3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following scripts would set the database recovery model for sys.database?
A)

B)

C)

D)

A database administrator is migrating the information in a legacy table to a newer table. Both tables contain the same columns, and some of the data may overlap.
Which of the following SQL commands should the administrator use to ensure that records from the two tables are not duplicated?
A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?
A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company’s transactional data. Which of the following tasks should the administrator performfirst?
A company is launching a proof-of-concept, cloud-based application. One of the requirements is to select a database engine that will allow administrators to perform quick and simple queries on unstructured data.Which of the following would bebestsuited for this task?
Which of the following types of RAID, if configured with the same number and type of disks, would provide thebestwrite performance?
Which of the following are the best resources for monitoring potential server issues? (Choose two.)
Which of the following would a database administrator monitor to gauge server health? (Choose two.)
Which of the following NFs is considered themostpreferable for relational database design?
Which of the following describes a scenario in which a database administrator would use a relational database rather than a non-relational database?
A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?
A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examinefirstto troubleshoot the issue?
Which of the following services is responsible for assigning, managing, and reclaiming IP addresses on a TCP/IP-based network?
Which of the following is an attack in which an attacker hopes to profit from locking the database software?
A programmer wants to configure a database to only allow read or write access when requests are coming from specific IP addresses. Which of the following can be used to configure IP addresses to allow access to the database?
An on-premises application server connects to a database in the cloud. Which of the following must be considered to ensure data integrity during transmission?