Data validation in ETL processes often includes ____________ validation to ensure data conforms to predefined business rules.

  • Compliance
  • Integration
  • Metadata
  • Transformation
In ETL processes, data transformation ensures that data conforms to predefined business rules, which is a critical aspect of data validation. Transformation validation verifies that the data has been transformed correctly according to the specified business rules and requirements.

You receive an alert indicating that the database server's CPU utilization has spiked to 95%. What immediate action should you take?

  • Check for long-running queries
  • Increase the server's RAM
  • Restart the database server
  • Scale up the database server horizontally
Checking for long-running queries is crucial to identify any inefficient queries causing high CPU utilization and address them accordingly.

How can database testing tools like SQLUnit help in ensuring data consistency during testing?

  • Data Validation
  • Generating Random Test Data
  • Load Testing
  • Running Test Cases Against Database State
Running Test Cases Against Database State: Database testing tools like SQLUnit allow testers to run test cases against the current state of the database. By doing so, they can verify the consistency of data throughout the testing process, ensuring that data remains intact and consistent.

When conducting scalability testing, ____________ tools are often used to simulate a large number of concurrent users.

  • Functional testing tools
  • Load testing tools
  • Security testing tools
  • Usability testing tools
Load testing tools are specifically designed to simulate a large number of concurrent users to test the system's performance under heavy load. They help in measuring the system's response time, throughput, and resource utilization under various load conditions.

Testing ____________ involves examining the behavior of the application when a user's authorization level is increased beyond their normal access.

  • Access escalation
  • Authorization elevation
  • Privilege escalation
  • Security escalation
Privilege escalation testing involves checking how the application behaves when a user's authorization level is elevated beyond their typical access rights. This helps identify potential security vulnerabilities related to unauthorized access.

To maintain data consistency in a distributed database, it's essential to establish a robust ____________ strategy.

  • Backup
  • Indexing
  • Recovery
  • Replication
Data consistency in distributed databases requires a robust replication strategy to ensure that data remains consistent across all nodes. Replication involves copying and synchronizing data across multiple servers to maintain consistency and availability. This strategy helps in ensuring that updates made to one copy of the data are propagated to all other copies, thus preserving data consistency in the distributed environment.

Data consistency testing often involves checking for violations of ____________ constraints.

  • Data integrity
  • Entity
  • Foreign key
  • Primary key
Data consistency testing primarily focuses on ensuring data integrity by checking for violations of data integrity constraints such as primary key, foreign key, unique, and check constraints. These constraints define rules for maintaining the correctness and consistency of data within a database. Detecting violations of these constraints helps in identifying inconsistencies or inaccuracies in the stored data, thereby ensuring its quality and reliability.

What is a clustered index in a database, and how does it differ from a non-clustered index?

  • Arranges data rows physically based on the indexed column(s).
  • Can be created on any column in the table.
  • Stores the index separately from the actual data rows.
  • Supports faster retrieval of data but slows down data modification operations.
A clustered index dictates the physical order of data rows in the table, often based on the primary key column. In contrast, a non-clustered index stores a separate list of pointers to the actual data rows, allowing for different orders of retrieval. Understanding this distinction is crucial for efficient data retrieval and modification strategies.

Which step of query optimization involves choosing the most efficient execution plan for a SQL query?

  • Execution
  • Fetching
  • Optimization
  • Parsing
The step of query optimization that involves choosing the most efficient execution plan for a SQL query is Optimization. During this phase, the database optimizer analyzes the query and generates alternative execution plans based on factors such as available indexes, table statistics, and system resources. The goal is to select the execution plan that minimizes the query's resource consumption and maximizes its performance. Once the optimal plan is determined, it is executed by the database engine.

In database security, what is meant by "data at rest" encryption?

  • Encryption of data during transmission between client and server
  • Encryption of data while it's stored on disk
  • Encryption of data during data manipulation operations
  • Encryption of data during backup and recovery processes
"Data at rest" encryption refers to the practice of encrypting data while it's stored on disk. This ensures that even if someone gains unauthorized access to the physical storage medium, they won't be able to read the data without proper decryption keys. It's a crucial aspect of database security, protecting sensitive information from unauthorized access at rest. This encryption typically involves using algorithms and keys to convert plaintext data into ciphertext, rendering it unreadable without the appropriate decryption process. Hence, option 2 is correct.