A database administrator needs to ensure database backups are occurring on a daily basis and at scheduled times. Which of the following actions should the administrator take?
Which of the following is a result of an on-path attack on a system?
Which of the following is the best way to migrate a large data load from one table to another, considering total time and blocking?
Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?
A programmer wants to configure a database to only allow read or write access when requests are coming from specific IP addresses. Which of the following can be used to configure IP addresses to allow access to the database?
Over the weekend, a company’s transaction database was moved to an upgraded server. All validations performed after the migration indicated that the database was functioning as expected. However, on Monday morning, multiple users reported that the corporate reporting application was not working.Which of the following are the most likely causes? (Choose two.)