A DBA left the company, and the DBA's account was removed from the system. Soon after, scheduled jobs began failing.
Which of the following would have most likely prevented this issue?
A. Load balancing
B. Business continuity plan
C. Service accounts
D. Assigning a data steward
Over the weekend, a company's transaction database was moved to an upgraded server. All validations performed after the migration indicated that the database was functioning as expected. However, on Monday morning, multiple users reported that the corporate reporting application was not working.
Which of the following are the most likely causes? (Choose two.)
A. The access permissions for the service account used by the reporting application were not changed.
B. The new database server has its own reporting system, so the old one is not needed.
C. The reporting jobs that could not process during the database migration have locked the application.
D. The reporting application's mapping to the database location was not updated.
E. The database server is not permitted to fulfill requests from a reporting application.
F. The reporting application cannot keep up with the new, faster response from the database.
A database administrator needs a tool to document and explain the relationships between data in an organization's database. Which of the following is thebesttool to accomplish this task?
A. Text editor
B. UML editor
C. Word processor
D. SQL query
Which of the following cloud storage options provides users with endpoints to retrieve data via REST API?
A. Network file
B. Object
C. Ephemeral
D. iBIock
An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?
A. DoS
B. Brute-force
C. SQL injection
D. Phishing
A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company's transactional data. Which of the following tasks should the administrator performfirst?
A. Create a new service account exclusively for the business intelligence application.
B. Build a separate data warehouse customized to the business intelligence application's specifications.
C. Set up a nightly FTP data transfer from the database server to the business intelligence application server.
D. Send the business intelligence administrator the approved TNS names file to configure the data mapping.
E. Open a new port on the database server exclusively for the business intelligence application.
Which of the following is the correct order of the steps in the database deployment process?
A. 1. Connect
2.
Install
3.
Configure
4.
Confirm prerequisites
5.
Validate
6.
Test
7.
Release
B. 1. Configure
2.
Install
3.
Connect
4.
Test
5.
Confirm prerequisites
6.
Validate
7.
Release
C. 1. Confirm prerequisites
2.
Install
3.
Configure
4.
Connect
5.
Test
6.
Validate
7.
Release
D. 1. Install
2.
Configure
3.
Confirm prerequisites
4.
Connect
5.
Test
6.
Validate
7.
Release
A database administrator is new to a company and wants to create a document that illustrates the interaction between tables. Which of the following should the administrator create?
A. Troubleshooting guide
B. Entity relationship diagram
C. Data dictionary
D. Database reference manual
A new retail store employee needs to be able to authenticate to a database. Which of the following commands should a database administrator use for this task?
A. INSERT USER
B. ALLOW USER
C. CREATE USER
D. ALTER USER
A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?
A. Option A
B. Option B
C. Option C
D. Option D