comptia DS0-001 Exam Questions

Questions for the DS0-001 were updated on : Nov 23 ,2025

Page 1 out of 6. Viewing questions 1-15 out of 80

Question 1

Which of the following best describes the category of SQL commands required to revoke access to
database objects?

  • A. DCL
  • B. IDDL
  • C. IDML
  • D. TCL
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The category of SQL commands that is required to revoke access to database objects is DCL. DCL, or
Data Control Language, is a subset of SQL commands that are used to control or manage the access
or permissions of users or roles on a database. DCL includes commands such as GRANT and REVOKE.
GRANT is a DCL command that is used to grant privileges or roles to users or roles on specific objects
in a database, such as tables, views, procedures, etc. REVOKE is a DCL command that is used to
revoke privileges or roles from users or roles on specific objects in a database. For example, the
following statement uses the REVOKE command to revoke the SELECT privilege from user Alice on
table employee:
REVOKE SELECT ON employee FROM Alice;
The other options are either different categories of SQL commands or not related to SQL commands
at all. For example, IDDL is not a valid acronym or category of SQL commands; IDML is not a valid
acronym or category of SQL commands; TCL, or Transaction Control Language, is a subset of SQL
commands that are used to control or manage transactions on a database, such as committing or
rolling back changes. Reference:
CompTIA DataSys+ Course Outline
, Domain 4.0 Data and Database
Security, Objective 4.2 Given a scenario, implement security controls for databases.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following commands is part of DDL?

  • A. UPDATE
  • B. GRANT
  • C. CREATE
  • D. INSERT
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The command that is part of DDL is CREATE. CREATE is a SQL command that belongs to the category
of DDL, or Data Definition Language. DDL is a subset of SQL commands that are used to define or
modify the structure or schema of a database, such as tables, columns, constraints, indexes, views,
etc. CREATE is a DDL command that is used to create a new object in a database, such as a table,
column, constraint, index, view, etc. For example, the following statement uses the CREATE
command to create a new table called employee with four columns:
CREATE TABLE employee (
emp_id INT PRIMARY KEY,
emp_name VARCHAR(50) NOT NULL,
emp_dept VARCHAR(20),
emp_salary DECIMAL(10,2)
);
Copy
The other options are either part of different categories of SQL commands or not SQL commands at
all. For example, UPDATE is a SQL command that belongs to the category of DML, or Data
Manipulation Language. DML is a subset of SQL commands that are used to manipulate or modify
the data or content of a database, such as inserting, updating, deleting, or selecting data. GRANT is a
SQL command that belongs to the category of DCL, or Data Control Language. DCL is a subset of SQL
commands that are used to control or manage the access or permissions of users or roles on a
database, such as granting or revoking privileges or roles. INSERT is a SQL command that belongs to
the category of DML, or Data Manipulation Language. INSERT is a DML command that is used to
insert new data into a table. Reference:
CompTIA DataSys+ Course Outline
, Domain 1.0 Database
Fundamentals, Objective 1.2 Given a scenario, execute database tasks using scripting and
programming languages.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following resources is the best way to lock rows in SQL Server?

  • A. TID
  • B. SID
  • C. RID
  • D. PID
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The resource that is the best way to lock rows in SQL Server is RID. RID, or Row IDentifier, is an
attribute that uniquely identifies each row in a heap table in SQL Server. A heap table is a table that
does not have a clustered index, which means that the rows are not stored in any particular order. A
RID consists of the file number, page number, and slot number of the row in the database. A RID can
be used to lock rows in SQL Server to prevent concurrent access or modification by other
transactions or users. A RID lock is a type of lock that locks a single row using its RID. A RID lock can
be applied using the HOLDLOCK or XLOCK hints in a SELECT statement. The other options are either
not related or not effective for this purpose. For example, TID, or Transaction IDentifier, is an
attribute that uniquely identifies each transaction in a database; SID, or Security IDentifier, is an
attribute that uniquely identifies each user or group in a Windows system; PID, or Process IDentifier,
is an attribute that uniquely identifies each process in an operating system. Reference:
CompTIA
DataSys+ Course Outline
, Domain 3.0 Database Management and Maintenance, Objective 3.3 Given
a scenario, implement database concurrency methods.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following indexes stores records in a tabular format?

  • A. Columnstore
  • B. Non-clustered
  • C. Unique
  • D. Secondary
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The index that stores records in a tabular format is columnstore. A columnstore index is a type of
index that stores and compresses data by columns rather than by rows. A columnstore index can
improve the performance and efficiency of queries that perform aggregations, calculations, or
analysis on large amounts of data, such as data warehouse or business intelligence applications. A
columnstore index can also reduce the storage space required for data by applying various
compression techniques, such as dictionary encoding, run-length encoding, bit packing, etc. The
other options are either different types of indexes or not related to indexes at all. For example, a
non-clustered index is a type of index that stores the values of one or more columns in a sorted order
along with pointers to the corresponding rows in the table; a unique index is a type of index that
enforces uniqueness on one or more columns in a table; a secondary index is an alternative term for
a non-clustered index. Reference:
CompTIA DataSys+ Course Outline
, Domain 3.0 Database
Management and Maintenance, Objective 3.1 Given a scenario, perform common database
maintenance tasks.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which of the following NFs is considered the most preferable for relational database design?

  • A. 1 NF
  • B. 3 NF
  • C. 4 NF
  • D. 2NF
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The NF (normal form) that is considered the most preferable for relational database design is 3 NF. 3
NF, or Third Normal Form, is a level of normalization that organizes data into tables and columns to
reduce redundancy and improve consistency. Normalization is a process that applies a set of rules or
criteria to eliminate or minimize the anomalies or problems that may arise from inserting, updating,
or deleting data in a database. 3 NF is achieved when a table satisfies the following conditions: - It is
in 2 NF (Second Normal Form), which means that every non-key column depends on the whole
primary key and not on any subset of it - It has no transitive dependencies, which means that every
non-key column depends directly on the primary key and not on any other non-key column 3 NF is
considered the most preferable for relational database design because it ensures that each table has
only one purpose or theme and that each column has only one value or meaning. This helps avoid
data duplication, inconsistency, and update anomalies. The other options are either lower or higher
levels of normalization that are either less preferable or less practical for relational database design.
For example, 1 NF (First Normal Form) is the lowest level of normalization that requires each column
to have atomic values and each row to have a unique identifier; 4 NF (Fourth Normal Form) is a
higher level of normalization that requires each table to have no multi-valued dependencies, which
means that there are no columns that can have more than one value for the same primary key value;
2 NF (Second Normal Form) is an intermediate level of normalization that requires each non-key
column to depend on the whole primary key and not on any subset of it. Reference:
CompTIA
DataSys+ Course Outline
, Domain 1.0 Database Fundamentals, Objective 1.2 Given a scenario,
execute database tasks using scripting and programming languages.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following constraints is used to enforce referential integrity?

  • A. Surrogate key
  • B. Foreign key
  • C. Unique key
  • D. Primary key
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The constraint that is used to enforce referential integrity is foreign key. A foreign key is a column or
a set of columns in a table that references the primary key of another table. A primary key is a
column or a set of columns in a table that uniquely identifies each row in the table. Referential
integrity is a rule that ensures that the values in the foreign key column match the values in the
primary key column of the referenced table. Referential integrity helps maintain the consistency and
accuracy of the data across related tables. The other options are either different types of constraints
or not related to referential integrity at all. For example, a surrogate key is a column that is artificially
generated to serve as a primary key, such as an auto-increment number or a GUID (Globally Unique
Identifier); a unique key is a column or a set of columns in a table that uniquely identifies each row in
the table, but it can have null values unlike a primary key; there is no such constraint as
TID. Reference:
CompTIA DataSys+ Course Outline
, Domain 1.0 Database Fundamentals, Objective
1.2 Given a scenario, execute database tasks using scripting and programming languages.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following tools is used for natively running a Linux system in Windows?

  • A. WSL
  • B. [Remote Desktop Protocol
  • C. SSH
  • D. ITelnet
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The tool that is used for natively running a Linux system in Windows is WSL. WSL, or Windows
Subsystem for Linux, is a feature that allows users to run a Linux system natively on Windows 10 or
Windows Server. WSL enables users to install and use various Linux distributions, such as Ubuntu,
Debian, Fedora, etc., and run Linux commands, tools, applications, etc., without requiring a virtual
machine or a dual-boot setup. WSL also provides users with interoperability and integration between
Linux and Windows, such as file system access, network communication, process management, etc.
WSL is useful for users who want to use Linux features or functionalities on Windows, such as
development, testing, scripting, etc. The other options are either different tools or not related to
running a Linux system in Windows at all. For example, Remote Desktop Protocol (RDP) is a protocol
that allows users to remotely access and control another computer or device over a network; SSH, or
Secure Shell, is a protocol that allows users to securely connect and communicate with another
computer or device over a network; Telnet is a protocol that allows users to interact with another
computer or device over a network using a text-based interface. Reference:
CompTIA DataSys+
Course Outline
, Domain 2.0 Database Deployment, Objective 2.2 Given a scenario, create database
objects using scripting and programming languages.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following NoSQL database types best categorizes MongoDB?

  • A. Document
  • B. Column-oriented
  • C. Graph
  • D. Key-value stores
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The NoSQL database type that best categorizes MongoDB is document. Document databases are
databases that store and manage data as documents, which are collections of fields and values in
formats such as JSON (JavaScript Object Notation) or XML (Extensible Markup Language). Document
databases do not use any schema or structure to organize data, but rather use identifiers or indexes
to enable flexible and dynamic access to data based on fields or values. Document databases are
suitable for storing large amounts of complex or unstructured data that have variable attributes or
nested structures. MongoDB is an example of a document database that uses JSON-like documents
to store and query data. The other options are either different types of NoSQL databases or not
related to NoSQL databases at all. For example, column-oriented databases are databases that store
and manage data as columns rather than rows; graph databases are databases that store and
manage data as nodes and edges that represent entities and relationships; key-value stores are
databases that store and manage data as pairs of keys and values. Reference:
CompTIA DataSys+
Course Outline
, Domain 1.0 Database Fundamentals, Objective 1.1 Given a scenario, identify
common database types.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Which of the following database structures is a type of NoSQL database?

  • A. Hierarchical
  • B. Key-value stores
  • C. Cloud
  • D. Object-oriented
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The database structure that is a type of NoSQL database is key-value stores. Key-value stores are
databases that store and manage data as pairs of keys and values. Keys are unique identifiers that
locate data in the database; values are arbitrary data that can be any type or format. Key-value stores
do not use any schema or structure to organize data, but rather use hash tables or indexes to enable
fast and simple access to data based on keys. Key-value stores are suitable for storing large amounts
of simple or unstructured data that do not require complex queries or relationships. The other
options are either different types of databases or not related to database structures at all. For
example, hierarchical databases are databases that store and manage data as nodes in a tree-like
structure; cloud databases are databases that are hosted and accessed over the internet using cloud
computing services; object-oriented databases are databases that store and manage data as objects
that have attributes and methods. Reference:
CompTIA DataSys+ Course Outline
, Domain 1.0
Database Fundamentals, Objective 1.1 Given a scenario, identify common database types.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following is part of logical database infrastructure security?

  • A. Surveillance
  • B. Biometric access
  • C. Perimeter network
  • D. Cooling system
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that is part of logical database infrastructure security is perimeter network. Perimeter
network, also known as DMZ (Demilitarized Zone), is a network segment that lies between an
internal network and an external network, such as the internet. Perimeter network provides an
additional layer of security for the internal network by isolating and protecting the servers or
services that are exposed to the external network, such as web servers, email servers, database
servers, etc. Perimeter network also helps prevent unauthorized access or attacks from the external
network to the internal network by using firewalls, routers, proxies, etc. The other options are either
part of physical database infrastructure security or not related to database infrastructure security at
all. For example, surveillance is a method of monitoring and recording physical activities or events in
a location or resource; biometric access is a device that uses biological characteristics to control
access to a physical location or resource; cooling system is a device or system that regulates the
temperature and humidity of a location or resource. Reference:
CompTIA DataSys+ Course Outline
,
Domain 4.0 Data and Database Security, Objective 4.1 Given a scenario, implement database
infrastructure security.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following sets the age requirement for data that should be recovered after a major
disaster?

  • A. MTBF
  • B. RTO
  • C. MTTF
  • D. RPO
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that sets the age requirement for data that should be recovered after a major disaster is
RPO. RPO, or Recovery Point Objective, is a metric that defines the maximum amount of data that
can be lost or acceptable data loss in the event of a disaster or disruption. RPO indicates how
frequently the data should be backed up or replicated to minimize the risk of data loss. RPO also sets
the age requirement for data that should be recovered after a major disaster, as it determines how
far back in time the recovery process should go. For example, if the RPO is one hour, then the data
should be backed up or replicated every hour, and the recovery process should restore the data to
the state it was in one hour before the disaster. The other options are either different metrics or not
related to data recovery at all. For example, MTBF, or Mean Time Between Failures, is a metric that
measures the average time that a system or component operates without failure; RTO, or Recovery
Time Objective, is a metric that defines the maximum amount of time that can be taken to restore a
system or service after a disaster or disruption; MTTF, or Mean Time To Failure, is a metric that
measures the average time that a system or component operates until it fails. Reference:
CompTIA
DataSys+ Course Outline
, Domain 5.0 Business Continuity, Objective 5.3 Given a scenario, implement
backup and restoration of data.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following best describes a collection of data that shares the same properties or
attributes?

  • A. Relation set
  • B. ER model
  • C. Entity set
  • D. Tuples
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that best describes a collection of data that shares the same properties or attributes is
entity set. An entity set is a term used in the entity-relationship (ER) model, which is a conceptual
model for designing and representing databases. An entity set is a collection of entities that have the
same type or characteristics, such as students, courses, products, etc. An entity is an object or thing
that can be identified and distinguished from others, such as a specific student, course, product, etc.
An entity set can have one or more attributes that describe the properties or features of the entities,
such as name, age, price, etc. An entity set can also have one or more relationships with other entity
sets that define how the entities are associated or connected, such as enrolled, taught by, purchased
by, etc. The other options are either different terms or not related to the ER model at all. For
example, relation set is a term used in the relational model, which is a logical model for
implementing and manipulating databases; ER model is a term used to refer to the entity-
relationship model itself; tuples are rows or records in a table or relation. Reference:
CompTIA
DataSys+ Course Outline
, Domain 1.0 Database Fundamentals, Objective 1.1 Given a scenario,
identify common database types.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following is used to write SQL queries in various programming languages?

  • A. Indexing
  • B. Object-relational mapping
  • C. Excel
  • D. Normalization
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The option that is used to write SQL queries in various programming languages is object-relational
mapping. Object-relational mapping (ORM) is a technique that maps objects in an object-oriented
programming language (such as Java, Python, C#, etc.) to tables in a relational database (such as
Oracle, MySQL, SQL Server, etc.). ORM allows users to write SQL queries in their preferred
programming language without having to deal with the differences or complexities between the two
paradigms. ORM also provides users with various benefits such as code reuse, abstraction, validation,
etc. The other options are either not related or not effective for this purpose. For example, indexing
is a technique that creates data structures that store the values of one or more columns of a table in
a sorted order to speed up queries; Excel is a software application that allows users to organize and
manipulate data in rows and columns; normalization is a process that organizes data into tables and
columns to reduce redundancy and improve consistency. Reference:
CompTIA DataSys+ Course
Outline
, Domain 1.0 Database Fundamentals, Objective 1.2 Given a scenario, execute database tasks
using scripting and programming languages.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following cloud storage options provides users with endpoints to retrieve data via REST
API?

  • A. Network file
  • B. Object
  • C. Ephemeral
  • D. iBIock
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The cloud storage option that provides users with endpoints to retrieve data via REST API is object.
Object storage is a type of cloud storage that stores data as objects, which consist of data, metadata,
and a unique identifier. Object storage does not use any hierarchy or structure to organize data, but
rather uses flat namespaces that allow users to access data using the unique identifier. Object
storage also provides users with endpoints to retrieve data via REST API (Representational State
Transfer Application Programming Interface), which is a standard way of communicating with web
services using HTTP methods (such as GET, POST, PUT, DELETE) and formats (such as JSON, XML).
Object storage is suitable for storing large amounts of unstructured data that do not require frequent
changes or complex queries. The other options are either different types of cloud storage or not
related to cloud storage at all. For example, network file storage is a type of cloud storage that stores
data as files in folders using protocols such as NFS (Network File System) or SMB (Server Message
Block); ephemeral storage is a type of temporary storage that stores data only for the duration of a
session or process; iBIock is not a valid acronym or type of cloud storage. Reference:
CompTIA
DataSys+ Course Outline
, Domain 2.0 Database Deployment, Objective 2.1 Given a scenario, select
an appropriate database deployment method.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which of the following is an attack in which an attacker hopes to profit from locking the database
software?

  • A. Spear phishing
  • B. Ransomware
  • C. SQL injection
  • D. On-path
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The attack in which an attacker hopes to profit from locking the database software is ransomware.
Ransomware is a type of malware that encrypts the data or files on a system or network and
demands a ransom from the victim to restore them. Ransomware can target database software and
lock its access or functionality until the victim pays the ransom, usually in cryptocurrency.
Ransomware can cause serious damage and loss to the victim, as well as expose them to further risks
or threats. Ransomware can be delivered through various methods, such as phishing emails,
malicious attachments, compromised websites, etc. The other options are either different types of
attacks or not related to locking database software at all. For example, spear phishing is a type of
phishing attack that targets a specific individual or organization with personalized or customized
emails; SQL injection is a type of attack that inserts malicious SQL statements into an input field or
parameter of a web application to manipulate or compromise the underlying database; on-path is a
type of attack that intercepts and modifies the data in transit between two parties on a
network. Reference:
CompTIA DataSys+ Course Outline
, Domain 4.0 Data and Database Security,
Objective 4.4 Given a scenario, identify common types of attacks against databases

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2