Which of the following constraints is used to enforce referential integrity?
Which of the following ismostlikely to prevent tampering with server hardware that houses data?
A database professional is considering denormalizing a database. Which of the following documents should be used to analyze the database's structure?
An automated script is using common passwords to gain access to a remote system. Which of the following attacks is being performed?
A DBA is reviewing the following logs to determine the current data backup plan for a primary data server:
Which of the followingbestdescribes this backup plan?
Which of the following services is responsible for assigning, managing, and reclaiming IP addresses on a TCP/IP-based network?
A database administrator is concerned about transactions in case the system fails. Which of the following properties addresses this concern?
Which of the following is a result of an on-path attack on a system?
Which of the following would a database administrator monitor to gauge server health? (Choose two.)
Which of the following describes the purpose of a snapshot?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
CompTIA Free Exams |
---|
![]() |