Database Fundamentals v1.0

Page:    1 / 10   
Exam contains 140 questions

Mark works as a Database Administrator for DataOneWorld Inc.
Management instructs him to provide an additional security layer to the database to prevent unauthorized viewing of data with the help of an algorithm called cipher.
Which of the following will help him to accomplish the task?

  • A. Native auditing
  • B. Authentication
  • C. Encryption
  • D. Abstraction

Answer : C

Which of the following is a design of the user interface and the application programs that use and process the database?

  • A. Application Design
  • B. Object Modeling
  • C. Database Design
  • D. Database Planning

Answer : A

Which of the following is used to give a default value to a column if the value for that column is unknown?

  • A. Concurrency
  • B. DEFAULT constraint
  • C. Nested transaction
  • D. Transaction

Answer : B

Suzanne works as a Database Designer for DataOneWorld Inc.
She is assigned the task of decomposing the components of a database, but she has to ensure that all the components are decomposed to only some extent.
Which of the following approaches will she use to accomplish the task?

  • A. Mixed approach
  • B. Inside-out approach
  • C. Top-down approach
  • D. Bottom-up approach

Answer : A

Consider the case of a distance education university.
The university has many regional centers across the country.
Each regional center has a head known as regional manager.
Each regional center has allotted more than one study center in its region.
Each regional center has a region code, which is unique and specifies a region.
Each study center also has a study center code, which is also unique.
What is the relationship between regional center and study center?

  • A. One-to-one
  • B. One-to-many
  • C. There is no relationship.
  • D. Many-to-many

Answer : B

You work as the Database Administrator for
All servers on the network run Windows Server 2003 and Windows Server 2000, and all client computers run Windows XP professional and
Windows Vista.
The network area consists of a single Active Directory domain named
The network contains a Microsoft SQL Server 2005 database server named COMPANY-DB111, which you administer at a regular interval of time. COMPANY-DB111 contains and hosts three databases that support different types of business requirements.
The network uses the DBA database that supports internal operations including maintaining data, accounting, and mailing. The networkג€™s regular users make use of stored procedures for the data values that need insertion into the tables. The stored procedures used in the network of the company are designed to access
SQL variant type parameters and then use the values to build and execute ad hoc query statements that are the part of the SQL statements. During a routine network check, you discover that there are several odd occurrences in the database.
The odd occurrences include data deleted from tables and other unauthorized activity.
You suspect a user is executing the unauthorized statements through the stored procedures.
You are required to stop the unauthorized changes while having least impact on the stored procedures that are in use. Your explanation must use the least administrative effort.
What should you do?

  • A. The input parameters should be parsed to watch for and block any input including single quotes.
  • B. The stored procedures used for the table should be replaced with ad hoc queries.
  • C. The stored procedure should be customized to use type-specific and length-restricted parameters.
  • D. All data handling activity on the table should be audited and recorded.

Answer : C

You work as a Database Administrator for DataOneWorld Inc.
Management instructs you to remove an object from the relational database management system.
Which of the following statements will you use to accomplish the task?

  • A. DROP
  • D. ALTER

Answer : A

Which of the following enables a user to use generic methods to access a database and to focus on the coding rather than the syntax for a specific database API?

  • A. Abstraction
  • B. Database security
  • C. Native auditing
  • D. Authentication

Answer : A

You work as a Database Administrator for InfoTech Inc.
The company has a database and they want you to create a design for a database that will support the enterpriseג€™s operations and objectives.
Which of the following will you use to accomplish the task?

  • A. Application design
  • B. Database design
  • C. Database planning
  • D. Requirements collection and analysis

Answer : B

Which of the following scripts is used to convert Unix-type zone files into SQL statements, and loads the time zone tables in a mysql database?

  • A. mysql_tzinfo_to_sql
  • B. mysql_time_to_sql
  • C. mysql_timezone_to_sql
  • D. mysql_tz_to_sql

Answer : A

You work as a Database Designer for Tritech Inc.
You are designing a table named Info.
The table contains the following attributes:

Login and Password -

Name -

ContactNumber -

Address -
Each new employee joining the company is assigned an E-mail Login and Password.
This E-mail Login and Password is used by each employee to access his account on the companyג€™s Web site.
The value of both the attributes should be unique and cannot be NULL.
You design an artificial key EmpID in the Info table to serve as a primary key.
Which of the following factors lead you to define an artificial key for use as a primary key in the Info table? Each correct answer represents a part of the solution.
(Choose all that apply.)

  • A. The value of the primary key cannot be NULL.
  • B. The value of the primary key must be persistent.
  • C. The natural key contains highly sensitive data
  • D. The value of the primary key must be unique.

Answer : ABCD

In addition to taking backups of your databases, you should also backup up files stated below.
Which of these files store updates that have been made after the backup was made?

  • A. Binary log files
  • B. My.ini
  • C. My.cnf
  • D.

Answer : A

Which of the following is a building working model of a database system?

  • A. Prototyping
  • B. Bottom-up approach
  • C. Conceptual database design
  • D. Top-down approach

Answer : A

You are the database administrator for a MySQL database server.
The network contains new and old (pre-4.1) clients.
You configure another database server on the network.
You allow the network clients to connect to the new server.
Some users complain that when they try to connect to the server, they receive the following error:
ERROR 1251: The client does not support authentication protocol requested by the server; consider upgrading MySQL client
You do not want to upgrade any client or server right now, and want to enable all clients to connect to the new server successfully.
Which of the following steps will you take to resolve the issue?

  • A. Run the server with the --secure-auth option.
  • B. Run the server with the --old-password option.
  • C. Run the server with the --allow-old option.
  • D. Run the server with the --enable-old option.

Answer : B

Which of the following steps in database planning is used to record an object so that it is represented visually in the system?

  • A. Identifying the relationships between objects
  • B. Gathering information
  • C. Object identification
  • D. Object modeling

Answer : D

Page:    1 / 10   
Exam contains 140 questions

Talk to us!

Have any questions or issues ? Please dont hesitate to contact us

Certlibrary doesn't offer Real Microsoft Exam Questions.
Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.