ExamGecko
Question list
Search
Search

Question 13 - DS0-001 discussion

Report
Export

A database administrator needs to ensure that a newly installed corporate business intelligence application can access the company's transactional data. Which of the following tasks should the administrator perform first?

A.
Create a new service account exclusively for the business intelligence application.
Answers
A.
Create a new service account exclusively for the business intelligence application.
B.
Build a separate data warehouse customized to the business intelligence application's specifications.
Answers
B.
Build a separate data warehouse customized to the business intelligence application's specifications.
C.
Set up a nightly FTP data transfer from the database server to the business intelligence application server.
Answers
C.
Set up a nightly FTP data transfer from the database server to the business intelligence application server.
D.
Send the business intelligence administrator the approved TNS names file to configure the data mapping.
Answers
D.
Send the business intelligence administrator the approved TNS names file to configure the data mapping.
E.
Open a new port on the database server exclusively for the business intelligence application.
Answers
E.
Open a new port on the database server exclusively for the business intelligence application.
Suggested answer: A

Explanation:

The first task that the administrator should perform is to create a new service account exclusively for the business intelligence application. This will ensure that the application has the appropriate permissions and credentials to access the company's transactional data. The other options are either unnecessary, inefficient, or insecure. For example, building a separate data warehouse would require additional resources and time, setting up a nightly FTP data transfer would expose the data to potential breaches, sending the TNS names file would not guarantee that the application can connect to the database, and opening a new port on the database server would create a vulnerability for attackers.Reference:CompTIA DataSys+ Course Outline, Domain 2.0 Database Deployment, Objective 2.1 Given a scenario, install and configure database software and tools.

asked 02/10/2024
m laven
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first