

Stateful

C.

Proxy

D.

Packet

Buy Now
Questions 22

A programmer wants to configure a database to only allow read or write access when requests are coming from specific IP addresses. Which of the following can be used to configure IP addresses to allow access to the database?

Options:

A.

Static IP address

B.

Firewall

C.

Dynamic IP address

D.

IDNS

Buy Now
Questions 23

Which of the following indexes stores records in a tabular format?

Options:

A.

Columnstore

B.

Non-clustered

C.

Unique

D.

Secondary

Buy Now
Questions 24

Which of the following is the best way to migrate a large data load from one table to another, considering total time and blocking?

Options:

A.

Split the load size into many transactions.

B.

Split the load size in half and run simultaneously.

C.

Batch into small loads and run in parallel.

D.

Batch large loads into one transaction.

Buy Now
Questions 25

(Which of the following is the purpose of including a COLLATE clause in a column definition?)

Options:

A.

To create a computed column that is included in an index

B.

To specify how data is sorted in a database

C.

To support functional dependency

D.

To ensure all values entered into a column fall within a data range

Buy Now
Questions 26

A database administrator needs a tool to document and explain the relationships between data in an organization's database. Which of the following is the best tool to accomplish this task?

Options:

A.

Text editor

B.

UML editor

C.

Word processor

D.

SQL query

Buy Now
Questions 27

Which of the following is a reason to create a stored procedure?

Options:

A.

To minimize storage space

B.

To improve performance

C.

To bypass case sensitivity requirements

D.

To give control of the query logic to the user

Buy Now
Questions 28

(Which of the following best describe a tablespace? Select two.)

Options:

A.

It can span multiple databases.

B.

It can contain blocks of different files.

C.

It can contain segments of different sizes.

D.

It can contain more than one data file.

E.

It is contained in memory.

F.

It can be used to organize data in a database.

Buy Now
Questions 29

A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

Which of the following is part of logical database infrastructure security?

Options:

A.

Surveillance

B.

Biometric access

C.

Perimeter network

D.

Cooling system

Buy Now
Questions 31

Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?

Options:

A.

Open access

B.

Least resistance

C.

Elevated privilege

D.

Least privilege

Buy Now
Questions 32

Which of the following resources is the best way to lock rows in SQL Server?

Options:

A.

TID

B.

SID

C.

RID

D.

PID

Buy Now
Questions 33

Which of the following constraints is used to enforce referential integrity?

Options:

A.

Surrogate key

B.

Foreign key

C.

Unique key

D.

Primary key

Buy Now
Questions 34

(A business analyst queries the same few tables every quarter and does not want to write new SQL code every time. Which of the following would best support the business analyst’s needs and allow the database administrator to optimize disk space?)

Options:

A.

Table

B.

View

C.

Function

D.

Stored procedure

Buy Now
Questions 35

A database administrator needs to provide access to data from two different tables to multiple group users in order to facilitate ongoing reporting. However, some columns in each table are restricted, and users should not be able to see the values in these columns.

Which of the following is the best action for the administrator to take?

Options:

A.

Create a stored procedure.

B.

Create a view.

C.

Create a csv export.

D.

Create a trigger.

Buy Now
Exam Code: DS0-001
Exam Name: CompTIA DataSys+ Certification Exam
Last Update: Feb 21, 2026
Questions: 118
DS0-001 pdf

DS0-001 PDF

$25.5  $84.99
DS0-001 Engine

DS0-001 Testing Engine

$30  $99.99
DS0-001 PDF + Engine

DS0-001 PDF + Testing Engine

$40.5  $134.99