Which of the following computer services associates IP network addresses with text-based names in order to facilitate identification and connectivity?
Which of the following would a database administrator monitor to gauge server health? (Choose two.)
A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:
Which of the followingbestdescribes this backup plan?
Which of the followingbestdescribes a collection of data that shares the same properties or attributes?
A database administrator is new to a company and wants to create a document that illustrates the interaction between tables. Which of the following should the administrator create?
A database administrator needs to ensure continuous availability of a database in case the server fails. Which of the following should the administrator implement to ensure high availability of the database?
Given the following customer table:
Which of the following ORM snippets would return the ID, state, and country of all customers with the newest customers appearingfirst?
A)
B)
C)
D)
A database is configured to use undo management with temporary undo enabled. AnUPDATEis run on the table.
Which of the following describes where the undo is stored?
An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?
Which of the following is part of logical database infrastructure security?
Which of the following is an attack in which an attacker hopes to profit from locking the database software?
A database's daily backup failed. Previous backups were completed successfully. Which of the following should the database administrator examinefirstto troubleshoot the issue?
Which of the following concepts applies to situations that require court files to be scanned for permanent reference and original documents be stored for ten years before they can be discarded?
Which of the following is the correct order of the steps in the database deployment process?
A)
1. Connect
2. Install
3. Configure
4. Confirm prerequisites
5. Validate
6. Test
7. Release
B)
1. Configure
2. Install
3. Connect
4. Test
5. Confirm prerequisites
6. Validate
7. Release
C)
1. Confirm prerequisites
2. Install
3. Configure
4. Connect
5. Test
6. Validate
7. Release
D)
1. Install
2. Configure
3. Confirm prerequisites
4. Connect
5. Test
6. Validate
7. Release
A database administrator set up a connection for a SQL Server instance for a new user, but the administrator is unable to connect using the user's workstation. Which of the following is themostlikely cause of the issue?
Which of the following is recommended in order to provide encrypted data communication pathways for information as it is transmitted over a network?
Which of the following tools is used for natively running a Linux system in Windows?
Which of the following are the best resources for monitoring potential server issues? (Choose two.)
Which of the following is a typical instruction that is found on a Linux command-line script and represents a system shell?