A single RAID 5 volume should be utilized.
A RAID 1 volume and a RAID 5 volume should be utilized.
A single RAID 10 volume should be utilized.
A RAID 0 volume and a RAID 5 volume should be utilized.
第1题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you. So what action should you perform to achieve this goal?()
第2题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column. The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized. From the following four encryption types, which one should you utilize?()
第3题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task. Which tool will you utilize to finish the task?()
第4题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security,troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A database is included by the instance, and a table named EmployeeData is contained by the database. There is a column named Profile in the EmployeeData table. Microsoft Office Word 2003 documents are stored in the column. The space utilized by the Profile column should be cut to the least. In addition, a reasonable performance should be maintained to retrieve the content of the column. Which action will you perform?()
第5题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log. Which action should you perform to finish the task?()
第6题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed. It is reported by the customers that the server performance degraded due to a newly implemented process. Dynamic Management Views is utilized to confirm that no long running queries exist. The operating system performance data should be correlated with the actual query execution trace, and the least administrative effort should be utilized. Which action will you perform to finish the task?()
第7题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()
第8题:
To finish the task, hourly database snapshots should be utilized.
To finish the task, the full-recovery model along with transaction log backups should be utilized.
To finish the task, the full-recovery model along with differential backups should be utilized.
To finish the task, the simple-recovery model along with differential backups should be utilized.
第9题:
To finish the task, Log shipping should be utilized.
To finish the task, Failover clustering should be utilized.
To finish the task, Replication should be utilized.
To finish the task, Database snapshot should be utilized.
第10题:
To finish the task, the client-side profiler trace should be utilized.
To finish the task, the dynamic management views should be utilized.
To finish the task, the data collector should be utilized.
To finish the task, the System Monitor counter log trace should be utilized.
第11题:
ServiceGreatUser should be added to the appropriate fixed database roles.
You should assign the appropriate object-level permissions to ServiceGreatUser
You should assign the appropriate server-level permissions to ServiceGreatLogin
You should assign the appropriate database-level permissions to ServiceGreatUser
第12题:
To finish the task, the Distributed File System Replication service should be utilized.
To finish the task, a configuration server should be utilized.
To finish the task, the policies should be distributed by utilizing Group Policy Objects.
To finish the task, the policies should be distributed by utilizing the Active Directory directory service.
第13题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance of your company is managed by you. There is a team of database administrators in your company. SQL Server 2008 Integration Services (SSIS) packages are created on the test server in a shared project by a team of application developers. A fixed cache file is required by one of the packages. The company will deploy the packages to the production server on completion of development. The production server is available only to the database administrators. Since you are the technical support, you need to confirm that the project can be deployed successfully to the production server by the application developers. Which action will you perform to achieve the goal?()
第14题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance. Which action will you perform?()
第15题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? ()
第16题:
ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? ()
第17题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()
第18题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?()
第19题:
For the database, you should turn on the TRUSTWORTHY database option
For the database, the PAGE_VERIFY database option should be set to CHECKSUM
For the database, the database compatibility level option should be set to 10
For the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.
第20题:
To finish the task, Data Collector should be utilized.
To finish the task, the SQLdiag.exe utility should be utilized.
To finish the task, SQL Server Profiler and the tracerpt.exe utility should be utilized.
To finish the task, SQL Server Profiler and System Monitor should be utilized.
第21题:
Failover clustering should be included.
Asynchronous database mirroring without a witness server should be included.
Peer-to-Peer replication should be included.
Log shipping to servers at two of the sites to offer read-only replications of data should be included.
第22题:
To finish the task, you should utilize Resource Governor.
To finish the task, you should utilize Database Engine Tuning Advisor.
To finish the task, you should utilize Extended Events.
To finish the task, you should utilize Performance Monitor (SYSMON).
第23题:
The clustered index of the Orders table should be dropped.
The clustered index of the Orders table offline should be rebuilt once a month.
The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.
The clustered index of the Orders table should be reorganized by reducing the fill factor.
第24题:
All SQL Server instances should be installed on a failover cluster.
One list of all Windows logins and passwords should be sustained.
All backup media offsite should be stored.
SQL login accounts and credentials should be scripted.
The administrative processes and application access requirements should be documented.