Escolar Documentos
Profissional Documentos
Cultura Documentos
CertKiller.com has hired you as a database administrator for their network. Your duties include
administering the SQL Server 2008 servers.
You receive an instruction from the CIO to implement page compression on numerous partitions in
order to save space. You need to determine what effect implementing compression will have on
the SQL Server components.
m
E. Existing query plans will not be affected by implementing page compression.
F. Log shipping will not be affected by implementing page compression.
Answer: A,B,F
.co
Explanation:
sts
Page level or row level compression does not affect backup operations, restore operations, or log
shipping operations. These operations simply read the data or write the data to the disk. Reading
and writing functions are not affected by page level or row level compression.
lTe
Incorrect Answers:
E: Existing query plans that are used to view data on partitions will be affected by compression.
When row compression or data compression is enabled, data will be stored in different numbers of
tua
pages and number of rows. The query plans would need to be re-optimized after compression is
implemented.
Ac
QUESTION NO: 2
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance.
You are currently planning the deployment of a new database. The database will have the
subsequent capacity requirements:45 GB for the transaction log file280 GB for the database data
file
There are approximately six 120 GB disk drives available for the database in the storage array.
CertKiller.com contains a RAID controller that supports RAID levels 0, 1, 5 and 10. The disks are
on the RAID controller. You receive an instruction from the CIO that is as follows:The transaction
log's write performance should be maximized.In the event of a drive failure, it is expected that the
"Pass Any Exam. Any Time." - www.actualtests.com 2
Microsoft 70-450: Practice Exam
database and transaction log files is protected.
You then decide to plan a storage system. You need to determine the storage configuration that
will accomplish this.
Answer: A
m
QUESTION NO: 3
.co
You work as a database administrator at CertKiller.com. You are responsible for administering the
SQL Server 2008 infrastructure for CertKiller.com.
sts
During routine monitoring you discover that the instance experiences a low number of CXPACKET
waits as well as a large number of lazy writer waits. To ensure productivity you need to better the
performance of the instance.
lTe
A. You should consider setting up the Windows System Monitoring tool to better the performance.
B. You should consider setting up the Asynchronous database mirroring to better the performance.
C. You should consider using the SQLAGENT.OUT log to better the performance.
D. You should consider setting up the software non-uniform memory access (soft-NUMA) to better
Ac
the performance.
Answer: D
QUESTION NO: 4
You receive an instruction from management to make sure that your department is prepared in the
event of a natural disaster. You thus decide to create a disaster readiness plan. You need to
determine the appropriate actions that should be included in your disaster readiness plan.
A. You should consider testing and using RAID 5 for the volume that contains the database files.
B. You should consider testing and using RAID 1 for the volume that has the operating system.
C. You should consider maintaining the system logs in a secure manner.
D. You should consider performing the recovery of a database(s) on another SQL server.
E. You should consider testing and using RAID 5 for the volume that has the operating system.
F. You should consider testing and using RAID 1 for the volume that contains the database files.
Answer: C,D
Explanation:
To ensure disaster readiness, you should maintain system logs in a secure manner and perform
recovery of a database on another SQL server. The full set of recommendations for disaster
readiness is as follows:
Ensure that your personnel are trained in restoring a database or server.
m
Have your staff test the backups and recovery sets.
Ensure that the regular database and transaction log backups are performed frequently.
Maintain system logs in a secure manner.
.co
Keep detailed records of what service packs were installed and when.
sts
Keep records of the SQL server configuration.
Perform and document the restoration of a server or database to another server.
lTe
Maintain a base-functionality script that may execute insert, update, and delete statements or a
batch of stored procedures to determine if everything is working correctly after a restore.
tua
QUESTION NO: 5
CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use
Ac
of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.
You are in the process of enabling FILESTREAM on a volume on CERTKILLER-DB01. You have
received instruction from the CIO to ensure that the volume store documents in compressed form.
You notice that volume F:\ is not formatted. You need to make sure that the volume will be able to
store documents in a compressed form.
Answer: D
Explanation:
This command will format the volume, convert it to NTFS and then label it as BLOBContainer .
This command will also set the NTFS cluster size to 4096. It is important to note that the cluster
size must be 4096 or smaller for compression to be enabled for a volume. Finally, the /c parameter
will compress the volume. When you are storing the FILESTREAM data, you can store it on a
compressed or a non-compressed volume. The data in FILESTREAM is actually stored on the file
system. There are a number of benefits to storing the data on the file system. For instance, you
will be able to compress data with the NTFS compression capabilities. When the data is stored, it
is in compressed form and when the data is retrieved, it is decompressed.
Incorrect Answers:
A: The commands format
m
B: The commands format
C: The command format F: /FS:NTFS /V:BLOBContainer /A:4096 will not work in this scenario.
.co
This command does not use the /c switch that is required to enable compression. With the
execution of this command, only /A: drive will be formatted as a NTFS volume with a 4096 cluster
size but without any compression.
sts
QUESTION NO: 6
lTe
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_DATA. During the course of the day you receive instruction from CertKiller.com to design a
RAID solution for the CK_DATA database which has high read/write activity. CertKiller.com wants
Ac
you to ensure that the I/O performance of CERTKILLER-DB01 is improved whilst ensuring that
there is fault tolerance for the database. CertKiller.com wants you to make use of the existing
resources as funds are tied to other projects.
Answer: A
Explanation:
m
first mirror disks and then create a stripe set of mirrored disks. This provides high fault tolerance
for data and excellent throughput performance.
.co
C: You should not use RAID 1 in this scenario. RAID 1 is known as disk mirroring. You need a
minimum of two disks to form a RAID 1 array. One primary disk is used for read/write operations
sts
and the data is replicated to the second disk. This RAID level offers better read performance but
slower write performance. Therefore, it is not a suitable solution.
D: You should not use RAID 0 in this scenario. RAID 0 is known as disk striping. This RAID level
lTe
stripes data across disks in the array, offering better throughput on the read/write operations.
However, there is no data protection offered in this RAID level. If one disk fails, the data stored on
the disk will be lost. Therefore, this RAID level will not be a suitable solution for CK_DATA
tua
database.
Ac
QUESTION NO: 7
A. You should consider making use of the format E: /A:4096 /V:Data command.
B. You should consider making use of the format E: /A:4K /V:Data command.
Answer: C
Explanation:
When you create a RAID 5 volume, you need to format it to ensure that it is usable for storing
data. By default, the allocation unit for a logical unit number (LUN) is 4096 bytes (4 KB) on an
NTFS partition. When you are storing data with large files on a RAID 5 volume, you should change
the allocation unit to 64 KB, which is 65536 bytes. When you run execute the command format f: /
A : 64K /V: Data, you will be able to format the RAID 5 disk with a new allocation unit. In this
command, you would need to provide the volume letter, which is f: in this case, the /A :size clause
defines the allocation unit size, which is 64 KB in this scenario, and /V: is the volume name.
Incorrect Answers:
A: The format E: /A:4096 /V:Data command will work in this scenario but will result in retaining the
m
default allocation unit size, which is 4096 bytes. To keep the default allocation unit size, you can
simply run the format command without specifying the allocation unit size.
.co
B: The format E: /A:4K /V:Data command will not work in this scenario. You would be prompted
with Invalid parameter -/A:4K error. You must provide the size of the allocation unit in bytes if the
allocation unit size is below 16 KB, for instance, 8192 for 8 KB. For allocation unit sized at 16 KB
sts
and above, the value must be written in K, such as 16 KB.
D: The format E: /A:65536 /V: Data command will not work. You would be prompted with Invalid
parameter - /A:65536 error upon executing this command. You must provide the size of the
lTe
allocation unit in KB for 16, 32, and 64 KB. For the value below 16 KB, you must write the value in
bytes, for instance, 8192 for 8 KB.
tua
QUESTION NO: 8
Ac
Answer: A
Explanation:
You should configure your SQL Server 2008 implementation in the following manner:
m
Operating System files: RAID 1
Transaction files: RAID 1
.co
To meet varying requirements for response time, data reliability, and performance, you typically
use different RAID levels depending on how you are designing the SQL Server deployment. These
sts
RAID levels are:
RAID 5: Known as Striping with Parity. The parity information is written across all disks in the
array. You need minimum of three disks to form a RAID 5 array. This RAID level offers better
lTe
read/write performance as long as all disks in the RAID 5 are present. If one disk is missing, the
read performance is degraded. RAID 5 stripes data across all disks in the array.
RAID 0: Known as Disk Striping. This RAID level stripes the data across disks in the array, offering
tua
better throughput on the read/ write operations. However, there is no data protection offered in this
RAID level. If one disk fails, the data stored on the disk will be lost.
RAID 1: Known as Disk Mirroring. You need minimum of two disks to form a RAID 1 array. One
Ac
primary disk is used for read/write operations, and the data is replicated to the second disk. This
RAID level offers better read performance and fault tolerance, but slower write performance than
RAID 0.
The scenario states that the database must be functional even if a drive fails in the system. To
meet this goal, you must have the operating system files on RAID 1. Using RAID 1, you will mirror
the operating system so that even if a disk fails, the operating system will function. The transaction
logs should be placed on a separate RAID 1 array. SQL Server writes data to the transaction logs
and maintains serial information of all the modifications that occurred in a SQL database. The
transaction log files can be used for rollback and roll forward operations from a SQL Server
database. To enhance the performance of SQL databases, you should place the transaction log
files on a dedicated RAID 1. Finally, the SQL Server files and filegroups should be placed on a
RAID 5 array to achieve the best performance throughput.
Incorrect Answers:
m
QUESTION NO: 9
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
sts
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
lTe
CK_SALES. During the course of the day you receive instruction from CertKiller.com to
reconfigure the CK_SALES database for placement on the disk subsystem. CertKiller.com wants
you to place the database on the fastest I/O subsystem whilst ensuring user data is not lost when
tua
A. You should consider placing the CK_SALES database on the same RAID 1 disk as the
operating system.
B. You should consider placing the CK_SALES database on the same RAID 0 disk as the
operating system.
C. You should consider placing the CK_SALES database on a separate RAID 0 solution.
D. You should consider placing the CK_SALES database on a separate RAID 5 solution.
Answer: D
QUESTION NO: 10
The CERTKILLER-DB01 storage array has six 200 GB disk drives available for the database
which are attached to a RAID controller supporting RAID levels 0, 1, 5 and 10. CertKiller.com
wants to have the write performance of the transaction log maximized whilst having the database
and transaction log protected from drive failure by designing the storage system.
A. You should consider making use of a RAID 0 volume and RAID 5 volume.
B. You should consider making use of a RAID 1 volume and RAID 5 volume.
m
C. You should consider making use of a single RAID 5 volume.
D. You should consider making use of a single RAID 10 volume.
Answer: B
.co
sts
QUESTION NO: 11
lTe
During the course of the day you discover that CERTKILLER-DB01 is experiencing a low number
of CXPACKET waits whilst experiencing a large number of lazy writer waits. CertKiller.com wants
you to optimize the performance of CERTKILLER-DB01.
A. You should consider having the software non-uniform memory access (soft-NUMA) configured.
B. You should consider having an increase configured in the maximum degree of parallelism
option.
C. You should consider having the Resource Governor configured.
D. You should consider having the Windows System Resource Manager configured.
Answer: A
QUESTION NO: 12
You are employed as a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 database server named CERTKILLER-DB01 that consists of
four processors.
m
CERTKILLER-DB01.
Answer: B,C
Explanation:
If you do not want to use all of the installed processors in your SQL Server operations, you can
Ac
limit the use of processors by configuring the processor value to a lower number than the actual
number of processors installed. For instance, if a server has four processors and you want to use
only three for parallelism, then you should set the max degree of parallelism option to 3.
When you want to use a specific number of processors for an individual query or index operation,
you can use the MAXDOP query hint or index option to provide better control. MAXDOP overrides
the settings defined in the max degree of parallelism option.
The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint
or index option.
Incorrect Answer:
A: If you set the max degree of parallelism option to 2, all databases on CERTKILLER-DB01 will
use only two processors, not four as required in the scenario. In this scenario, you want to use four
processors for any operations used by CK_PRODUCTS and in any other database. You can use
QUESTION NO: 13
m
CERTKILLER-DB01 contains two processors. You have received instruction from the CIO to make
.co
use of more than one processor for parallelism. You thus set the Show Advanced Options to 1.
You then write the subsequent code:
sp_configure 'max degree of parallelism', 6;
sts
GO
RECONFIGURE WITH OVERRIDE;
lTe
GO
You need to determine what the result will be when you execute the code above.
tua
Answer: C
Explanation:
When you are using the maximum degree of parallelism, you must first set the Show Advanced
Options to 1, which was already done in the scenario. The number of processors that can be used
for all query and index operations is configured with the max degree of parallelism option, which
by default is set to 0. The default option, 0, uses the actual number of processors installed in the
system for the parallel execution plans of queries and index operations. Any non-zero numeric
value indicates the exact number of processors being used. If you specify more processors than
are installed in the system, then it will use all available processors and not return an error. In this
m
because the server only has two processors.
.co
QUESTION NO: 14
sts
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com requires information about the system resources like the amount of
memory available and consumed by CERTKILLER-DB01.
tua
view.
B. You should consider making use of the sys.dm_os_sys_info dynamic management view.
C. You should consider making use of the sys.dm_os_stacks dynamic management view.
D. You should consider making use of the sys.dm_os_process_memory dynamic management
view.
Answer: B
Explanation:
This dynamic management view was introduced in SQL Server 2008. The sys.dm_os_sys_info
view provides rather simple display of physical and virtual memory available with the operating
system. This view also provides information regarding the system resources available and
consumed by SQL Server. You can also use the sys.dm_os_sys_memory view to see a detailed
view of physical memory and memory-resource notification bits, which provide the state of the
QUESTION NO: 15
m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to select
what the recommended size of the allocation unit should be when your database is expected to
have a high number of transactions.
sts
Answer: A
Ac
Explanation:
By default, the allocation unit for a logical unit number (LUN) is 4096 bytes on an NTFS partition.
When you are storing data with large files on a RAID 5 volume, you should change the allocation
unit to 64 KB, which is 65536 bytes. The format f: / A : 64K /V: Data command will allow you to
format the RAID 5 disk with a new allocation unit. In this command, you would need to provide the
volume letter, which is f: in this case. The /A :size clause defines the allocation unit size, which is
64 KB in this scenario, and /V: is the volume name.
Incorrect Answers:
B: 8192 and 32 KB are incorrect because these are not recommended options for storing large
databases with high transaction rates. However, if required, you can set the allocation unit to these
values.
C: The allocation unit size 4096 is the default size assigned to a RAID 5 volume. To be able to
change this value, you need to format the volume with a new allocation unit size.
QUESTION NO: 16
m
A. The current configuration would make use of one processor only.
B. The current configuration would make use of two processors by the default setting of Max
.co
Degree of Parallelism option overriding the MAXDOP option.
C. The current configuration would make use of four processors only.
D. The current configuration would make use of three processors only.
sts
Answer: D
lTe
Explanation:
The option stating that three processors will be used for index creation is correct. The number of
processors that can be used for all query and index operations are set using the Max Degree of
tua
Parallelism option, which by default is set to 0. The default option, 0, uses the actual number of
processors installed in the system for parallel execution plans for queries and index operations.
When you want to use a specific number of processors for an individual query or index operation,
you can use the MAXDOP query hint or index option to provide better control. The MAXDOP
Ac
query hint overrides the settings defined in the Max Degree of Parallelism option. The use of the
MAXDOP query hint is limited to the execution of query that contains the MAXDOP query hint or
index option. This query hint can also be used with online index creation, and allows you to restrict
the number of processors in the SQL Server 2008 server to be used in the online index creation.
During online index creation, the MAXDOP setting overrides the Max Degree of Parallelism option.
Incorrect Answers:
A: Only one processor will not be used. One processor can be used only under two conditions,
either using a MAXDOP value that overrides the Max Degree of Parallelism option, or by setting
the Max Degree of Parallelism option to 1 when MAXDOP is not used explicitly used in any of the
query or index creatio
B: The default setting for the Max Degree of Parallelism option will not override the MAXDOP
setting. MAXDOP overrides the default setting of the Max Degree of Parallelism option. Also, the
default setting for Max Degree of Parallelism option is 0, not 2
QUESTION NO: 17
m
A. You should consider making use of the MAXDOP index option in the index statement.
B. You should consider making use of the MAXDOP index option with the ALTER INDEX
REORGANIZE statement. .co
C. You should consider setting the Max Degree of Parallelism option to 0.
D. You should consider setting the Max Degree of Parallelism option to 1.
sts
Answer: A
lTe
Explanation:
You should use the MAXDOP index option in the index statement to optimize the CPI performance
on SQL Server 2008. The number of processors that can be used for all query and index
tua
operations is set using the Max Degree of Parallelism option, which by default is set to 0. The
default option, 0, uses the actual number of processors installed in the system for parallel
execution plans for queries and index operations. When you want to use a specific number of
processors for an individual query or index operation, you can use the MAXDOP query hint or
Ac
index option to provide better control. MAXDOP overrides the settings defined in the Max Degree
of Parallelism option. The use of MAXDOP is limited to the execution of a query that contains the
MAXDOP query hint or index option. MAXDOP can also be used with online index creation, and
allows you to restrict the number of processors in the SQL Server 2008 server to be used in the
online index creation. MAXDOP overrides the Max Degree of Parallelism option with index
creation as well.
Incorrect Answers:
B: You should not set the Max Degree of Parallelism option to 1. When you set the Max Degree of
Parallelism option to 1, the parallel plan generation is suppressed. The query execution is no
longer executed in parallel, and is executed in serial. You cannot use the MAXDOP index option
with the ALTER INDEX REORGANIZE statement.
C: You should not set the Max Degree of Parallelism option to 0. This is the default value defined
for this setting. With the default value as 0, this option uses the actual number of processors
QUESTION NO: 18
CERTKILLER-DB01 has four quad-core processors and regularly experiences CPU pressure. The
users at CertKiller.com use the large mission critical database frequently, which resides on
m
CERTKILLER-DB01. During the course of the day you receive an instruction from the CIO to make
sure that the online index rebuilds does not utilize all thye CPU cycles that are available.
.co
What should you do?
sts
A. You should consider having the max degree of parallelism option configured.
B. You should consider running the Netsh utility.
C. You should consider using the Hyper-V feature on the quad-core servers.
lTe
D. You should consider configuring the Background Intelligent Transfer Service (BITS) server
extensions.
tua
Answer: A
Explanation:
Part 3: Design physical database and object placement. (15 Questions)
Ac
QUESTION NO: 19
You work as a database administrator at CertKiller.com. Your duties include administrating a SQL
Server 2008 instance. You are currently planning to deploy a new database named CK_Data to
the 2008 instance.
CK_Data will have multiple schemas as well as being subjected to regular inserts and updates. A
large amount of read-only reference information will be hosted on one of the schemas. You have
received instructions from the management to set up a physical database structure to optimize the
backup performance.
Answer: A
QUESTION NO: 20
You are employed as the database administrator at CertKiller.com. CertKiller.com currently makes
use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.
m
CERTKILLER-DB01 is configured with 1024 MB of RAM, 80 GB system drive with SQL Server
.co
installed as well as a single Core2 Duo 1.6 GHz processor. CERTKILLER-DB01 hosts a database
named CK_DATA. CK_DATA contains:
One primary data fileTwo secondary data filesOne transaction log file.
sts
During routine monitoring you discover that the hard drive has only 2 GB of free space available.
You notice that the performance of CK_DATA has degraded. You have received instruction from
lTe
Answer: B
Explanation:
It is highly recommended that for better disk I/O usage, you place the data files and log files on
different hard drives dedicated to these files. If you place all of them in the same hard drive, there
is going to be a performance bottleneck.
As a recommended practice, you should separate the database files and transaction log files on
different disks, preferably disks attached to different disk controllers. As stated in the scenario, you
have 2 GB space left in the drive that contains data and log files. To meet the required goal, you
would need to add more hard drives in the system and move the data files and transaction logs on
separate new hard drives.
"Pass Any Exam. Any Time." - www.actualtests.com 18
Microsoft 70-450: Practice Exam
Incorrect Answers:
D: Adding new processors or increasing memory will not help in this scenario. The problem is with
the hard drive free space. Adding a new processor or more RAM to the server will not resolve the
issue stated in the scenario.
QUESTION NO: 21
You are in the process of adding additional tables to CK_DATA in order to support the new
application. The additional tables will BLOBs that is greater than 1 MB. You need to maximize the
read access. At present the application makes use of a middle tier for application logic. You need
m
to determine the data type that needs to be configured for CK_DATA.
D. You should consider configuring the varbinary(max) data using FILESTREAM storage on an
NTFS partition.
tua
Answer: D
Explanation:
You should use FILESTREAM data when you are storing BLOBs that are on the average larger
Ac
than 1MB. FILESTREAM data can take advantage of the NTFS file system and disk subsystem for
the operating system to maximize read access. FILESTREAM should be used if the applications
that you are implementing use a middle tier for application logic. FILESTREAM data must use a
datatype of varbinary ( max).
Incorrect Answers:
A: You should not store BLOBS in the database if the objects are larger than 1 MB and fast read
access is important.
B: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage.
C: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage.
QUESTION NO: 22
CERTKILLER-DB01 has one transaction log file and three data files that contain large indexes.
You receive an instruction from the CIO to optimize performance of the database. The data files as
well as the transaction files is stored in currently stored on Drive A. Drive A also contains the
system drive where CERTKILLER-DB01 is installed. Due to budgetary constraints you are unable
to add additional hard drives on CERTKILLER-DB01.
m
database files on the same location.
C. This can be accomplished by moving the largest data file from Drive A to Drive B and leaving
the remaining files in the same location. .co
D. This can be accomplished by moving the files to Drive B.
sts
Answer: B
Explanation:
lTe
When data is written on to a database, the transaction log file is the file that records this activity. In
most SQL Server environments, the transaction log file is one of the most used files, as it keeps
writing information based on the transactions that were either committed to the database or rolled
tua
back. As this file writes every change that occurs in the database, it needs more processing power
than the data files. Therefore, Microsoft recommends you have the transaction log on a separate
drive. Even the data files should be stored on separate drives.
Ac
It is highly recommended that for better disk I/O usage, you should place data files and log files on
different hard drives dedicated for these files. If you place all of them in the same hard drive, there
is going to be a performance bottleneck. As a recommended practice, you should separate the
database files and transaction log files on different disks, preferably disks attached to different disk
controllers. As stated in the scenario, you have 2 GB space left in the drive that contains the data
and log files. As a recommended practice, you should have data files and transaction log on
separate drives to achieve better performance throughput of the database.
Incorrect Answers:
A: You should not install a new SQL Server instance on the computer and move the database to
the new SQL Server instance. This change will not make any difference in the performance of the
database in this scenario if the database files and the log files are not separated. Installing a
second SQL Server instance will actually slow performance because you will have two instances
of SQL Server competing for resources on the same computer.
C: You should not move the biggest data file to Drive B and keep the remaining files in the same
QUESTION NO: 23
m
What should you do?
.co
A. You should consider making use of the SQL Server: SQL Statistics object.
B. You should consider making use of the SQL Server: Workload Group Stats object.
sts
C. You should consider making use of the SQL Server: Databases object.
D. You should consider making use of the SQL Server: General Statistics object.
lTe
Answer: C
Explanation:
tua
The SQL Server: Databases object contains counters that help you monitor backup/restore
throughput, transaction log activities, and bulk copy operations. There are a number of counters
used for monitoring log-related activities. Some of these counters are Log Bytes Flushed/sec, Log
Cache Hit Ratio, Log Cache Reads/sec, Log File(s) Size (KB), Log Growths, and Percent Log
Ac
Used. You should not use the SQL Server: General Statistics object to monitor the transaction log
activities. Using this object, you can capture information on number of current connections to the
SQL Server.
Incorrect Answers:
A: You can also view the number of users who either connect or disconnect with the SQL Server
instance. However, this object cannot be used for monitoring transaction log activities. You should
not use the SQL Server: SQL Statistics object to monitor the transaction log activities. This object
contains counters used for monitoring the compilation and recompilations of user queries sent to
an instance of SQL Server. However, this object cannot be used for monitoring the transaction log
activities.
B: You should not use the SQL Server: Workload Group Stats object to monitor the transaction log
activities. This object contains counters that monitor the performance of the Resource Governor
Workload group. However, this object cannot be used for monitoring the transaction log activities.
QUESTION NO: 24
m
instruction from CertKiller.com to make use of a number of indexes for update and insert
operations whilst optimizing the indexing operations. CertKiller.com wants you to additionally
.co
locate the indexes which are most frequently used for performing the update and insert operations.
Answer: D
Explanation:
The sys.dm_db_index_usage_stats dynamic management view allows you to track which index is
Ac
most frequently used for update and insert operations. Using this view, you can track when an
index was last used. This view also tracks the type of indexes used for update and insert
operations. Every time an index is used for an operation such as an update, the counter of the
index in the view is incremented by one. This view is also used for tracking unused indexes, which
typically cause maintenance overhead.
If you have a performance-related concern, you can use the Database Engine Tuning Advisor to
recommend indexes for a single or multiple databases. The Database Engine Tuning Advisor can
work with different types of indexes, such as clustered or nonclustered , and to resolve unused or
potential index issues.
Incorrect Answers:
A: The sys.dm_db_index_physical_stats function is a replacement of the DBCC SHOWCONTIG
statement from the previous version of SQL Server. This function returns the defragmentation of
indexes and data. The indexes and data can be part of a specific view or a table. This function will
QUESTION NO: 25
m
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you added four disk drives to CERTKILLER-DB01 which
configuration are shown below:
.co
Disk Drive 1: 40 GB. System drive with SQL Server installed.Disk Drive 2: 40 GB. System drive
with SQL Server installed.Disk Drive 3: 60 GB. Formatted and with 35 GB free.Disk Drive 4: 60
sts
CertKiller.com plans on creating an additional database named CK_PRODUCTS which will have a
primary data file and secondary data file with one transaction log file which is expected to have
high utilization in the production environment. CertKiller.com wants you to optimize the
tua
A. You should consider having the primary data files placed on Drive 1 and the transaction log file
on Drive 2 with the secondary data file on Drive 3.
B. You should consider having the primary data files placed on Drive 2 and the transaction log file
on Drive 3 with the secondary data file on Drive 4.
C. You should consider having the primary and secondary data files placed on Drive 2 and the
transaction log file on Drive 3.
D. You should consider having the primary and transaction log files placed on Drive 2 and the
secondary data file on Drive 3.
Answer: B
Explanation:
To meet the required goal, you should place the primary data files on Drive2, the transaction log
file on Drive3, and the secondary data file on Drive4. It is highly recommended that for better disk
You should not have the Windows operating system and SQL Server overload a disk with I/O
traffic.
Incorrect Answers:
A: You should not place the primary data files on Drive l, the transaction log file on Drive 2, and
the secondary data file on Drive 3. Placing the primary data files on the drive that contains the
m
Windows operating system (Drivel) will cause a performance bottleneck, and is not recommended
by Microsoft. There will be high I/O usage of Drivel, which will degrade database performance.
.co
Also, in case of disk failure, both the Windows operating system and the primary data files can be
at risk if appropriate backup solutions are not in place.
sts
C: You should not place the primary and secondary data files on Drive l and the transaction log file
on Drive 2. As a recommended practice, if possible, all data files and transaction logs should be
kept on separate drives for better I/O usage of the hard drive. You get better throughput of the
lTe
on separate drives for better I/O usage of the hard drive. You get better throughput of the hard
drive when there are fewer I/O operations.
Ac
QUESTION NO: 26
CertKiller.com is aware of the partitioning functions which horizontally split tables based on the
value in a specific column. CertKiller.com wants you to implement a sliding window scenario
switching partitions into and out of the table whilst archiving the oldest data to improve
performance.
A. You should make use of the statement: ALTER PARTITION FUNCTION and MERGE RANGE.
B. You should make use of the statement: ALTER TABLE and MERGE RANGE.
C. You should make use of the statement: ALTER PARTITION FUNCTION and SPLIT RANGE.
D. You should make use of the statement: ALTER TABLE and SPLIT PARTITION.
Answer: A
Explanation:
The alter partition function statement can be used to merge or split a partition based on values.
The following partition function creates partitions:
CREATE PARTITION FUNCTION AutoPartsRangePFl ( int )AS RANGE LEFT FOR VALUES (1,
500, 1000);GO
The following function can merge the partitions between boundary values 1 and 500 and between
boundary values 500 and 1000 to create a single partition between boundary values 1 and 1000:
m
ALTER PARTITION FUNCTION AutoPartsRangePF1 ( ) MERGE RANGE (500);
Incorrect Answers:
.co
B: You cannot use the alter table statement with either split range or merge range, split range or
merge range can only be used with the alter partition function statement.
sts
C: You should not use alter partition function and split range. This would split one partition of a
partitioned table into two partitions. In this scenario, you want to combine two partitions of a
partitioned table into one partition.
lTe
D: You cannot use the alter table statement with either split range or merge range, split range or
merge range can only be used with the alter partition function statement.
tua
QUESTION NO: 27
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 used to test applications and packages and
CERTKILLER-DB02 with an instance that hosts a database named CK_SALES. During the course
of the day you receive instruction from CertKiller.com to move the maintenance and backup jobs
from CERTKILLER-DB01 running SQL Server 2008 Developer edition to CERTKILLER-DB02
running SQL Server 2008 Enterprise Edition. CertKiller.com is aware that the hardware of both
servers is similar.
A. You should consider making use of the sp_add_jobserver stored procedure to move the two
jobs from CERTKILLER-DB01 to CERTKILLER-DB02.
B. You should consider making use of the sp_add_jobstep stored procedure to move the two jobs
from CERTKILLER-DB01 to CERTKILLER-DB02.
"Pass Any Exam. Any Time." - www.actualtests.com 25
Microsoft 70-450: Practice Exam
C. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore
the backup on CERTKILLER-DB02.
D. You should consider making use of a Script Job on the two jobs on CERTKILLER-DB01and run
the scripts on CERTKILLER-DB02.
E. You should consider making use of the sp_add_job stored procedure to move the two jobs from
CERTKILLER-DB01 to CERTKILLER-DB02.
Answer: A,D
Explanation:
You should use Script Job as on the two jobs on CERTKILLER-DB01 and run the scripts on
CERTKILLER-DB02. You can script a current job by using the SQL Server Management Studio
(SSMS). You can highlight the job and choose Script Job as. You can script the job to a file or to
the query window for editing. Once you have scripted the job, you can run the script to create the
jobs on CERTKILLER-DB02.
m
You can use sp_add jobserver to move the jobs from CERTKILLER-DB01 to CERTKILLER-
.co
DB02. This stored procedure can be used to assign a job to run on a different server. The job must
exist on a source server. You must have a target server registered to assign a multiserver job to it.
In this scenario, CERTKILLER-DB01 has the two jobs. You must register CERTKILLER-DB02 as
sts
the target server. The following code assigns the multiserver job Backup Job Orders to
CERTKILLER-DB02:
USE msdb ;
lTe
GO
EXEC dbo.sp _add_jobserver@job_name = N' BackupJobOrders ',@ server_name =
N'CERTKILLER-DB02;
tua
GO
Incorrect Answers:
B: You should not use sp_add Jobstep to move the two jobs from CERTKILLER-DB01to
Ac
CERTKILLER-DB02. This stored procedure is used to add a step to a multistep job. This stored
procedure cannot be used to move or copy a job to another server.
C: You should not back up the msdb database on CERTKILLER-DB01and restore it on
CERTKILLER-DB02. The msdb database stores jobs, operators, alerts, and backup history. If you
backup the msdb database from one server and restore it on another server, you will overwrite any
jobs, operators or alerts that currently exist on the destination server. In this scenario, you only
wanted to copy two jobs to SQL1. You would not be able to restore the msdb database on
CERTKILLER-DB02because CERTKILLER-DB01and CERTKILLER-DB02have different builds
and different editions of SQL Server. You can only restore system databases on the same build
and same edition of SQL Server.
E: You should not use sp_addjob to move the two jobs from CERTKILLER-DB01to CERTKILLER-
DB02. This stored procedure is used to create a job. This stored procedure cannot be used to
move or copy a job to another server.
QUESTION NO: 28
A. You would only be able to create multiple full-text indexes per table.
B. You would only be able to create multiple full-text indexes per view created with the encryption
m
option.
C. You would only be able to create one full-text index per database.
.co
D. You would only be able to create one full-text index per view created with the encryption option.
E. You would only be able to create multiple full-text indexes per view created with the
schemabinding option.
sts
F. You would only be able to create one full-text index per table.
G. You would only be able to create one full-text index per view created with the schemabinding
option.
lTe
Answer: F,G
tua
Explanation:
For a full-text index, you must have a catalog in the database to store the full-text index. Full-text
indexes cannot be placed anywhere except in full-text catalogs. Therefore, full-text catalogs must
exist. Only one full-text index can be created per table or indexed view. An indexed view can only
Ac
be created if it the view is created with the schehabinding option. A full-text catalog can hold
multiple full-text indexes. It is highly recommended that tables and full-text indexes refer to the
same full-text catalog. There can be multiple full-text indexes per database because a database
can have multiple tables, and each table can have maximum of one full-text index. Therefore,
each database is capable of having as many full-text indexes as the number of tables it contains.
Incorrect Answers:
A: You cannot have multiple full-text indexes per view created with the encryption option. Only an
indexed view can have a full-text index. You can create an indexed view by using the
schehabinding option, not the encryption option. The encryption option hides the source code of
the view from being seen.
B: You cannot have multiple full-text indexes per view created with the encryption option. Only an
indexed view can have a full-text index. You can create an indexed view by using the
schehabinding option, not the encryption option. The encryption option hides the source code of
QUESTION NO: 29
m
database server named CERTKILLER-DB01 with an instance that hosts a number of databases.
During the course of the day you receive instruction from CertKiller.com to increase the
.co
performance of the database containing several large tables. CertKiller.com wants you to make
use of partitioning to improve the performance whilst also segregate old data from the existing
queries to return faster results. CertKiller.com wants you to have the table split into multiple tables
sts
with fewer rows than parent table and equal number of columns spread across tables.
lTe
Answer: C
Explanation:
You should use the horizontal partitioning method to improve database performance. This method
allows you to divide a single large table into multiple smaller tables with fewer rows and an equal
number of columns. Horizontal partitioning allows you to reduce the table data depending on your
requirements. For instance, if a table contains data from the last ten years, and you frequently
access only the current year's data, you can horizontally partition the table into 12 tables. Each
table in this method would represent data for a specific year. Database performance is enhanced
because you are accessing only a specific year's data from an individual table when queries are
executed. Therefore, it provides quicker response time and enhanced data performance because
less data is scanned.
Incorrect Answers:
m
QUESTION NO: 30
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts
CK_SALES. The CK_SALES database currently has more than 11 million rows and twenty
columns. During the course of the day you receive instruction from CertKiller.com to replicate the
lTe
data to several subscribers. CertKiller.com wants you to have the data partitioned horizontally for a
transformable subscription and know what the results will be when the subscription is received
during replication.
tua
A. The current subscription would result in the table having fewer rows and the columns
Ac
unchanged.
B. The current subscription would result in the table having the columns and rows unchanged.
C. The current subscription would result in the table having the rows unchanged and fewer
columns.
D. The current subscription would result in the table having fewer columns and rows.
Answer: A
Explanation:
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
able to split the table into fewer rows and the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
the same. You gain a performance benefit because you will have fewer rows to work with.
Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.
In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
partitioning, the columns are divided amongst multiple tables with the same number of rows.
Vertical partitioning can be of two types: normalization and row splitting. In normalization,
redundant columns are removed from the primary table and moved into secondary tables. The
redundant columns are then linked with the primary table using primary or foreign key. In row
splitting, fewer columns are retained, which means that each row contains a portion of the logical
row in the partitioned table.
QUESTION NO: 31
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
.co
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to fine tune
CERTKILLER-DB01 by reducing the size of the backup logs and logs appended with every
sts
successful backup operation whilst avoiding entry in the error log when a successful backup is
performed.
lTe
Answer: A
Explanation:
To meet the required goal in the scenario, you should set the trace flag 3226. When you add this
flag, it has the following effects:
Successful backup entries are not added to the SQL Server error logs.
Entries are prohibited from being logged in the System event log.
Only failed backup event entries are logged.
No successful backup entries are logged.
You should ensure that no script is dependent on any successful backup entries that are logged
either in the error log or in the System event log. A trace flag can be either specific to a session or
a global trace flag. A trace flag can be switched on or off by using the dbcc traceon and dbcc
QUESTION NO: 32
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance. CERTKILLER-DB01 is configured
to host a database named CK_SALES. The hardware configuration of CERTKILLER-DB01 is
sts
shown below:
CERTKILLER-DB01 has 64-GB of RAM.CERTKILLER-DB01 has four quad-core
lTe
expected to have high volumes of INSERT, UPDATE and DELETE activities. The CertKiller.com
CIO wants you to enhance the performance of the database by maximizing bandwidth and
reducing the connection in the storage allocation structure.
Ac
A. The best option is to use the default.trc file for the database.
B. The best option is to use the data collector for the database.
C. The best option is to create numerous data files for the database.
D. The best option is to use the Network Load Balancing for the database.
Answer: C
QUESTION NO: 33
A. The best option is to use multiple filegroups and a single log file to create the database.
B. The best option is to use the master database to create the database.
C. The best option is to use resource database and a single log file to create the database.
D. The best option is to use SQL Server registry hive and multiple filegroups to create the
database.
m
Answer: A
Explanation:
.co
Part 4: Design a migration, consolidation, and upgrade strategy. (6 Questions)
sts
QUESTION NO: 34
lTe
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance. At present the instance makes use of a 32-bit version on a Windows
Server 2008 64-bit server.
tua
CertKiller.com has enabled the awe option. You expect the instance to get an increase in the
query actions. You have received instructions from the CIO to use the best time to migrate the
databases to a 64-bit SQL Server 2008 server without changing the hardware. To comply with the
Ac
instructions, you need to the suitable data collector type that will supply you with the necessary
data.
Answer: A
CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of a Microsoft SQL Server 2008 server named CERTKILLER-DB01 that contains a
number of databases.
During routine monitoring you discovered an increase in the amount of queries. You check and
discover that the performance of CERTKILLER-DB01 has degraded. To ensure that a high level of
productivity is maintained you decide to install an additional SQL Server 2008 server on the
network. After the installation you will move a number of databases from CERTKILLER-DB01 to
the new server. You should also ensure that compression is enabled in the new server. You need
to determine the appropriate SQL version that should be installed on the new server.
m
A. You should consider installing SQL Server 2008 Standard edition.
B. You should consider installing SQL Server 2008 Developer edition.
.co
C. You should consider installing SQL Server 2008 Enterprise edition.
D. You should consider installing SQL Server 2008 Express edition.
sts
Answer: B,C
Explanation:
SQL Server 2008 supports compression at row-level and page-level for both tables and indexes.
lTe
You can use the create table and create index statements to create compressed tables and
indexes. To modify the compression state of an existing table, index, or partition, you can use the
alter table or alter index statements. However, configuring row and page compression can affect
tua
the performance of your sever. When you configure row and page compression, CPU utilization is
increased, while I/O utilization and memory utilization are decreased.
Incorrect Answers:
Ac
A: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition
because these editions of SQL Server 2008 do not support compression.
D: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition
because these editions of SQL Server 2008 do not support compression.
QUESTION NO: 36
Answer: C,D,E
Explanation:
These are the only editions of SQL Server on the supported upgrade path from SQL Server 2005
(32-bit) Express. You cannot upgrade SQL Server 2005 to SQL Server 2008 Standard, Enterprise
, or Workgroup. If you want to use a version other than SQL Server 2008 Express or SQL Server
2008 Express Advanced, you will have to perform a clean installation, and not an upgrade. You
m
can upgrade a server running SQL Server 2005 (32-bit) Standard Edition to SQL Server 2008
Standard Edition. You can upgrade a server running SQL Server 2005 (32-bit) Enterprise Edition
to SQL Server 2008 Enterprise Edition.
.co
sts
QUESTION NO: 37
lTe
CK_SALES. During the course of the day you receive instruction from CertKiller.com to migrate a
database from a 32-bit version of SQL Server 2005 to CERTKILLER-DB01 using SQL Server
2008 64-bit. You have successfully detached and reattached the databases from SQL Server
2005 to SQL Server 2008. CertKiller.com wants you to ensure that the database will be
Ac
successfully migrated.
Answer: B
Explanation:
In this case, you will also need to recreate any existing logins in the three system databases:
master, msdb , and model. To be able to migrate databases from a 32-bit version of SQL Server to
m
or returned to the operating system as and when required by SQL Server
C: You should not ensure that the databases were published in replication on SQL Server 2005.
.co
The databases from a 32-bit version of SQL Server cannot be restored to a 64-bit version of SQL
Server 2008 if they are published in the replication. The databases first must be detached from the
sts
source SQL Server and then reattached to the 64-bit SQL Server. However, you must ensure that
the databases are not published in replication. If they are published, you will not be able to migrate
them to the 64-bit SQL Server.
lTe
D: You should not set the Show Advanced Options to 1. This option would be used when you are
enabling AWE support on a 32-bit system, but it should not be enabled on a64-bit system, which is
the target of the migration in this scenario. You would also enable this option when using
tua
QUESTION NO: 38
CertKiller.com wants to know which facts below are true about migrating databases to SQL Server
2008 on a 64-bit computer?
A. The migration of this type will need to have Microsoft Windows Address Windowing Extensions
(AWE) API support enabled on the 64-bit platform to take advantage of existing memory.
"Pass Any Exam. Any Time." - www.actualtests.com 35
Microsoft 70-450: Practice Exam
B. The migration of this type would require you to enable the /3gb parameter in the boot.ini file.
C. The migration of this type would be done to the Windows on Windows (WOW64) 32-bit
subsystem
D. The migration of this type would have you being able to restore database to a 64-bit version of
SQL Server 2008 if published in the replication.
Answer: C
Explanation:
With WOW64, 32-bit processes run as if they are running on the 32-bit system, not a 64-bit
system. The operating system holds a directory named SYSWOW64 under the Windows directory.
This directory holds the 32-bit files that enable a 32-bit application to run on a 64-bit system. In this
scenario, you will be able to successfully migrate 32-bit SQL Server databases to the 32-bit SQL
Server on a 64-bit system because they will be installed to the WOW64 32-bit subsystem.
Incorrect Answers:
m
A: You cannot configure Microsoft Windows Address Windowing Extensions (AWE) API support
on a 64-bit platform. AWE is supported only on the 32-bit versions of Windows 2000 Server and
.co
Windows Server 2003. With the help of AWE, you can allow SQL Server to access physical
memory above the limit configured on the virtual memory. AWE works differently on Windows
2000 Server and Windows Server 2003. In Windows 2000 Server, AWE support can only be
sts
activated when there is more physical memory than virtual memory, after which it locks the
amount of memory specified in max server memoiy. If the max server memory limit is more than
the physical memory, then all memory except 128 MB is locked. In Windows Server 2003, SQL
lTe
Server allows the dynamic allocation of AWE mapped memory. AWE mapped memory can be
taken from or returned to the operating system as required by SQL Server.
B: You will not need to enable the /3gb parameter in the boot.ini file. If you have 4 GB of memory
tua
in a system, then by default 2 GB each are split between the operating system and the installed
applications. You can reduce the amount of memory assigned to the operating system and
allocate more memory by using the /3gb parameter in the boot.ini file. However, this parameter
Ac
QUESTION NO: 39
CertKiller.com recently partnered with Weyland Industries which has their own Active Directory
domain named weyland.com. All servers at Weyland Industries are running Windows Server 2003.
The weyland.com domain runs a mix of Microsoft SQL Server 2005 and Microsoft SQL Server
m
2008 database servers.
.co
CertKiller.com wants you to ensure that all weyland.com clients are able to make use of Kerberos
authentication when accessing database servers in the CertKiller.com domain.
sts
What should you do?
A. You should consider having the named pipes protocol disabled on the database servers in the
lTe
CertKiller.com domain.
B. You should consider having the VIA protocol enabled on the database servers in the
CertKiller.com domain.
tua
C. You should consider creating a trust relationship between the weyland.com domain and the
CertKiller.com domain.
D. You should consider having the Service Principal Name (SPN) deactivated for the database
Ac
Answer: C
Explanation:
The weyland.com domain is in a separate forest from CertKiller.com. For Kerberos authentication
to work between domains in separate forests, a trust must exist between the two domains. The
use of Kerberos authentication with SQL Server requires a Service Principal Name (SPN)
registered with Active Directory, and a client and server that are in the same domain or have a
trust relationship between different domains. The SPN maps to the Windows account associated
with the SQL Server instance.
Incorrect Answers:
A: You should not disable the named pipes protocol. Kerberos authentication in SQL Server 2008
can be used with TCP/IP, named pipes, or shared memory protocols, as long as the client and
SQL Server have the TCP/IP network layer protocol bound to their respective network adapters.
"Pass Any Exam. Any Time." - www.actualtests.com 37
Microsoft 70-450: Practice Exam
The client and SQL Server must have the TCP/IP network layer protocol bound to the network
adapter card to use Kerberos authentication with a domain controller in an Active Directory
domain. For the client to use Kerberos authentication with a SQL Server server in an Active
Directory domain, the client must be using the same SQL Server Network Configuration protocol.
A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/IP
network if both the client and the server are using the same named pipes protocol.
B: You should not enable the VIA protocol. The VIA protocol is used with a Virtual Interface
Adapter. Enabling or disabling the VIA protocol will not allow a SQL Server to use the Kerberos
authentication. You must have a trust relationship between the domains to use Kerberos
authentication.
D: You should not deactivate the Service Principal Name (SPN) for the database servers in the
weyland.com domain. You should have the SPN registered with Active Directory to use Kerberos
authentication.
m
QUESTION NO: 40
.co
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 Reporting Services (SSRS) instance.
sts
You have received instructions from the CIO to set up an authentication method that uses SQL
Server data connections for SSRS reports, that has the following criteria: the SSRS reports should
lTe
A. This can be accomplished by accessing the Active Directory directory service and register a
service principal name (SPN) the SSRS instance.
B. This can be accomplished by configuring the Roaming user profiles to make use of a domain
Ac
account.
C. This can be accomplished by configuring the VPN solution to make use of the Integrated
Security type.
D. This can be accomplished by configuring Background Intelligent Transfer Service (BITS)
settings to make use of the Secure Sockets Layer (SSL) protocol.
Answer: A
QUESTION NO: 41
CertKiller.com has hired you as a database administrator for their network. The CertKiller.com
network contains ten of Microsoft SQL servers that run either SQL Server 2008 or SQL Server
2005.
You receive an instruction from the CIO to configure a Central Management Server in order to
administer other SQL servers on the network. You need to follow the guidelines for creating
Central Management Server to accomplish this task.
A. You need to ensure that the Central Management Server is a member of the Registered
Servers group that it maintains.
B. You need to ensure that the server acting as the Central Management Server is configured to
run SQL Server 2008.
C. You need to ensure that the Central Management Server as well as the subordinate servers is
registered using Windows Authentication.
D. You need to ensure that the Central Management Server as well as the subordinate servers is
registered using SQL Server Authentication.
m
Answer: B,C
Explanation:
.co
You must ensure that the server that will act as the Central Management Server must be running
sts
SQL Server 2008. Also, the Central Management Server and subordinate servers must be
registered by using Windows Authentication. You can use Central Management Servers to
administer multiple servers simultaneously. The Central Management Server uses server groups
lTe
to maintain connection information for one or more instances of SQL Server. You can use
Transact-SQL statements or Policy-Based Management policies to administer servers in server
groups. After you configure a Central Management Server, you can create a query to display the
tua
resource usage, such as CPU and memory, on the servers that are members of the server group.
You can designate only SQL Server 2008 servers as Central Management Servers.
Incorrect Answers:
Ac
A: The option stating that the Central Management Server must be a member of the Registered
Servers group that it maintains is incorrect. The Central Management Server cannot be a member
of a group that it maintains.
D: The option stating that the Central Management Server and subordinate servers must be
registered by using SQL Server Authentication is incorrect because Central Management Servers
only support Windows Authentication.
QUESTION NO: 42
m
.co
sts
lTe
tua
You receive an instruction from the CIO to incorporate computers from the Courseware Publishers
workgroup into the CertKiller.com domain. You need to ensure that CertKiller.com users make use
Ac
of Kerberos authentication in order to communicate with the SQL Server from the Courseware
Publishers workgroup.
Answer: C
Explanation:
You must have a Service Principal Name (SPN) registered with Active Directory for the clients of
the CertKiller.com domain to use Kerberos authentication with the SQL Server from the
m
A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/ IP
network if both the client and the server are using the same named pipes protocol.
.co
B: You should not enable the VIA protocol. The VIA protocol is used with a Virtual Interface
Adapter. Enabling or disabling the VIA protocol will not allow a SQL server to use the Kerberos
sts
authentication. In this scenario, you must have a Service Principal Name (SPN) registered with
Active Directory.
D: You should not disable the named pipes protocol. Kerberos authentication can be used with
lTe
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to ensure
that all client connections to CERTKILLER-DB01 make use of SSL if the clients support SSL
encryption. CertKiller.com additionally wants clients not supporting SSL encryption to be denied
access.
What should you do? (Choose the correct options from the left and drag them to the right)
Answer:
m
.co
sts
lTe
tua
QUESTION NO: 44
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to implement
an application that will use the Service Broker service and allows workers to send sales orders to
the CK_SALES database. CertKiller.com wants the application to guarantee the sender of the
sales order will have the CK_SALES databse as the intended target since the database is not
granted special privileges by the Service Broker service. CertKiller.com wants the requirements
set below met:
The application should have the initiating service protected from sending messages to the
CK_SALES database.The application should have the target service protected from receiving
messages from the CK_SALES database.The application should have the Service Broker encrypt
messages transmitted over the network.
Answer: B
Explanation:
Anonymous security secures the initiating service when it sends messages to an untrusted
database. Anonymous security would not protect the target service from receiving messages from
the Orders database. In this scenario, the application uses the Server Broker service to send
messages to the Orders database. Any messages sent from the application over the network to
the Orders database will be encrypted when the conversation uses Anonymous security. In this
scenario, the initiating service needs to identify the recipient of the work order, but the target
service does not need to verify the identity of the initiating service.
m
Therefore, the initiating service should run as a member of the fixed database role public in the
Orders database.
Incorrect Answers: .co
A: You should not use full security for the Service Broker service. Full security would protect the
initiating service from sending messages to the Orders database and help protect the target
sts
service from receiving messages from the Orders database. In this scenario, it is not necessary to
protect the target service from receiving messages from the Orders database.
C: You cannot set Windows authentication or Mixed Mode authentication on the Service Broker
lTe
service. Windows authentication or Mixed Mode authentication can be set on the SQL Server.
Windows authentication allows a Windows user account from a computer or domain to log on to a
SQL server.
tua
D: Mixed Mode authentication allows both a SQL server login and a Windows user account from a
computer or domain to be authenticated to SQL Anonymous and full security can work with either
Windows authentication or Mixed Mode authentication.
Ac
QUESTION NO: 45
Answer: D
Explanation:
You should configure the AuthenticationTypes setting to RSWindowsKerberos in the
RSReportServer.config file to ensure that all client applications and third-party Web browsers use
m
Kerberos authentication. In the RSReportServer.config file, you have the option to set the following
AuthenticationTypes settings:
.co
RSWindowsNegotiate -Allows both Kerberos and NTLM authentication.
RSWindowsKerberos - Used if you have applications that only use Kerberos authentication.
sts
RSWindowsNTLM - Used if you have applications cannot use Kerberos authentication.
Incorrect Answers:
A: If you choose RSWindowsNegotiate, an error can occur if an application is configured to use
lTe
Kerberos only, the Report Server service is configured to run under a domain user account, and
the Service Principal Name (SPN) is not registered. In this scenario, you should have
AuthenticationTypes set to RSWindowsKerberos to avoid this error.The RSWebApplication.config
tua
file is also no longer used in SQL Server 2008. The configuration settings in the
RSWebApplication.config file that were used in previous versions of SQL Server have been
moved to the RSReportServer.config file.
Ac
B: You should not make any changes in the RSWebApplication.config file. The
RSWebApplication.config file is no longer used in SQL Server 2008. The configuration settings in
the RSWebApplication.config file that were used in previous versions of SQL Server have been
moved to the RSReportServer.config file.
C: RSWindowsNTLM is used if you have applications cannot use Kerberos authentication.
QUESTION NO: 46
A. You should consider having the default Web site on the new instance configured to use the
Secure Sockets Layer (SSL) protocol.
B. You should consider having a service principal name (SPN) registered in the Active Directory
directory service for the new SSRS instance.
C. You should consider having the default Web site on the new instance configured to use the
Integrated Security type.
D. You should consider having the application pool configured used by the default Web site to use
a domain account.
m
Answer: B
QUESTION NO: 47
.co
sts
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
lTe
CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure
CERTKILLER-DB01 to allow legacy clients to connect to CERTKILLER-DB01. The CertKiller.com
network currently has Novell NetWare clients which require access to CERTKILLER-DB01.
tua
A. You should consider making use of Windows Authentication Mode with named pipes network
Ac
library.
B. You should consider making use of Windows Authentication Mode with NWLink network library.
C. You should consider making use of Windows Authentication Mode with TCP/IP network library.
D. You should consider making use of Mixed mode authentication.
Answer: D
Explanation:
Users who have accounts in the Windows domain or Active Directory can be authenticated with
Kerberos authentication or NTLM authentication with Windows Authentication. Users who have
accounts created only on the SQL server, called SQL logins, can also be authenticated.
Mixed Mode is used to provide backward compatibility for legacy clients. In this scenario, Novell
NetWare clients will be authenticating to the SQL server, not Windows clients. Novell Netware,
Linux, UNIX, and other operating system clients can connect to SQL Server 2008 by creating a
m
with the same network library or SQL Server Network Configuration protocol, such as shared
protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows
.co
account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network
library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as
sts
SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security
configurations (12 Questions)
B: You should not configure Windows Authentication Mode on the SQL Server 2008 server.
lTe
Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the
clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware
clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server
tua
2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not
matter whether the NetWare client and the SQL Server attempt to use Windows Authentication
with the same network library or SQL Server Network Configuration protocol, such as shared
Ac
protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows
account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network
library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as
SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security
configurations (12 Questions)
C: You should not configure Windows Authentication Mode on the SQL Server 2008 server.
Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the
clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware
clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server
2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not
matter whether the NetWare client and the SQL Server attempt to use Windows Authentication
with the same network library or SQL Server Network Configuration protocol, such as shared
protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows
account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network
QUESTION NO: 48
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 infrastructure.
m
numerous servers. Furthermore the CIO wants it to done with the least amount of effort.
D. You should make use of the Windows System Resource Manager (WSRM) feature.
Answer: A
tua
QUESTION NO: 49
Ac
You are the newly appointed database administrator at CertKiller.com. You are in the process of
installing a SQL Server 2008 server in a testing environment.
You have received instruction from the CIO to create an assembly that needs access to the file
system as well as the registry. During routine monitoring you discover that the certificate server
has failed in the test environment. You decide to register the assembly in a database named
CK_RESEARCH with the subsequent code:
CREATE ASSEMBLY CKAssembly
FROM 'C:\CKApp\CKAssembly.dll'WITH PERMISSION_SET =
EXTERNAL_ACCESS
Answer: C
Explanation:
To create an assembly with either external_access or unsafe permissions, you should have the
assembly strong name signed or Authenticode signed with a certificate, or you should have the
database configured with the set trustworthy on statement. In this scenario, the certificate server
m
has failed, which may prevent the assembly from being signed by a certificate. You can use the
alter database Sales set trustworthy on statement to ensure the success of the with
PERMISSION_SET = EXTERNAL_ACCESS Statement. .co
sts
QUESTION NO: 50
CertKiller.com has hired you as a database administrator for their network. Your duties include
lTe
You are in the process of adding an assembly to CERTKILLER-DB01. You receive an instruction
tua
from the CIO to ensure that the assembly is created with safe permissions. You should also
ensure that information is accessed from the local SQL Server databases. You thus need to
determine the best way to configure the assembly.
Ac
A. This can be accomplished by excluding the finalizer methods from the classes in the assembly.
B. This can be accomplished by using the SQL Server Configuration Manager in order to register
the assembly in CERTKILLER-DB01.
C. This can be accomplished by ensuring that static data members are marked as read-write in
the classes of the assembly.
D. This can be accomplished by ensuring that the assembly code is not type-safe.
Answer: A
Explanation:
The classes in the assembly cannot contain finalizer methods. A finalizer method is a method that
runs when an object of a class is removed from memory. Classes within an assembly associated
m
QUESTION NO: 51
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are assigned a database server named
CERTKILLER-DB01.
sts
You are in the process of adding an assembly to CERTKILLER-DB01. The assembly includes the
lTe
subsequent features:The classes should not contain finalizer methods.The code should be type
safe.The static data members are marked as read-only.
tua
You have received instruction from the CIO to ensure that the assembly is able to access
environmental variables as well as the registry. You thus need to configure the appropriate
permission set should will accomplish this.
Ac
Answer: C
Explanation:
The EXTERNAL_ access permission set allows the assembly to access the registry and
environmental variables, along with external system resources such as the file system, the
external network, and Web services.
QUESTION NO: 52
You work as a database administrator at CertKiller.com. You are responsible for a administering a
m
SQL Server 2008 failover cluster.
.co
You receive an instruction from the CIO to change the startup account for SQL Server. You have
to make sure that the configuration of the SQL Server will remain intact when changes are made
to the startup account. You thus need to determine the utility that you need to use to accomplish
sts
this.
lTe
A. Your best option would be to make use of the SQL Server Configuration Manager utility.
B. Your best option would be to make use of the Add or Remove Programs utility.
tua
C. Your best option would be to make use of the Service Control Manager utility.
D. Your best option would be to make use of the SQL Server Installation Center utility.
Ac
Answer: A
Explanation:
You should use the SQL Server Configuration Manager to change the startup account. Using SQL
Server Configuration Manger is the most appropriate method of changing the startup account. The
startup account is used for running the SQL Server services. If you change the startup account,
the services must be restarted. Without restarting, the older startup account remains tied to the
SQL Server services. After you restart the services, the new account becomes active to run the
SQL Server services. You can invoke the SQL Server Configuration Manager form Start > All
Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL Server Configuration
Manager. SQL Server Configuration Manager is used for configuring services, network protocols,
and network configuration on SQL Server 2008. You can also use the Services snap-in to change
the SQL Server startup account.
QUESTION NO: 53
m
new CertKiller.com policy states that login attempts to CERTKILLER-DB01 to be denied
You want to deny login attempts to CERTKILLER-DB01 using the SQLUser account if four user
.co
sessions created by that login are currently running.
A. You should consider limiting the SQLUser account properties in order to permit a maximum of
four simultaneous logins on the CertKiller.com domain.
lTe
B. You should consider creating a logon trigger that will limit the SQLUser account to four
simultaneous logins.
C. You should consider setting the Max Degree of Parallelism to 3 for the SQLUser account on
tua
CERTKILLER-DB01.
D. You should consider limiting the SQLUser account properties in order to only permit four
simultaneous logins on CERTKILLER-DB01.
Ac
Answer: B
Explanation:
Logon triggers are used to audit and control server sessions. You can track login activity and
restrict logins to SQL Server.
Incorrect Answers:
A: You cannot configure the SQLUser account properties on the CertKiller.com domain to allow no
more than four simultaneous logins You can limit which computers a domain account can log on
to, but not how many times a user account can be authenticated in the domain.
C: You should not set the Max Degree of Parallelism to 3 on CERTKILLER-DB01 for the SQLUser
account. The Max Degree of Parallelism setting restricts the number of processors to use in
parallel plan execution. The Max Degree of Parallelism will not restrict a user account's
simultaneous logins.
QUESTION NO: 54
You detach CK_PRODUCTS for maintenance purposes. You then decide to attach
CK_PRODUCTS and grant the database the necessary permission to access resources beyond
the scope of the database. You need to find a way to accomplish this.
m
What should you do?
.co
A. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY
FULL, PAGE_VERIFY CHECKSUM command.
B. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY
sts
OFF command.
C. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY
FULL, PAGE VERIFY TORN PAGE DETECTION command.
lTe
D. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY
ON command.
tua
Answer: D
Explanation:
When a database is attached to a SQL Server, the database is not initially trusted and cannot
Ac
access resources beyond the scope of the database. If you explicitly mark the database
trustworthy, then you can access resources beyond the scope of the database.
Incorrect Answers:
A: You should not run either the alter database Sales set recovery full, page_verify checksum
statement or the ALTER DATABASE Sales SET RECOVERY FULL, PAGE_VERIFY
TORN_PAGE_DETECTION Statement to configure the Sales database. The recovery full option
provides full recovery after a media failure with transaction log backups. You cannot use this
option to have the database to access resources beyond the scope of the database. The
page_verify option is used to discover damaged database pages. You can set this option to
checksum or torn_page_detection. checksum calculates a checksum and compares the checksum
when the data is written to the disk. torn_page_detection is used to detect pages that have
incomplete writes of the page. Neither checksum nor torn_page_detection can be used by a
database to access resources beyond the scope of the database once it has been reattached to a
m
database to access resources beyond the scope of the database once it has been reattached to a
SQL Server.
.co
sts
QUESTION NO: 55
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. The CertKiller.com network users make use of login accounts created in Active
tua
Directory. During the course of the day you receive instruction from CertKiller.com to assign a use
named Rory Allen to add or remote linked servers. CertKiller.com wants you to ensure that Rory
Allen is part of a fixed server role which allows him to accomplish the task.
Ac
A. You should consider making use of the Setupadmin fixed server role.
B. You should consider making use of the DBCreator fixed server role.
C. You should consider making use of the Sysadmin fixed server role.
D. You should consider making use of the Serveradmin fixed server role.
Answer: A
Explanation:
A user with the Setupadmin role will be able to add or remove linked servers. Without having this
role assigned, a user will not be able to add or remove linked servers. A user who is part of this
role can also execute stored procedures that relate to the linked servers. Some of the stored
procedures are sp_addlinkedserver , sp_addlirikedsrvlogin , and sp_droplinkedsrvlogin . If a user
m
QUESTION NO: 56
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts
CK_SALES. CertKiller.com has several developers who have created different objects in the
CK_SALES database. You are currently unsure of the permissions which were granted to different
lTe
users and roles. CertKiller.com wants you to retrieve the information for every permission or
column-exception permission in the CK_SALES database.
tua
Answer: D
Explanation:
You can use this security catalog view to audit every permission or column-exception permission
in the Sales database. You should not use sys.server_permissions . This security catalog view can
be used to view server-level permissions. In this scenario, you need to view database level
permissions.
Incorrect Answers:
B: You should not use sp_table_privileges. This stored procedure returns a list of table
permissions for a particular table. While you can use this stored procedure to find what
permissions are given to a table, you will not be able to use this stored procedure to find what
QUESTION NO: 57
m
What should you do?
.co
A. You should consider making use of the sys.dm_exec_sessions dynamic management view.
B. You should consider making use of the sys.dm_exec_requests dynamic management view.
sts
C. You should consider making use of the sys.dm_os_waiting_tasks dynamic management view.
D. You should consider making use of the sys.dm_os_schedulers dynamic management view.
lTe
Answer: A
Explanation:
tua
You should use the sys.dm_exec_sessions view to track the client login time, login name, and the
status of the session for a specific user. This view allows you to track user connections with such
detailed information as the host name, host process ID, the protocol used by the client to connect
to the SQL, Windows security ID, login user name, and the status of the session. The
Ac
QUESTION NO: 58
CertKiller.com is aware that the assembly needs access to data from the local CERTKILLER-
m
DB01 databases and no other external resources.CertKiller.com wants you to configure the
permission set on the assembly.
.co
What should you do?
sts
A. You should consider having the UNSAFE permission set.
B. You should consider having the DEFAULT permission set.
C. You should consider having the SAFE permission set.
lTe
Answer: C
tua
Explanation:
This is the default permission set for an assembly. The assembly cannot access external
resources, such as the registry and environment variables, if the safe permission set is configured
Ac
on the assembly. The safe permission set does allow the assembly to access data from the local
SQL Server database.
Incorrect Answers:
A: You should not set the permission set on the assembly to unsafe. An assembly that has unsafe
as the permission set is considered to be type-unsafe. Assemblies considered to be type-unsafe
can potentially access memory buffers in the SQL Server that are not owned by the code of the
assembly. In the scenario, the assembly code should be type-safe.
B: You should not set the permission set on the assembly to default. There is no permission set for
an assembly called default
D: You should not set the permission set on the assembly to external_access. The
external_access permission set allows the assembly to access the registry and environmental
variables, along with external system resources such as the file system, the external network, and
Web services. In this scenario, the assembly should not access any external resources.
QUESTION NO: 59
m
B. You should consider making use of the following T-SQL statement:
SELECT pri.name, per.permission_name
FROM sys.database_permissions per
INNER JOIN sys.database_principals pri
.co
ON per.grantee principal id = pri.principal id.
sts
C. You should consider making use of the following T-SQL statement:
SELECT pri.name, per.permission_name
FROM sys.sysprotects per
lTe
Answer: B
Ac
Explanation:
The sys.database_permissions security catalog view can be queried to audit every permission or
column-exception permission in a database. The above query documents the privileges
associated with a database role in a database.
Incorrect Answers:
A: The sp_helprotectstored procedure will return information on user permissions for an object in a
database. However, this stored procedure will not return information about objects that were
introduced in SQL Server 2005. Microsoft recommends that you use sys.databasepermissions and
fn_builtin_permissions instead of sp_helprotect
D: The sp_table_privileges stored procedure returns a list of table permissions for a particular
table. While you can use this stored procedure to find what permissions are given to a table, you
will not be able to use this stored procedure to find what permissions are given to other objects,
such as stored procedures and user-defined functions. Part 3: Design database, schema, and
QUESTION NO: 60
You are employed as a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 instance named CERTKILLER-DB03.
You are in the process of planning the deployment of a third party database application to
CERTKILLER-DB03. The application will make use of stored procedures that is developed using
SQL CLR integration. You have to make sure that the application is configured to allow the
EXTERNAL_ACCESS code access security setting. To ensure productivity you need to make sure
that the application id deployed without the loss of functionality.
m
A. Your first step should be to make use of the peverify.exe PEVerify utility in order to confirm
whether the code meets the type-safety requirements. .co
B. Your first step should be to replace the read write non-static fields in the code with static fields.
C. Your first step should be to make use of the regasm.exe assembly registration utility in order to
sts
register the assembly on CERTKILLER-DB03 prior to deployment.
D. Your first step should be to replace the read-only static fields in the code with read write static
fields.
lTe
Answer: A
tua
QUESTION NO: 61
Ac
CertKiller.com has hired you as a database administrator for their network. Your duties include
administrating a SQL Server 2008 instance named CERTKILLER-DB01.
You are currently designing the security requirements for a new database application named
TestAPP1. TestAPP1 makes use of a code segment. The components below are contained in the
code segment:The method that is used to access the file system on a network file serverA manner
in which to access the registry on the SQL serverThe class definition that will make use of the
public static fields
SQL CLR integration is used by the code segment. It is implemented as a single assembly. You
receive an instruction from the CIO to make sure that the application is installed to CERTKILLER-
DB01.
Answer: D
QUESTION NO: 62
You work as a database administrator at CertKiller.com. You are responsible for managing two
Microsoft SQL Server 2008 named CERTKILLER-DB01 and CERTKILLER-DB02.
m
CertKiller.com users all use login accounts that were created in the Active Directory. A
CertKiller.com employee named Kara Lang works in the Research and Development department.
.co
You have received instruction from the CIO to track the server login of Kara Lang as part of the
securityadmin role on CERTKILLER-DB01. You need to determine the appropriate way to
accomplish this.
sts
Answer: A
Ac
Explanation:
You should use Is_srvrolemember to determine whether the securityadmin role contains Kara
Lang's server login. To do this, you would use the following syntax:
IS_SRVROLEMEMBER ('role'[,'login'])
In this syntax, you need to first list the role that you want to check for the user name. Then, you
should add the login account to be checked. As a result, one of the three values will be returned: 0
,1 , or NULL. The value 0 signifies that user is not part of the role. The value 1 signifies that the
user is part of the role. The value NULL signifies that the either the role or the login is not valid.
In this scenario, one of the three values will be returned as a result.
Incorrect Answers:
B: The option sys.server_roIe_members should not be used in this scenario. This view displays a
row for each of the member that is part of a specific role. However, this view does not return the
SQL Server login that is part of a specific role, as desired in the scenario.
C: The option sp_helpsrvrolemember should not be used in this scenario. This stored procedure
"Pass Any Exam. Any Time." - www.actualtests.com 59
Microsoft 70-450: Practice Exam
returns the members of a SQL Server fixed server role that you specify in the syntax. However,
this stored procedure does not return the SQL Server login that is part of a specific role, as desired
in the scenario.
D: The option sp_helpsrvrole should not be used in this scenario. This stored procedure returns
the server fixed roles on a server but does not return the SQL Server login that is part of a specific
role, as desired in the scenario. Part 4: Design a security policy and an audit plan (10 Questions)
QUESTION NO: 63
You are the newly appointed database administrator at CertKiller.com. Your job function
encompasses administering a SQL Server 2008 instance.
You are in the process of implementing the security requirements for a database. The database
will be installed on an SQL Server 2008 instance. The code segment below displays the table that
m
was created in the database:
The table contains a column named Bonus. You have received instructions from the CIO to make
sure that Bonus has the most secure method of protection from unauthorized access
A. This can be accomplished by ensuring that the Job Activity Monitor tool is utilized on all
columns in the database.
B. This can be accomplished by ensuring that the NTFS file system security is utilized and access
of the database files is limited to the SQL Server 2008 Service account.
C. This can be accomplished by ensuring that the appropriate trace flags are utilized for the
database.
D. This can be accomplished by ensuring that the SQL Profiler trace is utilized.
Answer: B
QUESTION NO: 64
CK_SALES is used by a Web based application that processes approximately 14,000 transactions
per minute. There is a column named CKDATA in a table in CK_SALES that is only used by the
application. CKDATA stores classified information. You receive an instruction from the CIO to
make sure that the classified information is stored is a secure manner and that the usage of
memory space as well as processor time is minimized.
m
D. You should consider making use of Key Management Service (KMS).
Answer: C .co
sts
QUESTION NO: 65
You work as a database administrator at CertKiller.com. You are responsible for administering a
lTe
CERTKILLER-DB02 hosts a database application named CK_App. You are in the process of
tua
implementing a data security strategy for CK_App. In order to replicate the information to another
SQL server 2008 instance you need to make use of Snapshot replication. Management wants you
to make sure that the stored information is encrypted with the minimum of administrative effort.
Ac
A. You should consider enabling transparent data encryption for the Publisher, Distribution as well
as the Subscriber databases.
B. You should consider enabling RAID 5 for the Publisher, Distribution as well as the Subscriber
databases.
C. You should consider enabling a VPN solution on the two instances.
D. You should consider enabling an ADM file between the instances.
Answer: A
QUESTION NO: 66
You receive an instruction from management to develop a database backup strategy for
CK_DATA. It is vital that you make sure that all backups of CK_DATA are encrypted and that
unauthorized access is prevented.
A. You should consider using NTFS quotas and Event Viewer tasks.
B. You should consider using NTFS quotas and Performance Monitor alerts.
C. You should consider using the Transparent database encryption.
D. You should consider using the Background Intelligent Transfer Service (BITS).
m
Answer: C
QUESTION NO: 67
.co
sts
You work as a database administrator at CertKiller.com. You are responsible for administering a
database solution.
lTe
The database solution of CertKiller.com is log-shipped for high availability purposes. The E-drive
of the database hosts the data files and the F-drive the transaction log files. You receive an
instruction from management to implement a recovery test plan for the log-shipping solution with
tua
You need to determine the first step that should be performed in the test plan in the event that the
E-drive fails.
A. Your first step should be to run the folder redirection against the database.
B. Your first step should be to set up offline files.
C. Your first step should be to set up the Job Activity Monitor tool on the database.
D. Your first step should be to execute the tail-log backup of the primary database.
Answer: D
CertKiller.com has employed you as a database administrator. You are responsible for
administering a SQL Server 2008 instance.
You are in the process of installing a new SQL Server 2008 Integration Services (SSIS) packages.
This package was created using the SQL Server Import and Export Wizard. The users at
CertKiller.com will use their user names as well as passwords to the external data sources. You
receive an instruction from the CIO to prevent unauthorized users access by ensuring that the
user names and passwords are protected.
A. The best option is to use the Windows System Monitoring tool in the SQL Server 2008 server.
B. The best option is to store the packages and manage the security in the SQL Server 2008
m
server.
C. The best option is to use the Network Service account when the packages are saved.
.co
D. The best option is to implement Internet Protocol security (IPsec).
Answer: B
sts
You work as a database administrator at CertKiller.com. All servers on the CertKiller.com network
run Windows Server2008 and all client computers run Windows Vista.
tua
A new CertKiller.com policy states that the Social Security numbers (SSNs) of all CertKiller.com
users needs to be tracked. You receive an instruction from the CIO to encrypt the SSN column in
the CKStaff table to stop unauthorized users from accessing the information.
Ac
What should you configure? (Click and drag the options on the left to the column on the right, and
place them in the correct order.)
Answer:
m
.co
sts
lTe
tua
Ac
QUESTION NO: 70
A large number of data replication is occurring on the main SQL Server at the London office. To
ensure productivity continues management wants you to make sure that information is encrypted
during replication without affecting the performance of the server.
Answer: B
Explanation:
In this scenario, you should use symmetric encryption for encrypting the data during replication.
Symmetric encryption is typically used for large volumes of data. There is only one key used for
encrypting and decrypting the data. Compared to asymmetric encryption, symmetric encryption is
less resource-intensive and does not affect server performance. You typically use symmetric
encryption during replication when you have large volumes of data.
Incorrect Answers:
A: You should not use asymmetric encryption for replication. This type of encryption is resource-
intensive. It uses two different keys for encrypting and decrypting information, a private key and a
public key. However, compared to the symmetric encryption, this encryption provides a higher
m
level of security.
C: You should not use TDE encryption. TDE encryption encrypts data and log files using a
.co
database encryption key (DEK) stored in the master database. This type of encryption provides
real-time encryption and decryption of data and log files. You should not use TDE encryption for
data during replication. The TDE encryption is used for static data, such as data and the log files
sts
of the database. TDE encryption will not work during replication of data.
D: You should not use symmetric encryption and then compress the data encryption because
encrypted data cannot be compressed. Therefore, this solution will not be applicable in this
lTe
situation.
tua
QUESTION NO: 71
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_SALES.
You have received instruction from the CIO to encrypt a number of columns in various tables in
CK_SALES without modifying the applications that is used to access the tables. You decide to
make use of Transparent Data Encryption (TDE) on the CK_SALES and execute the subsequent
steps:You create a master key.You create a certificate named SalesCert that is protected by the
master key.You create a database encryption key and protect it with the SalesCert certificate
Answer: D
Explanation:
In order to use Transparent Data Encryption (TDE) on CK_SALES you must ensure each of the
following actions is performed:
Create a master key in the master database.
Create a certificate called SalesCert , which is protected by the master key.
Create a database encryption key (DEK) and protect it with the SalesCert certificate.
m
Set the database to use encryption with the alter database statement.
Incorrect Answers:
.co
A: You cannot use the sp_dboption stored procedure to set the database to use encryption. You
can use the sp_dboption to set many other database options, such as automatically creating
statistics, updating statistics, setting the database as read only, or setting the database to use torn
sts
page detection.
B: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers
database. The ATTRIB command is used to set attributes on a file. You cannot use the ATTRIB
lTe
command to set an encryption attribute. The CIPHER command can be used to encrypt a file that
is stored on an NTFS volume using EFS encryption. However, if you use the CIPHER command to
encrypt the Customers.mdf file, this file can only be viewed by the person who encrypted it. The
tua
file will not be readable to SQL Server, thus making the Customers database unusable.
C: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers
database. The ATTRIB command is used to set attributes on a file. You cannot use the ATTRIB
Ac
command to set an encryption attribute. The CIPHER command can be used to encrypt a file that
is stored on an NTFS volume using EFS encryption. However, if you use the CIPHER command to
encrypt the Customers.mdf file, this file can only be viewed by the person who encrypted it. The
file will not be readable to SQL Server, thus making the Customers database unusable.
QUESTION NO: 72
CertKiller.com wants it so that only the backup operators know the media password to restore the
media but your concerns is with rogue users using password crackers finding the password and
restoring the data to another server. CertKiller.com wants you to secure the information.
A. You should consider making use of Transparent Data Encryption (TDE) to encrypt the
CK_STAFF database.
m
B. You should consider having the TCP/IP network library loaded on CERTKILLER-DB01 and
enable the Force Encryption option.
.co
C. You should consider making use of Encrypted File Service (EFS) to encrypt the CK_Staff.bak
file.
D. You should consider making use of cipher.exe to encrypt the CK_Staff.bak file.
sts
Answer: A
lTe
Explanation:
With TDE, you do not have to modify existing applications to take advantage of the encryption.
The encryption is transparent to the application, so a backup application can access the data and
tua
store it on the backup media. You are not limited in copying or moving the backup file of the
database. However, you will not be able to open the database without the database encryption
key. With TDE, a rogue user may be able to steal the backup file, but will not be able to access the
Ac
QUESTION NO: 73
m
the data in the CK_SALES database whilst ensuring the requirements below are met:
CertKiller.com wants to have all the data in the CK_SALES database encrypted.CertKiller.com
.co
wants to have the application which accesses the data not to be reconfigured.CertKiller.com wants
to ensure that there is no performance concern.
sts
Answer: C
Explanation:
Ac
With TDE. You do not have to modify existing applications to take advantage of the encryption.
The encryption is transparent to the application. In this scenario, applications that access the data
must not be reconfigured. TDE does not hurt performance as much as cell-level encryption, and it
does not affect the use of indexes and other optimization tools used by the query engine. You
should not use cell-level encryption. Cell-level encryption should be used if you need to encrypt
only a small amount of data in the database. If you need to encrypt the entire database, you
should use TDE. The granular level of encryption that cell-level encryption provides ensures that
data is not decrypted until it is used. Cell-level encryption can be configured so that users can
have individual keys for their own data. Cell-level is highly configurable, so that applications that
access data can be modified to take advantage of it.
Incorrect Answers:
A: Cell-level encryption will also slow down performance. Columns that will be encrypted must be
altered to use the varbinary data type. With encryption, the original value of the data will have a
QUESTION NO: 74
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to create a
sts
policy prohibiting enabling Database Mail and SQL Mail on CERTKILLER-DB01. CertKiller.com
additionally wants the policy which requires all new views to enable Database Mail on a newly
lTe
added server whilst being able to create views in the CK_ORDERS database which are not
encrypted.
tua
C. You should consider having the Expression for the condition set to @Name=CK_ORDERS.
D. You should consider having Encrypt View policy enabled.
Answer: D
QUESTION NO: 75
You are employed as the database administrator at CertKiller.com. Your job function
encompasses administering a SQL Server 2008 instance that hosts a database named
CK_SALES.
CK_SALES is used by a Web based application that processes approximately 18,000 transactions
per minute. There is a column in a table in CK_SALES that is only used by the application. The
Answer: D
QUESTION NO: 76
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to apply
sts
real-time encryption to the CK_ORDERS database and log files whilst being able to encrypt the
backup copy of the database.
lTe
A. You should consider making use of the Encrypting File System (EFS).
tua
Answer: B
Explanation:
TDE encryption encrypts data and log files using a database encryption key (DEK) stored in the
master database. This type of encryption provides real-time encryption and decryption of data and
log files.
Incorrect Answers:
A: You should not use EFS encryption. This type of encryption is used to encrypt files on an NTFS
partition. If a file is encrypted, only the user who encrypted the file or the recovery agent can
decrypt the file. If you encrypt the backup file, then the SQL Server 2008 server will not be able to
access the database file, since the account that the SQL Server runs under did not encrypt the
backup file.
C: You should not use asymmetric encryption. This type of encryption is resource-intensive. It
uses two different keys: a private key and a public key for encrypting and decrypting information.
QUESTION NO: 77
m
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to add a
.co
column to the CK_PRODUCTS table in the CK_SALES database which will keep a PDF diagram
of the products. CertKiller.com is aware that some PDF files are larger than 2 GB. CertKiller.com
wants you to ensure that the requirements set below are met:
sts
CertKiller.com wants to have the PDF files stored in the files system outside the SQL
server.CertKiller.com wants to have the disk drive containing the PDF files protected from
lTe
Answer: B,D
Explanation:
FILESTREAM storage uses the varbinary ( max) data type on a column for Binary Large Objects
(BLOB)s stored in the file system for example, the large PDF files that are stored outside SQL
Server. When BLOBs are stored in the file system, the standard varbinary ( max) data type
limitation of 2 GB does not apply. You can support PDF files even if they are over 2 GB in size.
m
data type can support storage of up to 1 GB. To support FILESTREAM storage, you must use a
varbinary (max) data type on the column for the PDF files.You cannot use an ntext data type or an
.co
image data type for FILESTREAM storage.FILESTREAM data in a table is secured with
permissions that are granted at the table or column levels inside the SQL server database.
sts
Although the data is stored outside SQL server on a NTFS volume, the account under which the
SQL Server service account runs is the only account that is granted NTFS permissions to the
FILESTREAM data. SQL Server restricts access to the volumes and files that make up the
lTe
FILESTREAM data containers. T-SQL transactions and OpenSqIFilestream APIs are allowed to
access the FILESTREAM data.
tua
QUESTION NO: 78
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure the
data in the CK_SALES database whilst ensuring the conditions below are met:
When securing the data only a small percent of data in the CK_SALES database requires
encryption.When securing the data no data will be stored outside the SQL Server
database.CertKiller.com has the application custom designed to access the data.When securing
the data performance is of no concern but security of the data is.
Answer: A
Explanation:
Cell-level encryption should be used if you need to encrypt only a small amount of data in the
database. The granular level of encryption that cell-level encryption provides ensures that data is
not decrypted until it is used. Cell-level encryption can be configured so that users can have
individual keys for their own data. Cell-level encryption is highly configurable, so that applications
that access data can be modified to best take advantage of it.
Cell-level encryption will slow down performance. Columns that will be encrypted must be altered
to use the varbinary data type. With encryption, the original value of the data will have a different
value after encryption. Any referential constraints such as primary keys, foreign keys, and unique
keys will be affected by the encrypted values. Any indexes on the encrypted columns will no
m
longer use index scans, but table scans, thus affecting performance.
Incorrect Answers:
.co
B: You should not use EFS encryption. This type of encryption is used to encrypt individual files
and directories on an NTFS volume. EFS encryption can be used in conjunction with BitLocker
encryption to secure volumes, directories, and files on a Window Server 2008 server.
sts
C: You should not use Transparent Data Encryption (TDE). If you need to encrypt the entire
database, you should use Transparent Data Encryption (TDE). In this scenario, you were required
to encrypt a small percentage of the data, and not the entire database. TDE offers advantages
lTe
over cell-level encryption. You do not have to modify an application to take advantage of TDE. The
encryption is transparent to the application. In this scenario, the application was customized to
access the data so cell-level encryption could be used. TDE does not hurt performance as much
tua
as cell-level encryption. TDE does not affect the use of indexes and other optimization tools used
by the query engine. In this scenario, performance is not a concern, so cell-encryption could be
used.
Ac
D: You should not use BitLocker encryption. This type of encryption is used to encrypt an entire
NTFS volume. BitLocker encryption can be used to protect a volume from being viewed after it is
stolen from a server. This type of encryption cannot be used to encrypt data in a database unless
the data is stored outside the SQL server such as FILESTREAM storage.
QUESTION NO: 79
USE master;
GO
CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'T35T1K1N8';
GO
CREATE CERTIFICATE CERTKILLER-DB01Cert WITH SUBJECT = 'CERTKILLER-DB01
Certificate'
GO
USE CK_SALES
GO
CREATE DATABASE ENCRYPTION
KEY UITH ALGORITHM = AES_128 ENCRYPTION BY SERVER CERTIFICATE CERTKILLER-
DB01Cert
GO
ALTER DATABASE CK_SALES
m
SET ENCRYPTION ON
GO
.co
CertKiller.com has additionally configured the CK_SALES database to use the full recovery model.
sts
CertKiller.com wants you to ensure that you are able to restore the CK_SALES database after a
media failure by selecting what would be required to restore the database.
lTe
A. To restore the database you would require backups of the msdb database and the CK_SALES
database.
tua
B. To restore the database you would require backups of the EFS recovery certificate for
CERTKILLER-DB01.
C. To restore the database you would require backups of the tempdb database and the
Ac
CK_SALES database.
D. To restore the database you would require backups of the master database and the
CK_SALES database.
E. To restore the database you would require a backup of the CERTKILLER-DB01Cert certificate.
Answer: D,E
Explanation:
For a database that has TDE enabled, the database is encrypted by using the database
encryption key. You should have a backup of the database, a backup of the certificate, and a
backup of the private key associated with the certificate. In this scenario, you must have a backup
of the CK_SALES database, a backup of the master database, and a backup of the
CERTKILLER_DB011Cert certificate. The CK_SALES database has Transparent Data Encryption
(TDE) enabled. You must have a backup of the certificate that protects the database encryption
m
used to store temporary objects. The msdb database is used to store jobs and alerts. Neither of
these two databases is used to store certificates or private keys for any databases. The master
.co
database contains the certificate that is created with the DMK. You should back up the master
database instead of the tempdb or msdb databases.
sts
QUESTION NO: 80
lTe
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to encrypt
the inventory information of the Products table in the CK_SALES database by performing the
action below:
Ac
You decided to create a master key for the database.You additionally created a certificate for
encryption using the statement below:
You have finally altered the Employees table to add a column named Inventory_Encrypted to store
the encrypted data by writing the script below to encrypt the value in the column Inventory and
save the results in the table in the Inventory_Encrypted:
UPDATE CK_SALES.Products
SET Inventory_Encrypted = EncryptByKey(Key_GUID('SalesInventory_Key1'),
GO
CertKiller.com wants you to determine what should be done before running the update statement
on the table.
A. You should consider having the CERTKILLER-DB02 certificate used to open the table.
B. You should consider having the symmetric key opened that will be used to decrypt the data.
m
C. You should consider having the master key opened on the database.
D. You should consider having the CERTKILLER-DB02 certificate used to create a session key
with the table. .co
Answer: B
sts
Explanation:
You must open the symmetric key with which to decrypt the data before running the update
lTe
The symmetric must be opened with the CERTKILLER-DB02 certificate before you encrypt the
value in the column Salary and save the results in the column Inventory_Encrypted .
Incorrect Answers:
Ac
A: You do not need to use the CERTKILLER-DB02 certificate to open the table. The
CERTKILLER-DB02 certificate is used to create the symmetric key. The CERTKILLER-DB02
certificate is not used for identity purposes with the table. The certificate is not related to the table.
C: You do not need to open the master key on the database. In this scenario, you are encrypting a
column. You must use the symmetric key to encrypt a column, not the master key on the
database.
D: You do not need to use CERTKILLER-DB02 certificate to create a session key with the table.
The symmetric key is used to encrypt a column in the table. A session key can be used when
creating a secure session between connections such as Web browser and a Web site. You are
trying to encrypt a column in a table, not establish a secure connection between a client and a
database server.
m
CertKiller.com wants you to ensure that the data in the Design column in the Discontinued table is
secure whilst ensuring that the disk containing the CK_SALES database is protected from theft.
Answer: D
tua
Explanation:
BitLocker encryption provides full volume encryption for Windows Vista and Windows Server
2008. BitLocker provides protection against theft of a hard drive. BitLocker encrypts all user and
Ac
system files in the operating system volume. Once you have encrypted the volume that contains
the operating system with BitLocker , you can use BitLocker to encrypt the other volumes.
BitLocker can use the security capabilities of computers that have a Trusted Platform Module
(TPM) version 1.2 to ensure that data is accessible only if the encrypted disk is located in the
original computer and the computer's boot components have not been altered.
Incorrect Answers:
A: You should not use the EFS encryption. EFS encryption can encrypt files on an NTFS volume.
You can use Windows Explorer or the CIPHER command to encrypt a file that is stored on an
NTFS volume. If you use the CIPHER command or Windows Explorer to encrypt the files that
make up the Intelligence database file, this files will be only viewed by the person that encrypted
them. These files will not be readable by SQL Server, thus making the Intelligence database
unusable. Encrypting files via EFS encryption does not necessarily protect them against theft if a
user is able to export the certificate of Encrypted Recovery Agent to decrypt the files. You should
use BitLocker encryption to protect the volume against theft.
"Pass Any Exam. Any Time." - www.actualtests.com 77
Microsoft 70-450: Practice Exam
B: You should not use IPSec encryption. This type of encryption is used to encrypt
communications between sessions. IPSec encryption will not encrypt information on a NTFS drive
or within a SQL server database.
C: You should not use Transparent Data Encryption (TDE). TDE is used to encrypt a database,
but TDE cannot encrypt FILESTREAM data. The Chart column of the Records table uses a
FILESTREAM data type. FILESTREAM data is stored outside the database and cannot be
encrypted with TDE. FILESTREAM data in a table is secured with permissions that are granted at
the table or column levels inside the SQL server database. Although the data is stored outside
SQL server on a NTFS volume, the SQL Server service account is the only account that is granted
NTFS permissions to the FILESTREAM data. SQL Server restricts access to the volumes and files
that make up the FILESTREAM data containers. T-SQL transactions and OpenSqIFilestream APIs
are allowed to access the FILESTREAM data.
QUESTION NO: 82
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure the
sts
information which is submitted by the customers. CertKiller.com wants to have the credit card
numbers used by customers to be encrypted whilst other customer information remains
lTe
CertKiller.com has additionally planned to have the CK_SALES database altered to have an
encrypted column created to store the encrypted column. CertKiller.com wants to know which data
type should be used for the encrypted column.
Answer: D
m
QUESTION NO: 83
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts
CK_SALES. During the course of the day you receive instruction from CertKiller.com to have the
Credit Card Numbers encrypted for the CertKiller.com customers in the Orders table. You then
lTe
You created a master key in the database with a certificate for encryption.
tua
You created a symmetric key for the certificate and altered the Orders table to add a column called
CreditCardNo to store the encrypted Credit Card Number.
You additionally encrypted the value in the CreditCardNo column with a symmetric key.
Ac
CertKiller.com wants you to determine if the new CreditCardNo column contains the correct data
before removing the Credit Card column by making use of a query to compare the data in the
Credit Card column with the CreditCardNo column.
Answer: A
Explanation:
The encrypted column must have a varbinaiy data type. To display the information in varbinaiy
column, you must convert the column to another readable data type, such as a varchar data type.
You must also include the DecryptByKey function. This function decrypts the data in the
m
CreditCardNo column by using the symmetric key.
Incorrect Answers:
.co
B: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted
Credit Card', CONVERT(nvarchar, DecryptByText (CreditCardNo)) AS 'Decrypted Credit Card'
FROM CK_SALES.OrdersThis query uses an incorrect function called DecryptByText. This
sts
function is not a standard T-SQL function.
C: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted
Credit Card', CreditCardNo AS 'Decrypted Credit Card' FROM CK_SALES.Orders.This query
lTe
does not use the DecryptByKey function to decrypt the data in the CreditCardNo column by using
the symmetric key.
D: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted
tua
QUESTION NO: 84
During the course of the day you receive instruction from CertKiller.com to implement the security
requirements for a new database application which will be deployed to CERTKILLER-DB01. You
make use of the code segment below to create a table in the new database:
CertKiller.com wants you to ensure that the Discount column is protected from unauthorized
access using the most secure method.
m
D. The best option is to use IPsec domain isolation.
E. The best option is to use NTFS file system security.
Answer: B,E
.co
sts
QUESTION NO: 85
lTe
CertKiller.com has hired you as a database administrator for their network. Your duties
encompass administering a SQL Server 2008 infrastructure.
tua
of a high-availability solution.
Answer: C
QUESTION NO: 86
All the instances host a single database application. You are currently implementing the migration
of the instances to a new SQL Server failover cluster. The four instances are configured as
follows:CERTKILLER-DB01 is configured with 8 processors that have 16 GB of
RAM.CERTKILLER-DB02 is configured with 4 processors that have 8 GB of RAM.CERTKILLER-
DB03 is configured with 2 processors that have 16 GB of RAM.CERTKILLER-DB04 is configured
with 4 processors that have 8 GB of RAM.
At present the instances are all optimized and contain no additional CPU cycles or memory.
However, a single virtual cluster IP address will be used for the new SQL Server failover cluster
will host the four databases. The CertKiller.com CIO wants the cluster to handle the workload of
the database applications without using too may hardware.
m
What should you do?
.co
A. This can be achieved by having a two-node active/active cluster configured where every node
will contain a 10 processors and 15 GB of memory.
B. This can be achieved by having a two-node active/passive cluster configured where every node
sts
will contain 18 processors and 50 GB of memory.
C. This can be achieved by having a four-node active/active/active/passive cluster configured
where every node will contain 9 processors and a 50 GB of memory.
lTe
Answer: B
Ac
QUESTION NO: 87
You work as a database administrator at CertKiller.com. You are responsible for administering
multiple servers that run SQL Server 2008 Enterprise Edition.
You are assigned a SQL Server 2008 Enterprise Edition server named CERTKILLER-DB01 that
hosts multiple databases. You receive an instruction from the CIO to:Ensure the highest
availability.Keep the downtime of these databases together with the system databases to a
minimum.The databases are available on one server for client access.
Answer: D
Explanation:
Failover clustering requires one or more servers that contain two or more shared disks. When you
create a SQL Server failover cluster, the entire cluster instance appears as a single computer on
the network. However, there are multiple functional servers on the back end. When a failure
happens, the failover cluster allows a new node, which was not the current node, to become the
current node. When this new current node fails, another node in the cluster is given the
responsibility of owning the resource group. In this solution, both the user databases and system
databases are provided the highest availability when a failure occurs.
m
Incorrect Answers:
A: The log shipping option is incorrect. Log shipping enables transactional log backup from the
.co
primary server to the secondary server. The logs of the primary database on the primary server
are backed up for the secondary database hosted on a secondary server. The transaction logs are
used for synchronizing both primary and secondary databases. Limited reporting functionality is
sts
available when the secondary databases are restored. This solution will not work in the scenario
because in case of a failure, the system databases will not be available. Log shipping, unlike
clustering, does not provide failover detection or automatic failover.
lTe
B: You should not implement database mirroring as a solution to meet the requirement stated in
the scenario. In database mirroring, databases are mirrored from one server to another server to
provide the highest availability and uptime. The database that is the primary copy is known as the
tua
principal database. The secondary copy or the standby copy is known as the mirror database. The
mirror database is created with no recovery. This solution will not work in the scenario because in
case of a failure, the system databases will not be available.
Ac
C: You should not use replication. In SQL Server replication, a publish-subscribe model is used
that allows the primary server to replicate information to the secondary servers. You can use
different types of replication, such as snapshot, merge, or transactional. Replication can be used
to replicate tables and objects from a database, but should not be used for data availability of that
database. Replication is generally used to replicate some of the objects of a database, and not the
entire database. You cannot use replication to system databases.
QUESTION NO: 88
A. You should consider configuring automatic failover with synchronous database mirroring.
B. You should consider configuring automatic failover with asynchronous database mirroring.
C. You should consider configuring manual failover with synchronous database mirroring.
D. You should consider configuring manual failover with asynchronous database mirroring.
Answer: C
Explanation:
Manual failover can be used to upgrade hardware or software without sacrificing availability.
Manual failover is only supported by synchronous or high-safety mode.
m
Incorrect Answers:
A: You should not configure automatic failover with synchronous database mirroring because
.co
automatic failover cannot be used for upgrading hardware or software. Automatic failover is a
feature of database mirroring that is primarily used to prevent data loss during failover.
sts
B: You should not configure automatic failover with asynchronous database mirroring because
automatic failover is supported only in database mirroring sessions running with a witness in
synchronous or high-safety mode. Also, automatic failover cannot be used for upgrading hardware
lTe
QUESTION NO: 89
Ac
A. The failover clustering solution should have the account capable of running the Microsoft
Cluster Service (MSCS) assigned public rights on the SQL Server.
B. The failover clustering solution would require the Microsoft Cluster Service (MSCS) and the
SQL Server to use the same service account.
Answer: A
Explanation:
MSCS needs to verify the failover cluster instance availability. MSCS uses the IsAlive check to
verify the failover cluster instance availability by polling the SQL Server every 60 seconds. The
account that runs the MSCS service is also used to run the IsAlive check. Therefore, MSCS must
have public rights on the SQL Server to run the IsAlive check for its availability.
Incorrect Answers:
B: You must not use the same service account for the MSCS and the SQL Server. As a
recommended practice, you should use different service accounts for both the MSCS and the SQL
m
Server. If the same accounts are used, you will not be able to change the password for the MSCS
service at a later date.
.co
C: The MSCS does not verify failover cluster instance availability using the LooksAlive check.
Instead, the IsAlive check is performed to check the availability of the failover cluster instance.
LooksAlive is a simple check performed every five seconds using the Windows NT Service Control
sts
Manager. IsAlive is performed every 60 seconds by connecting to the SQL Server.
D: The option stating that the Microsoft Cluster Server or the MSCS service must be configured on
all nodes in the cluster is incorrect. You need to have the MSCS service running on at least one of
lTe
the nodes in your cluster, not all nodes of the cluster. A clustering solution can be implemented
with SQL Server Standard version, with only two nodes, and SQL Server Enterprise version can
be implemented with eight nodes. The MSCS service must be running on at least one node in the
tua
QUESTION NO: 90
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance. A database configured using a high-safety mirroring operation mode
along with a witness server is hosted by the instance at CertKiller.com.
During routine monitoring you discover that the witness server is experiencing memory failure. The
witness server will thus be offline for a few hours. The CertKiller.com management wants you to
make sure that database unavailability is kept to a minimum. You thus decide to reconfigure the
mirroring strategy.
Answer: A
QUESTION NO: 91
You are employed as the database administrator at CertKiller.com. You are responsible for
administering a database server named CERTKILLER-DB01 with an instance that hosts a
database named CK_MARKETING.
m
CK_MARKETING contains the backup strategy below:Weekly a full database backup is
executed.Daily a differential backup is executed.Hourly a transaction log backup is executed.
.co
You are in the process of implementing an end-of-year batch process. This process will take three
hours to complete and will modify 10 % percent of information within CK_MARKETING. You
sts
receive an instruction from the CIO to make sure that the batch operation is able to be rolled back.
You need to accomplish this in the least amount of time.
lTe
B. Your best option would be to use the Windows System Resource Manager (WSRM).
C. Your best option would be to use a database snapshot.
D. Your best option would be to use Microsoft Multipath.
Ac
Answer: C
QUESTION NO: 92
You work as a database administrator at CertKiller.com. You are responsible for administering two
SQL Server 2008 servers.
You have received instruction from the CIO to configure synchronous database mirroring in high-
safety mode. You discover that the primary server failed. You decide to force the mirror server to
become the primary server. You need to determine role the primary server have with the mirror
database when it comes back online.
Answer: D
Explanation:
When you have a synchronous database mirroring in high-safety mode and the principal server
goes down, the secondary server becomes the principal server hosting the working copy of the
mirrored database. If a principal server goes down or disconnects from the mirror, the secondary
server continues to act as a secondary server until a secondary server forces the secondary
server to become the principal server. When the secondary server becomes the principal server, it
may not have the latest logs for the database. Therefore, there may be some data loss depending
upon what was written from the principal server's log to the secondary server log. After the
m
secondary server becomes the principal server and the original principal server comes back
online, it cannot demote the new principal server back to being a secondary server. The original
.co
principal server in this case will become the secondary server and roll back its logs to synchronize
with the new principal server's logs.
Incorrect Answers:
sts
A: All the other options are incorrect because the secondary server will be the principal server in
the mirror in this scenario. When the original principal server comes online, the mirror will not be
broken. The original principal server will be recognized as part of the mirror, but will be the
lTe
secondary server.
B: All the other options are incorrect because the secondary server will be the principal server in
the mirror in this scenario. When the original principal server comes online, the mirror will not be
tua
broken. The original principal server will be recognized as part of the mirror, but will be the
secondary server.
C: All the other options are incorrect because the secondary server will be the principal server in
Ac
the mirror in this scenario. When the original principal server comes online, the mirror will not be
broken. The original principal server will be recognized as part of the mirror, but will be the
secondary server.
QUESTION NO: 93
A. This can be accomplished by ensuring that database mirroring is enabled with CERTKILLER-
DB03.
B. This can be accomplished by ensuring that replication is enabled with the CERTKILLER-DB03.
C. This can be accomplished by ensuring that clustering is enabled with the CERTKILLER-DB03.
D. This can be accomplished by ensuring that log shipping is enabled with the CERTKILLER-
DB03.
Answer: A
Explanation:
Database mirroring allows failover detection of user databases. With database mirroring, you can
configure a mirror set to automatically fail over to a secondary server when the primary server fails
m
if a witness server is configured. You can configure the Sales database to be mirrored on the
CERTKILLER-DB03 server and configure CERTKILLER-DB02 to be a witness server. You can
.co
program client applications to automatically connect to the new primary servers when database
mirroring is enabled. In this scenario, you can have the client applications connect to the mirrored
sts
copy of the Sales database on another SQL server in the branch office.
Incorrect Answers:
B: You should not enable clustering with CERTKILLER-DB03. Clustering does provide failover
lTe
detection and automatic failover for both system databases and user databases. You cannot
enable clustering for the SQL servers in the different offices.
C: You should not enable log shipping or replication with CERTKILLER-DB03. Replication and log
tua
shipping can be used to make a copy of a user database, but neither replication nor log shipping
provides failure detection or automatic failover. You cannot have applications automatically fail
over to a copy database with either log shipping or replication.
Ac
D: You should not enable clustering with CERTKILLER-DB03. Clustering does provide failover
detection and automatic failover for both system databases and user databases. You cannot
enable clustering for the SQL servers in the different offices.
QUESTION NO: 94
You receive an instruction from the CIO to implement a high-availability solution in the network.
This high-availability solution should include database mirroring as well as log shipping. You need
to determine what benefit it will result in.
A. It will result in you only requiring the principal server to be configured as primary server.
B. It will result in only one secondary server in log shipping when configured with database
mirroring.
C. It will result in the principal database in mirroring to be configured as a primary database in log
shipping.
D. It will result in the mirrored database in mirroring to be configured as a secondary database in
log shipping.
Answer: C
Explanation:
You can configure a principal database in mirroring to be the primary database in log shipping. In
most cases, you will configure mirroring before configuring log shipping. In mirroring, you would
typically have a principal server, a secondary server, and if you need automatic failover to the
m
secondary server, then a witness server as well. If configuring principal server to be the primary
server, which is principal/primary database combination, you must also configure the mirror
.co
database to be the primary database, which will be the mirror/primary database, for log shipping.
Incorrect Answers:
sts
A: The option stating that when log shipping is configured with mirroring, it requires only the
principal server to be configured as a primary server, is incorrect. You need to configure the
principal server as the primary server. Along with configuring the principal server, you must also
lTe
configure the mirror server as the primary server for log shipping. In mirroring, a principal and a
secondary server contain replicas of the databases on which mirroring has been configured. For
mirroring to work appropriately, you must also configure the mirror server as the log shipping
tua
primary server if the principal server has been configured as the primary server.
B: The option stating that there can be only one secondary server configured with mirroring in log
shipping is incorrect. In log shipping, you can have more than one secondary server configured. It
Ac
is not mandatory that you can have only one secondary server in log shipping
D: The option stating that the mirrored database in mirroring must also be configured as a
secondary database in log shipping is incorrect. The mirrored database must also be configured
as a primary database if the principal database is configured as a primary database.
QUESTION NO: 95
A. You should consider having user logins created from the CERTKILLER-DB01 to the promoted
principal server
B. You should consider having the jobs created on the newly promoted principal server.
C. You should consider having CERTKILLER-DB01 brought back online.
D. You should consider having the master database of CERTKILLER-DB01 copied to the newly
promoted server.
E. You should consider having the log files from CERTKILLER-DB01 copied to the newly
promoted server.
Answer: A,B
Explanation:
m
If a principal server goes down or disconnects from the mirror, the secondary server continues to
act as a secondary server until a secondary server forces itself to become the principal server.
.co
When the secondary server becomes the principal server, it may not have the latest logs for the
database, and therefore there may be some data loss, depending upon what was written from the
sts
principal server's log to the secondary server log. After the secondary server becomes the
principal server and the original principal server comes back online, it cannot demote the new
principal server back to being a secondary server. The original principal server in this case will
lTe
become the secondary server and roll back its logs to synchronize with the new principal server
logs.
The master database is not automatically mirrored from the original principal server to the
tua
secondary server. When the secondary server becomes the principal server, the master database
is not part of the database mirror. You will have to recreate any jobs that were running on the
original principal server on the newly promoted principal server.
Ac
Since the master database is not mirrored with the secondary database, and the master database
maintains user logins, you will also have to manually create the user logins on the newly promoted
principal server. Otherwise, the users will not be able to access newly promoted principal server.
Incorrect Answers:
C: When the original principal server comes online, it will be demoted to secondary server. Part 3:
Design a high-availability solution that is based on replication (2 Questions)
D: You do not have to copy the master database or the logs from the secondary server to the
newly promoted principal server. You would need to perform the required steps to ensure that the
newly promoted principal server is accessible.
E: You do not have to copy the master database or the logs from the secondary server to the
newly promoted principal server. You would need to perform the required steps to ensure that the
newly promoted principal server is accessible.
QUESTION NO: 96
During the course of the day you receive instruction from CertKiller.com to install a new database
application to the instance. The new database will use SQL CLR integration to develop stored
procedures. CertKiller.com wants you to ensure that the application is configured to enable
EXTERNAL_ACCESS code access security settings whilst ensuring the application is deployed
with no loss of functionality.
m
What should you do?
.co
A. You should consider having the peverify.exe utility used to confirm if the code meets the type-
safety requirements.
B. You should consider registering the VPN solution for the installation.
sts
C. You should consider using the File Server Resource Manager (FSRM) with static fields.
D. You should consider using the Windows System Resource Manager (WSRM) with read write
static fields.
lTe
Answer: A
tua
QUESTION NO: 97
Ac
Rory Allen has additionally created a stored procedure object in the CK_PRODUCTS database
named GetProductSales which call a stored procedure in the CK_SALES database named
SalePrice, both objects are owned by Miam Hamm. The database configuration is shown in the
exhibit below:
CertKiller.com wants you to ensure that Rory Allen has the permissions checked on the SalePrice
object.
m
What should you do? .co
A. You should consider changing the authentication mode from Mixed Mode authentication to
Windows security authentication.
sts
CK_SALES database.
D. You should consider having all of Rory Allen's permissions revoked on SalePrice.
Answer: B
tua
Explanation:
Part 4: Design a high-availability solution that is based on log shipping (2 Questions)
Ac
QUESTION NO: 98
Answer: D,E
Explanation:
You should perform the following two steps:
Disable the log shipping backup job on the primary server. You will later enable the log shipping
backup job on the secondary server.
Copy and restore the jobs from the primary to the secondary server. To be able to run the same
m
jobs on the secondary server, which will be the new primary server, you need to ensure that the
jobs are copied and restored on the secondary server from the primary server.
Incorrect Answers: .co
A: You should not shut down the primary server. If you shut down the primary server, you will not
be able to complete the role change process.
sts
B: You should not disable log shipping on the secondary server. Log shipping on the secondary
server should be enabled, not disabled.
C: You do not need to configure a new primary server as the primary server for other secondary
lTe
servers in this scenario. Even though you can configure the new primary server as the primary
server for the other secondary servers, this is an optional step.
tua
QUESTION NO: 99
Ac
During the course of the day you add an additional server CERTKILLER-DB03 which is configured
as the witness server. CertKiller.com has later reported that CERTKILLER-DB01 went offline and
the mirror CERTKILLER-DB02 10 minutes later also goes offline. CERTKILLER-DB02 became
online before CERTKILLER-DB01. CertKiller.com wants to know that the result would be when
CERTKILLER-DB01 becomes online.
Answer: D
Explanation:
Part 5: Select high-availability technologies based on business requirements (7 Questions)
m
QUESTION NO: 100
.co
You work as a database administrator at CertKiller.com. You are responsible for administering
SQL Server 2008 servers on a single site.
sts
CertKiller.com contains two instances on the site which is as follows: There is an Enterprise
Edition server instance on a server that contains a redundant array of independent disks (RAID)
10 disk system as well as a Standard Edition server instance on a server that contains a RAID 5
lTe
disk system.
The instances all host a single application. You receive a directive from management to devise a
tua
high availability solution for the site that will meet the subsequent requirements:You need to use
the implementation on the current systems.The database should be available with least amount of
downtime.The loss of information should be little.The solution should have least effect on the
Ac
current system.
Answer: B,C
The four sites all share a mission critical database named CERTKILLER-DB09. A new directive
from management states that all users must be able to:Access and change information with the
least amount of latency of all the sites.Reduce the loss of information when server failure occurs.
You thus need to determine a high-availability solution that will accomplish this.
m
D. This can be accomplished by implementing peer-to-peer replication.
Answer: D .co
sts
QUESTION NO: 102
You work as a database administrator at CertKiller.com. Your duties include administrating a SQL
lTe
Server 2008 infrastructure. You are in the process of implementing log shipping on three SQL
Server instances for numerous databases.
tua
The logs of the three SQL instances are shipped to a fourth SQL instance. You then decide to
implement a manual failover. You have received instruction from the CIO to make sure that the
secondary server is used by the database applications in the event of a failover. To ensure
Ac
productivity you need to make sure that the latest information is available to CertKiller.com users
to access.
A. You should make use the Synchronous database mirroring with a witness server.
B. You should make sure that the user workstations are redirected to the secondary instance.
C. You should make sure that the transaction log not applied should be backed up in sequence to
every secondary database with the WITH RECOVERY option on the last log.
D. You should use the WITH NORECOVERY option to make sure that the tail of the transaction
log of primary databases is backed up.
E. You should make sure that the stored procedures are copied to the secondary instance.
Answer: B,C,D
You are the newly appointed database administrator at CertKiller.com. You are responsible for
administering the Microsoft SQL Server 2008 server.
You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02
and CERTKILLER-DB03. CERTKILLER-DB02 is configured as the primary server and
CERTKILLER-DB03 as the secondary server.
You decide to apply certain maintenance patches on CERTKILLER-DB02. To achieve this you
need to take the server offline. To ensure that productivity continues you need to make sure that
CERTKILLER-DB03 performs the role of the primary server. In order to start the [process you
copy the database backup files from the network share to CERTKILLER-DB03.
m
What is your next step?
.co
A. Your next step should be to roll the database forward on CERTKILLER-DB03.
B. Your next step should be to restore the transaction logs on CERTKILLER-DB03.
C. Your next step should be to disable all backup jobs on the CERTKILLER-DB02.
sts
D. Your next step should be to configure the CERTKILLER-DB03 as the primary server for other
secondary servers if they exist.
lTe
Answer: B
Explanation:
tua
You need to perform the following steps to bring a secondary server online as a primary server:
Copy onto the secondary server any backup files that are not already there. These backup files
might be stored in the network share.
The transaction logs must be restored on the secondary server. You need to back up the
Ac
transaction logs from the primary to the secondary server using the with norecovery clause. When
you back up transaction logs from the primary server using the with norecovery clause, the
database in the primary server goes into the restoring state. In this state, the database is not
available to users. On the secondary server, you need apply to the transaction logs to roll the
database forward.
After you roll the database forward on the secondary server, the secondary database server is
synchronized with the primary server and is updated with the latest information.
After CERTKILLER-DB03 is configured as the primary server, You can now redirect the SQL
clients to CERTKILLER-DB03. CERTKILLER-DB03 can be configured as the primary server for
various other secondary servers.
Incorrect Answers:
A: You only need to roll forward the secondary server database once you have restored the
transaction logs on the secondary server.
m
What should you do?
.co
A. You should consider making use of snapshot replication.
B. You should consider making use of peer-to-peer replication.
sts
C. You should consider making use of transactional replication.
D. You should consider making use of Merge replication.
lTe
Answer: D
Explanation:
tua
Merge replication has the ability to resolve conflicts that may occur during the replication. You
typically use merge replication when:
You must replicate information to mobile users who are not always connected to the SQL Server.
Ac
There is a requirement of data filtering. In data filtering, you can filter different updates to different
Subscribers at different locations.
You require the ability to resolve conflicts that occur during replication.
Incorrect Answers:
A: You should not use peer-to-peer replication. This type of replication is typically used when you
need high availability and scalability. This type of replication does not have the ability to resolve
conflicts that may occur during replication updates.
B: You should not use transactional replication. In this type of replication, fewer Subscribers keep
the read-only copy of replicated data. This type of replication does not have the ability to resolve
conflicts that occur during replication updates.
C: You should not use snapshot replication. This type of replication is used when you need to
replicate a large volume of information. This type of replication does not have the ability to resolve
m
A. You should consider making use of replication.
B. You should consider making use of database snapshots.
.co
C. You should consider making use of failover clustering.
D. You should consider making use of log shipping.
E. You should consider making use of database mirroring.
sts
Answer: A,C,D
lTe
Explanation:
You can configure the following high availability solutions for a database that contains a varbinary
( max) column:
tua
Log shipping: This high availability solution works with the databases that have FILESTREAM data
in the vat binary (max) column. You must enable FILESTREAM in both the primary and the
secondary servers. Each server must be running SQL Server 2008 with FILESTREAM enabled. If
any of the required prerequisites are not met, the solution will not work.
Ac
Failover clustering: This high availability solution requires FILESTREAM data to be hosted on a
shared disk so that it can be accessible by all nodes in the cluster. Each node in the cluster must
have FILESTREAM enabled for it to work successfully in a clustered environment.
Replication: In merge replication, a uniqueidentifier data type column is automatically added to
tables that do not contain this data type. A UNIQUE constraint must also be defined for the column
along with ROWGUIDCOL property set.
Incorrect Answers:
B: You cannot configure database snapshots for the database that contains FILESTREAM data in
a varbinary (max) column. When you attempt to create a database snapshot of the database that
contains FILESTREAM data, you will be prompted with an error.
E: You cannot configure database mirroring for the database that contains FILESTREAM data in a
varbinary (max) column. FILESTREAM filegroups are not supported on the principal server in a
mirroring configuration. If mirroring does not support a database with the FILESTREAM data, the
m
CERTKILLER-DB03 went offline.
Answer: B
Explanation:
Ac
When a witness server goes offline, the full quorum is no longer used. Both the principal, which is
CERTKILLER-DB01, and mirror, which is CERTKILLER-DB02, will move into a partner-to-partner
quorum. Without the witness server, automatic failover will not be supported. A database
administrator will have to perform manual failover if the principal server becomes unavailable. Only
when the witness server is back online will the automatic failover be possible.
Incorrect Answers:
A: CERTKILLER-DB02 is the mirror server and will not become the principal server. The mirror
server resumes the role of a principal server only when the principal server is no longer available.
If this occurs, the witness server will assign the role of the principal server to the mirror server. If
there is no witness server and there is partner-to-partner quorum, the mirror server must be
assigned the role of principal server by the administrator using the manual failover process.
C: The database will not go offline. If both principal and mirror lose the quorum, the database will
be offline and the witness server will not be available. However, in the scenario, only the witness
You are the newly appointed a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 instance that hosts a database named CK_SALES.
CK_SALES contains the subsequent backup strategy:The execution of full database backups on a
m
weekly basis.The execution of differential database backups every day.The execution of
transactional log backups on an hourly basis.The recovery plan necessitates that you execute an
unscheduled full backup.
.co
You receive an instruction from the CIO to execute a full database backup. You need to
sts
accomplish this tasks without the scheduled backup strategy being disrupted.
lTe
A. Your best choice would be to make use of the COPY_ONLY backup option.
B. Your best choice would be to make use of the database snapshot.
tua
C. Your best choice would be to make use of the Transaction log backup.
D. Your best choice would be to make use of the Hyper-V feature.
Ac
Answer: A
CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for
administering a database server named CERTKILLER-DB01 with an instance that hosts a
database named CK_PRODUCT that stored highly confidential data.
You have received instruction from the CIO to ensure that data restored as soon as possible in the
event that an error occur. There are two tape devices from different manufacturers in
CERTKILLER-DB01. However, the tape devices make use of the same media and have the same
capacity. You thus need to confirm that the information on the backup of CK_PRODUCT can be
Answer: D
Explanation:
m
The checksum keyword verifies each page for checksum and torn page errors and will generate a
checksum for the entire backup. The backup will be flagged as containing backup checksums in
.co
the backupset table in the MSDB database. To verify the backup, you should use restore
verifyonly . This command is used to determine if the following conditions are met:
sts
The backup set is complete.
Checksum is present on the media.
Volumes are all readable.
lTe
The restore verifyonly statement does not guarantee that the data can be recovered. This
tua
command can be used to determine database integrity problems that could compromise the
backup set.
Incorrect Answers:
Ac
A: You cannot create a mirrored backup media sets using the checksum keyword or the
stop_on_error keyword during the backup. A mirroring backup media set can increase the
reliability of the backup by reducing the possibility of a backup-device malfunction. If a malfunction
occurs in one device, the other device can still proceed with the backup. A mirrored backup set
can only be created if the tape devices are from the same manufacturer and have the same serial
number. The tape devices used on CERTKILLER-DB01 are similar, but not the same model. The
stop_on_error keyword is used to stop a backup if a checksum does not verify. This is the default
behavior and does not need to be specified.
B: You cannot create a mirrored backup media sets using the checksum keyword or the
stop_on_error keyword during the backup. A mirroring backup media set can increase the
reliability of the backup by reducing the possibility of a backup-device malfunction. If a malfunction
occurs in one device, the other device can still proceed with the backup. A mirrored backup set
can only be created if the tape devices are from the same manufacturer and have the same serial
number. The tape devices used on CERTKILLER-DB01 are similar, but not the same model. You
m
What should you do?
.co
A. You should consider making use of the full quorum of the witness-to-partner quorum.
B. You should consider making use of the partner-to-partner quorum only.
sts
C. You should consider making use of the witness-to-partner quorum only.
D. You should consider making use of the full quorum only.
lTe
Answer: A
Explanation:
tua
In this scenario, either full quorum or witness-to-partner quorum would meet the requirement. You
can set either of the two quorums for the automatic failover to the mirror server if principal server is
out of quorum. Three types of quorums can be configured:
Full quorum: In full quorum, there are three servers involved: a witness server, a principal server,
Ac
and a mirror server. All three servers interact with each other in a full quorum. If the principal
server fails, the mirror server takes over the role of the principal server. There is automatic failover
initiated by the witness server and the mirror server will be designated as the principal server.
When the principal server comes online in the quorum, it becomes the mirror server. On the other
hand, if the mirror server fails, the principal server suspends mirroring, and then resynchronizes its
copy of the database when the mirror server returns.
Witness-to-partner quorum: In this quorum, there is either a principal or a mirror server and one
witness server. If the mirror server is out of quorum, the principal server continues with the witness
server. However, the principal server keeps the database in an exposed state, meaning the
database is currently not being mirrored with its mirrored copy. In another condition where the
principal server fails, the witness server initiates the automatic failover and the mirror server is
assigned the role of principal server.
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
.co
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure
high availability for the CK_SALES database by using database mirroring. CertKiller.com has
sts
additionally requested that you configure automatic failover database mirroring sessions whilst
improving reliability of the automatic failover.
lTe
A. You should consider having the database mirroring session configured with a witness server.
tua
B. You should consider having the database mirroring session configured to run in synchronous
mode.
C. You should consider having the database mirroring session configured to run in asynchronous
Ac
mode
D. You should consider having the database mirroring sessions stored on different computers.
E. You should consider having the database mirroring sessions stored on a single computers.
Answer: A,B,D
Explanation:
Failover clusters provide high availability for an entire instance of SQL server, whereas database
mirroring provides high availability for a single database. When you want to use database
mirroring with failover clusters, both the principal server and mirror server should reside on
different clusters. However, a mirroring session can also be established when one partner resides
on the failover clustered instance of a cluster and the other partner resides on a separate,
unclustered computer. When you use database mirroring with failover clusters, the database
mirroring sessions can be configured for automatic failover. To support automatic failover, the
m
database.
E: The option stating that the principal database and the mirror database must be stored on a
.co
single computer is incorrect because this will not improve the reliability of automatic failover. When
both the principal and mirror databases are stored on a single computer, both the databases will
sts
become unavailable if the computer fails. In this case, automatic failover will not occur.
lTe
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to move all
the operators and alerts from CERTKILLER-DB01 in the testing environment to a server named
Ac
CERTKILLER-DB02 in the production environment. CertKiller.com is aware that both servers are
running the same build and edition of SQL Server 2008 with different hardware.
A. You should consider having the master database on CERTKILLER-DB01 backed up and
restore the master database on CERTKILLER-DB02 to move the operators and alerts.
B. You should consider having the sysjobs, sysnotifications, and sysalerts tables for
CERTKILLER-DB01 copied to the appropriate database on CERTKILLER-DB02 to move the
operators and alerts.
C. You should consider having the model database on CERTKILLER-DB01 backed up and restore
the master database on CERTKILLER-DB02 to move the operators and alerts.
D. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore
the msdb database on CERTKILLER-DB02 to move the operators and alerts.
"Pass Any Exam. Any Time." - www.actualtests.com 104
Microsoft 70-450: Practice Exam
Answer: D
m
A. You should consider having the database mirrored using a full quorum.
B. You should consider configuring log shipping.
C. You should consider creating a full backup.
D. You should consider creating a database snapshot.
.co
sts
Answer: D
Explanation:
lTe
To meet the required goal in the scenario, you should create a database snapshot. Snapshots
provide a read-only image of the database that has a full working image of the database from the
time when the snapshot was created. Only committed transactions are part of the snapshot. If
tua
there is any open and uncommitted transaction on the database, it will not be a part of the
snapshot. If you have a snapshot readily available and there is any issue with the database, you
can bring the snapshot online but ensure that it is on the same SQL Server instance from where
the snapshot was created. Snapshots are typically used for reporting purposes.
Ac
Incorrect Answers:
A: You should not mirror the database with a full quorum. In a full quorum, there are three servers
involved: a witness server, a principal server, and a mirror server. All three servers interact with
each other. If the principal server fails, the mirror server takes over the role of the principal server
and automatic failover is initiated by the witness server. The mirror server, in this case, will be
designated as the principal server. If there is an error in the database or erroneous data in a table,
this data can be mirrored from the principal server to the mirrored server. If the mirror server fails,
the principal server suspends mirroring, and then resynchronizes its copy of the database when
the mirror server returns. This solution will not meet the requirement stated in the scenario.
B: You should not use log shipping. Log shipping will not help you revert to the database from the
point where you had taken the backup of the source database. Log shipping is used for backing up
transaction logs from the primary to the secondary server. You could also have a monitor server,
which will be the third server, to track transaction log updates from the primary to the secondary
CK_PRODUCT is spanned across multiple disks. You receive an instruction from the CIO to add a
m
read-only filegroup to the CK_PRODUCT that will enclose historical data. You configure the
backup schedule for CK_PRODUCT as follows:A full backup will run on Mondays, Wednesdays
.co
and Fridays at 02:00 am.A Transaction Log backup will run every day at 08:00 am.A Transaction
Log backup will run every day at 14:00 pm.A differential backup will run on Tuesdays, Thursdays
and Saturdays at 01:00 am.
sts
In the event of a failure you need to be able to restore CK_PRODUCT up till the point of failure.
lTe
A. You should consider moving the transaction log to another drive than that of the data files.
B. You should consider increasing the frequency of the transaction log backups.
C. You should consider increasing the frequency of the differential backups.
Ac
Answer: A
Explanation:
Not only should you have the transaction log on a different drive than the data files for
performance reasons, you should have them on different drives for recovery purposes. If the
transaction log file is on a different drive than the database files and the drive that contains the
database files fails, you can still make a backup of the transaction log, referred to as a tail-log
backup. If the transaction log is on the same drive as the database files and the drive fails, you
cannot recover the database up to the point of failure.
To perform a complete restore up to the point of failure, you should do the following:
Restore the latest full backup by typing RESTORE DATABASE CK_PRODUCT FROM full
database backup WITH NORECOVERY;
m
backups will help to recover data. However, unless you can create a tail-log backup as well, you
will not restore the database back to the point of failure.
.co
D: You should not add a filegroup backup. A filegroup backup may not allow the database to
recover to the point of failure. You will need a tail-log backup to get the database back to the point
sts
of failure.
lTe
Microsoft SQL Server 2008 for hosting databases. You are responsible for a database server
named CERTKILLER-DB01 that hosts a database named CK_ORDERS.
At present CK_ORDERS is configured to run a full backup daily and transaction log backups
Ac
hourly. The checksun keyword is included in all backup statements. There are two tape devices
from different manufacturers in CERTKILLER-DB01. However, the tape devices make use of the
same media and have the same capacity. The hard drives in CERTKILLER-DB01 are the same
model and have the same capacity.
Management wants you to increase the reliability of the backups, decrease the chances of data
loss as well as reduce the impact of backup-device malfunctions. You decide to implement
mirrored backup media sets to accomplish this.
Answer: A
Explanation:
You should use the backup database statement to specify that you will back up the Sales
database. You must also specify the Mirror TO clause. You can mirror to disk or tape; however,
the backup devices must have the same model number and be from the same manufacturer. In
this scenario, CERTKILLER-DB01 has two tape drives from different manufacturers, but multiple
m
hard drives that are from the same manufacturer and are the same model.
Incorrect Answers:
.co
B: You can create a mirrored media set with the hard drives in CERTKILLER-DB01, not with the
tape drives. Therefore, you should not use the following statement:BACKUP DATABASE
CK_ORDERS TO TAPE = '\\.\tape0'MIRROR TO TAPE = '\\.\tape1'WITH MEDIANAME =
sts
'CK_OrdersSet1';
C: You should not use either statement that uses the sp_addbackupdevice statement. This stored
procedure was deprecated in SQL Server 2000. You cannot use this stored procedure in SQL
lTe
Server 2008.
D: You should not use the following statement because backup devices are being created on the
same drive:BACKUP DATABASE CK_ORDERS TO DISK =
tua
You work as a database administrator at CertKiller.com. You are responsible for administering the
Microsoft SQL Server 2008 servers. CertKiller.com has its headquarters in London and a branch
office in Paris.
Due to company growth the company opens another branch office in Athens. The Athens office is
allocated a new SQL server. You receive an instruction from the CIO to ensure that a full backup
of CK_DATA is shipped from the Athens office to the London office weekly. You need to make
sure that the shipped backup does not have any effect on the scheduled backups for CK_DATA.
You need to determine the statement the server operator should enter at the Athens office in order
m
Full Database Backup', SKIP, NOREWIND, NOUNLOAD, DIFFERENTIAL,
COPY_ONLY
Answer: C
.co
sts
Explanation:
In this scenario, the SQL server operator should create a copy-only backup. This type of backup is
independent of the sequence of any current backups. Copy-only backups are useful for making a
lTe
backup to transport to another location because they will not affect the current sequence of regular
backups.
Incorrect Answers:
tua
A: If the differential parameter and copy only parameter are used together, the copy only
parameter is ignored.
B: This statement will perform a full backup that could disrupt the regular sequence of backups
Ac
that are performed in the Atlanta office. The SQL server operator should include the copy_only
parameter to perform a copy-only backup that will not interrupt the sequence of backups.
D: This statement will perform a differential backup. In this scenario, you need a full backup not a
backup of everything that has changed since the last backup.
m
SKIP, NOREUIND, NOUNLOAD, COPY_ONLY
D. You should consider adding the statement below in the script:
.co
BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak', [Fullback]
WITH NOFORMAT, NOINIT, NAME = D'CK_DATA-Full Database Backup',
SKIP, NOREHIND, NOUNLOAD, DIFFERENTIAL, COPY_ONLY.
sts
Answer: D
lTe
Explanation:
This statement will perform a differential backup that will back up the changes made in the
database since the last full backup. This statement also includes the differential parameter and the
tua
copy_only parameter. If both of these parameters are in the statement, the copy_only parameter is
ignored and the differential parameter is used.
When you perform a full backup, it resets the base backup. A differential backup takes all data that
Ac
has changed since the last full backup. If you were to perform another full backup in between the
current backup sequence of Full, Differential and Transaction log backups, you would disrupt the
regular backup schedule. Copy-only backups are useful for making a backup to transport to
another location because it will not affect the current sequence of regular backups.
You can use the backup database command to back up a database. The following are options
with the backup database command:
copy_only -allows a copy-only backup.
differential -backs up only the portions of the database or file that have changed since the last full
backup. If the DIFFERENTIAL parameter and COPY_ONLY parameter are used together, the
COPY_ONLY parameter is ignored. disk -specifies the destination of the backup.
noformat -does not format the media.
init -initializes the media and does not allow backups to be appended to media.
noinit -does not initialize the media and allows backups to be appended to media.
name -specifies name of the backup.
m
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 database solution.
.co
Data modifications are executed via stored procedures that make use of the INSERT, UPDATE or
sts
DELETE statements. You are in the process of implementing a backup strategy. Management
wants you to make sure that the subsequent requirements are met:Point-in-time recovery in the
lTe
event of failure should be supported at any time.A minimum amount of disk space should be used
by the transaction log.
tua
A. Your best option would be to make use of Microsoft Multipath in conjunction with differential
backups.
Ac
B. Your best option would be to make use of Storage Reports Management snapshots.
C. Your best option would be to make use of the full-recovery model in conjunction with
transaction log backups.
D. Your best option would be to configure caching on the shared folder.
Answer: C
You are employed as a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 server named CERTKILLER-DB01 with an instance that hosts a
database named CK_DATA.
You decide to run a batch process on Saturday from 20:00 pm to 22:00 pm. It has come to your
attention that the batch process is invalidated. This occurred when a client modified data on
Saturday at 20:10 pm. Management wants you to restore CK_DATA to the state prior to the start
of the batch process. You need to accomplish this task in the least amount time.
m
A. This can be accomplished by using the Windows System Resource Manager (WSRM).
Thereafter the entire database should be restored. .co
B. This can be accomplished by restoring the full database backup that was executed on
Thursday.
sts
Then restore the differential backup that was executed on Friday.
Thereafter the transaction logs should be restored from the time of the differential backup on
Friday and stop at 20:00 pm on Saturday.
lTe
C. This can be accomplished by installing a failover cluster that contains one node.
D. This can be accomplished by use a two-node failover cluster.
tua
Answer: B
Ac
CertKiller.com has hired you as a database administrator for their network. Your duties include
administering the SQL Server 2008 infrastructure.
You are in the process of implementing a corporate backup and recovery strategy. This strategy
needs to be validated. Management wants you to guarantee the successful recovery of a single
database from a disastrous failure without needing a backup data center in another location. You
need to determine the tasks that need to be included.
Answer: B,D,E
You are employed as a database administrator at CertKiller.com. You are responsible for
administering the SQL Server 2008 servers for the organizations. You are assigned a database
server named CERTKILLER-DB01 with an instance named CK_SALES.
During routine monitoring you discover that the disk containing the FILESTREAM filegroup has
m
failed. You ordered a replacement disk but will only be available in seven days. You do not
anticipate new information to be added to the database the following seven days.
.co
You attempt to execute a partial restore on CK_SALES. You are able to restore the filegroups
excluding for the FILESTREAM filegroup. You then decide to execute a point-in-time restore,
sts
however, it fails. You need to determine a way to successfully restore the filegroup.
A. In order to make the make the point-in-time restore succeed you need to specify the
continue_after_error option in conjunction with stopat, stopatmark, or stopbeforemark.
tua
B. In order to make the make the point-in-time restore succeed you need to specify the checksum
option in conjunction with stopat, stopatmark, or stopbeforemark.
C. In order to make the make the point-in-time restore succeed you need to specify the checksum
Ac
Answer: A
Explanation:
When performing a partial restore that requires a point-in-time restore you must include one of the
stopat , stopatmark , or stopbeforemark options. If a FILESTREAM filegroup is excluded from a
point-in-time restore, the point-in-time restore will fail. For the point-in-time restore to continue, you
can specify the continue_after_error option together with the stopat , stopatmark , or
stopbeforemark . This will allow the restore to continue, but the FILESTREAM filegroup will
become unrecoverable. In this scenario, the database on the CERTKILLER-DB01 instance will be
able to operate until the new disk arrives, after which you can begin a full restore. Any data that
has been added to the database after the partial restore was performed would have to be
"Pass Any Exam. Any Time." - www.actualtests.com 113
Microsoft 70-450: Practice Exam
recreated.
Incorrect Answers:
B: You should not specify the checksuh option together with the stopat, stopatmark, or
stopbeforemark options. The checksum option checks each page for checksum verification and
torn page corruption and will generate a checksum for the entire backup. The backup will be
flagged as containing backup checksums in the backupset table in the msdb database. This option
will not help a point-in-time restore succeed if a FILESTREAM filegroup is not available for
restore.C; D: You should not specify checksum option or the continue_after_error option together
with the standby option. The standby option backs up the tail of the log, but leaves the database in
read-only state. This option requires a standby file that holds the standby data of rollback changes.
In this scenario, the STANDBYoption will not help a point-in-time restore succeed if a
FILESTREAM filegroup is not available for restore.
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_SALES.
sts
CONTINUE_AFTER_ERROR
GO
Management wants you to make sure that you are able to restore CK_SALES in the event of a
Ac
disaster. You thus need to determine the appropriate changes that have to be made to the script
to accomplish this.
Answer: C
m
can be used to get more data on a backup device, but does not prevent errors from being written
to the device.
.co
sts
QUESTION NO: 122
Microsoft SQL Server 2008 for hosting databases. You are responsible for a database server
named CERTKILLER-DB01 hosts a database named CK_ORDERS.
tua
You enable Transparent Data Encryption (TDE) on CK_ORDERS. You decide to test a new
application that will be responsible for updating records in CK_ORDERS. The new application will
require:The TCP/IP network library.SSL encryption established on the server to guarantee a
secure connection.
Ac
You receive an instruction from the CIO to restore a backup of the CK_ORDERS onto a second
SQL Server 2008 server in a test environment. However, your attempt to restore the backup fails.
You thus need to determine what needs to be restored in order to rectify the error.
Answer: C
m
error is caused because the data is encrypted and the backup cannot be restored to other servers
without the server master key. If you need to force encryption between a client and a SQL Server,
.co
you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL
Server instance.
sts
D: You do not need to restore the SSL session key or the SSL certificate. In the scenario, the
application requires a secure SSL connection to the SQL Server. Enabling a secure connection
between the application and the SQL Server will not cause an error in restoring a database. The
lTe
error is caused because the data is encrypted and the backup cannot be restored to other servers
without the server master key. If you need to force encryption between a client and a SQL Server,
you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL
tua
Server instance.
Ac
You are in the process of performing daily full backups to all the databases on CERTKILLER-
DB01. You notice that errors occur when the server reboots after a power failure. You check and
discover that CERTKILLER-DB01 has to be rebuilt.
You continue to restore the other databases and discover numerous errors. You check and
discover that there are orphaned users in the Accounts database. You need to determine a way to
discover and resolve the orphaned users.
m
Answer:
.co
sts
lTe
tua
Ac
You are the newly appointed database administrator at CertKiller.com. You are responsible for
administering the Microsoft SQL Server 2008 server.
You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02
and CERTKILLER-DB03. CERTKILLER-DB02 is configured as the primary server and
CERTKILLER-DB03 as the secondary server. You discover during routine maintenance that a disk
failed on CERTKILLER-DB02. This disk contains the user database that is configured for log
shipping. To ensure productivity you need to bring CERTKILLER-DB03 online with the latest
CERTKILLER-DB02 database state.
Answer: B
Explanation:
Backup files which are not already on CERTKILLER-DB03 need to be copied onto the
CERTKILLER-DB03. These backup files might be stored in the network shares where you store
m
your backups for the SQL Server. The transaction logs must be restored on the CERTKILLER-
DB03. You need to back up the transaction logs from the CERTKILLER-DB02 to the
.co
CERTKILLER-DB03 using the with norecovery clause. When you back up transaction logs from
the CERTKILLER-DB02 using the with norecovery clause, the database in the CERTKILLER-
sts
DB02 goes into the restoring state. In this state, the database is not available to users. On
CERTKILLER-DB03 you need to apply the transaction logs to roll the database forward. After you
roll the database forward on CERTKILLER-DB03, the CERTKILLER-DB03 is synchronized with
lTe
the CERTKILLER-DB02 and is updated with the latest information. After CERTKILLER-DB03 is
configured as the primary server, You can now redirect the SQL clients to CERTKILLER-DB03.
CERTKILLER-DB03 can be configured as the CERTKILLER-DB02 for various other secondary
tua
servers.
Incorrect Answers:
A: You should not disable all backup jobs on CERTKILLER-DB02. You do not disable all backup
Ac
jobs on CERTKILLER-DB02. You only disable log shipping backup job when you are performing a
role change between CERTKILLER-DB02 and CERTKILLER-DB03.
C: The option stating that you do not need to perform any steps is incorrect. Database Mirroring
and Clustering provide automatic failover. Log shipping does not. To bring CERTKILLER-DB03
online, you need to perform manual failover from CERTKILLER-DB02 to the CERTKILLER-DB03.
The manual failover process requires you to back up the transaction logs from CERTKILLER-
DB02 and then restore them on the CERTKILLER-DB03 and so on.
D: You should not delete the transaction logs and the database data files from the CERTKILLER-
DB02 and restore the files on CERTKILLER-DB03 from a shared location. You do not delete files
from CERTKILLER-DB02. You can restore the latest database backup files from a network share
or any other storage location.
A. You should consider having T-SQL and local file system access enabled.
B. You should consider having FILESTREAM enabled using the sp_filestream_configure stored
procedure.
C. You should consider having a filegroup created.
m
D. You should consider having a table created with Binary Large Object (BLOB) column.
Answer: B
Explanation:
.co
To enable FILESTREAM in a database instance, you first need to enable FILESTREAM using the
sts
stored procedure named sp_fiIestream_configure . This is the first step in enabling FILESTREAM
for a database instance. For instance, you can execute the stored procedure with @ enable_level
and @ share_name parameters:
lTe
allows you to configure T- SQL, local file system access, or remote file system access depending
on which value is assigned. The value 2 allows only T- SQL and local file system access. The
share_name parameter creates a file share that is used for accessing BLOB. If you do not want to
Ac
use the stored procedure for enabling FILESTREAM, you can also use SQL Server Management
Studio (SSMS).
Creating a filegroup is the second step in enabling FILESTREAM for a database instance. This
step must be performed after enabling FILESTREAM. You need to use the CONTAINS
FILESTREAM attribute to create a filegroup .
The data in FILESTREAM is actually stored on the file system, which provides a number of
benefits. For instance, you will be able to compress data with the NTFS compression capabilities.
A Word document that is stored on the file system will be compressed with the NTFS compression
capabilities. When the data is stored, it is in compressed form, and when the data is retrieved, it is
decompressed.
A. You should consider having a tail-log backup created of the msdb database.
m
B. You should consider making use of a tail-log backup of the tempdb database
C. You should consider having the tempdb database restored.
.co
D. You should consider making use of the msdb database restored.
E. You should consider making use of the rebuildm.exe utility to rebuild the master database.
F. You should consider making use of the setup.exe utility from the SQL Server 2008 media with
sts
the rebuilddatabase keyword to rebuild the master database.
Answer: A,D,F
lTe
Explanation:
You will have to restore the master database to rebuild an SQL server instance. If you cannot get
tua
the SQL server service to start, you will have to rebuild the master database before you can
restore it. After rebuilding the master database, you will have to restore not only the master
database, but also the model and msdb databases.
Ac
You should make a tail-log backup of the msdb database and restore the msdb database. The
msdb database contains job information and any scheduled jobs. You should restore any
database backups for the msdb database and any log backups since the last full backup. You
should restore the tail-log backup to ensure that you can get the msdb database back up to the
point of failure.
Incorrect Answers:
B: You do not have to make a tail-log backup of the tempdb database or restore the tempdb
database. The tempdb database contains temporary objects. The tempdb database is recreated
when the SQL server service restarts.
C: You do not have to make a tail-log backup of the tempdb database or restore the tempdb
database. The tempdb database contains temporary objects. The tempdb database is recreated
when the SQL server service restarts.
E: You should not use the rebuildme.exe utility to rebuild the master database. This program was
CertKiller.com wants the backup strategy configured to have the database restored as quickly as
possible if a database failure occurs whilst ensuring that database can be restored as close as
m
possible to the point of failure.
performing transaction log backups each Monday, Wednesday and Saturday nights.
C. You should consider having a full database backup performed monthly whilst having the
transaction log backups performed each Friday
tua
D. You should consider having a differential backup performed each Friday night whilst performing
transaction log backups each Monday, Wednesday and Saturday nights.
Ac
Answer: A
Explanation:
You should do the following:
You should perform a full database backup each Friday night.
You should perform differential database backups each Monday, Tuesday, Wednesday, and
Thursday night.
You should perform transaction log backups every hour during business hours.
By implementing a disaster recovery strategy that uses full database backups, differential
database backups, and transaction log backups, you can reduce the amount of time that is
involved in restoring the database to the moment of failure. Full database backups should be
performed regularly because a full backup creates a starting point for the sequence of transaction
log backups that you must restore in order to return the database to a consistent state.
m
unmanageable or when certain files change more frequently than others. However, if possible, you
should avoid performing filegroup backups because they increase administrative overhead.
.co
Additionally, filegroup backups do not include any information from a transaction log, whereas full
database backups and differential database backups do. When a filegroup backup is performed,
sts
you must also perform transaction log backups, because you must restore them to recover the
database after you have restored the filegroup backup.
C: You should not limit your full database backups to a monthly schedule, or limit transaction log
lTe
backups to each Friday. Transaction logs should be made often enough to reflect changes in the
database. Generally, you should perform a transaction log backup on a daily or hourly basis.
Performing a full backup once a month and transaction backups every week will not be sufficient
tua
contain a full backup. A full backup creates a starting point for the sequence of transaction log
backups that you must restore in order to return the database to a consistent state.
During the course of the day on 08/24/2009 you receive reports from employees all stating that
errors are present in the CK_SALES database. You decided to check the log and notice the error
occurred at 05:42. CertKiller.com wants you to have the CK_SALES database restored to the
point of failure by selecting the order of the backup sets to restore.
m
A. You should consider creating a tail-log backup and restore FullBackup2, TransactionBackup5,
TransactionBackup6 and DifferentialBackup2.
You should then have the tail-log backup restored.
.co
B. You should consider restoring FullBackup2, TransactionBackup5, TransactionBackup6 and
sts
finally restore DifferentialBackup2.
C. You should consider having FullBackup2 restored and then restore DifferentialBackup2.
D. You should consider creating a tail-log backup and restore FullBackup2.
lTe
You should then restore DifferentialBackup2 and restore the tail-log backup.
Answer: D
tua
CertKiller.com wants the backup strategy configured to have the database restored as quickly as
possible if a database failure occurs whilst ensuring that database can be restored as close as
possible to the point of failure.
Answer: D
Explanation:
You should do the following:
m
You should perform a full database backup each Friday night.
You should perform differential database backups each Monday, Tuesday, Wednesday, and
Thursday night. .co
You should perform transaction log backups every hour during business hours.
sts
By implementing a disaster recovery strategy that uses full database backups, differential
database backups, and transaction log backups, you can reduce the amount of time that is
involved in restoring the database to the moment of failure. Full database backups should be
lTe
performed regularly because a full backup creates a starting point for the sequence of transaction
log backups that you must restore in order to return the database to a consistent state.
Differential database backups are cumulative; each differential database backup includes all
tua
changes made to the database since the last full database backup. Therefore, each subsequent
differential database backup includes all of the information from the previous differential backup.
Thus, more time is usually required to perform a differential backup than a series of transaction log
Ac
backups that cover the same time period. However, differential backups minimize restore time.
After restoring the latest full database backup, you do not need to restore all subsequent
differential database backups. You need to restore only the latest differential backup.
Transaction log backups, which do not contain redundant data, are necessary when a database
must be restored to a specific time. You must consecutively restore each of the transaction log
backups that have been made since the last full or differential database backup.
Incorrect Answers:
A: You should not perform your full database backups every other Friday night, differential
database backups every Monday, and filegroup backups at the end of each business day. A
filegroup backup is functionally equivalent to backing up all files in the filegroup. Generally,
filegroup backups are performed when a database is so large that a full backup becomes
unmanageable or when certain files change more frequently than others. However, if possible, you
should avoid performing filegroup backups because they increase administrative overhead.
Additionally, filegroup backups do not include any information from a transaction log, whereas full
"Pass Any Exam. Any Time." - www.actualtests.com 124
Microsoft 70-450: Practice Exam
database backups and differential database backups do. When a filegroup backup is performed,
you must also perform transaction log backups, because you must restore them to recover the
database after you have restored the filegroup backup.
B: You should not perform a differential database backup each Friday night and perform
transaction log backups each Monday, Wednesday, and Saturday nights. This solution does not
contain a full backup. A full backup creates a starting point for the sequence of transaction log
backups that you must restore in order to return the database to a consistent state.
C: You should not limit your full database backups to a monthly schedule, or limit transaction log
backups to each Friday. Transaction logs should be made often enough to reflect changes in the
database. Generally, you should perform a transaction log backup on a daily or hourly basis.
Performing a full backup once a month and transaction backups every week will not be sufficient
to restore a database up to the point of failure.
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com has configured the CK-SALES database with its transaction logs and
sts
database files stored on separate disk drives. During the course of the day one of the disk drives
of CERTKILLER-DB01 has failed. CertKiller.com wants you to perform a recovery of the database
lTe
What should you do? (Choose all that apply, by placing options in the correct order)
tua
Ac
CertKiller.com wants to know what should be kept in mind when configuring FILESTREAM in a
failover cluster? (Choose two)
A. You should keep in mind that you should have the FILESTREAM filegroup on all nodes in the
m
cluster.
B. You should keep in mind that FILESTREAM should be enabled on the primary node in the
cluster. .co
C. You should keep in mind that any node which is required to host FILESTREAM should have
FILESTREAM enabled.
sts
D. You should keep in mind that you should allow remote clients to have streaming access to
FILESTREAM data option enabled.
E. You should keep in mind that you should have the FILESTREAM filegroup on the shared disk.
lTe
Answer: C,E
tua
Explanation:
The following guidelines must be met when configuring FILESTREAM in a failover cluster:
You must have FILESTEAM filegroup on the shared disk so that it can be accessible to all nodes
in the cluster. Any node that needs to host FILESTREAM must have FILESTREAM enabled. If this
Ac
You have later decided to test the recovery of the databases to a marked transaction by doing the
tasks listed below:
You first created a tail-log backup of the databases.You secondly restore the most recent full
database backup.
CertKiller.com wants you to identify the most recent marked transactions available in all the
transaction log backups.
m
What should you do?
.co
A. You should look for the information in the syslogs table in the database that you are trying to
restore.
sts
B. You should look for the information in the logmarkhistory table in the master database.
C. You should look for the information in the logmarkhistory table in the msdb database.
D. You should look for the information in the logmarkhistory table in the CK_SALES and
lTe
CK_PRODUCTS databases.
Answer: C
tua
Explanation:
You can use the stopat , stopatmark or stopbeforemark keywords to have a point in time restore.
Ac
The stopat key word can be used to stop at a specific time. You can use the stopatmark or
stopbeforemark keyword to stop at a marked transaction.
Incorrect Answers:
A: You should not look in the syslogs table in the database that you are trying to restore. In
previous versions of Microsoft SQL Server, the syslogs table allowed users to see the transactions
that were in the transaction log. After SQL Server 7.0, the syslogs table was not used. The syslogs
table cannot be used with SQL Server 2008 to find the most recent marked transactions.
B: You should not look in the logmarkhistory table in either the master database or the database
that you are trying to restore. The logmarkhistory table is kept in the msdb database.
D: You should not look in the logmarkhistory table in either the master database or the database
that you are trying to restore. The logmarkhistory table is kept in the msdb database.
m
backup performed from 08/23/2009 13:00DifferentialBackup2 - Differential Backup performed from
08/24/2009 01:00TransactionBackup7 - Transaction Log backup performed from 08/24/2009
.co
07:00TransactionBackup8 - Transaction Log backup performed from 08/24/2009 13:00
During the course of the day on 08/24/2009 you receive reports from employees all stating that
sts
errors are present in the CK_SALES database. You decided to check the log and notice the error
occurred at 05:42. CertKiller.com wants you to have the CK_SALES database restored to the
point of failure by selecting the order of the backup sets to restore.
lTe
A. You should consider creating a tail-log backup and restoring FullBackup2, DifferentialBackup2,
TransactionBackup7 and the tail-log backup.
B. You should consider creating a tail-log backup and restoring FullBackup2, TransactionBackup5,
Ac
Answer: A
What should you do? (Move the correct steps from the left column to the right column, and place
them in the correct order)
m
.co
sts
lTe
tua
Answer:
Ac
What should you do? (Click and drag the required steps from the left column in the correct order
on the column to the left)
m
.co
sts
lTe
tua
Ac
Answer:
m
QUESTION NO: 136
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
sts
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to ensure
lTe
that CERTKILLER-DB01 does not have Database Mail or SQL Mail enabled. You later use the
user named Rory Allen to create the policy by adding Rory Allen to the PolicyAdministrator Role
role. Rory Allen has later applied the policy to CERTKILLER-DB01. CertKiller.com wants to know
tua
in event of disk drive failures suffered on CERTKILLER-DB01 which database should be restored
from backup to restore the policy.
Ac
Answer: A
Explanation:
You should restore the msdb database to ensure that policies are applied after a disk in the server
has failed. Policies for Policy-Based Management are stored in the msdb database. You should
ensure that the msdb database is backed up on a regular basis. Besides policies for Policy-Based
Management, the msdb database stores jobs, operators, and alerts.
m
course of the day you discover that queries are slow and you think the problem is caused with the
spatial indexes. You later conclude that no physical corruption is evident and page-level
.co
checksums have not been turned off. CertKiller.com wants you to perform logical checks on the
spatial indexes.
sts
A. You should consider having the DBCC CHECKDB with the REPAIR_FAST option command
lTe
run.
B. You should consider having the DBCC CHECKDB with the REPAIR REBUILD Option
command run.
tua
C. You should consider having the DBCC CHECKDB with the ESTIMATEONLY Option command
run.
D. You should consider having the DBCC CHECKDB with the EXTENDED_LOGICAL_CHECKS
Ac
Answer: D
Explanation:
This option performs logical checks on an indexed view, XML indexes, and spatial indexes. You
would specify with extended_logical_checks only if you have the following issues:
In this scenario, you wanted to perform logical checks on the spatial indexes in the database.
Therefore, running DBCC CHECKDB with the extended_logical_checks option would be the best
m
QUESTION NO: 138
.co
CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use
of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts
CK_PRODUCTS.
lTe
CK_PRODUCTS contains two filegroups named Primary and FileGroup1 as shown in the exhibit:
tua
Ac
m
.co
sts
There are no tables spanning these two filegroups. You receive notification from the Sales
manager stating that an incorrect change was made to the Specifications table in FileGroup1. You
lTe
decide to restore CK_PRODUCTS from the backups two minutes prior to entering the wrong
specifications. CK_PRODUCTS is configured by default to make use of the full recovery model.
The transaction log backups are executed hourly and a full database backup is executed every
tua
evening.
A. Your best option would be to ensure that a restore is executed without recovery on the log
backups that were made since the last database backup.
B. Your best option would be to ensure that a restore is executed with recovery on the tail-log
backup.
C. Your best option would be to ensure that a restore is executed with recovery on the database
from the latest full database backup.
D. Your best option would be to ensure that transaction log is truncated.
E. Your best option would be to ensure that a restore is executed without recovery on KingGroup1
from the latest full database backup.
F. Your best option would be to ensure that a tail-log backup is made.
Answer: A,B,E,F
m
a consistent state.
Because the Specifications table is located on FileGroup1 and no tables span filegroups , it is not
.co
necessary to restore the entire database in order to expunge the incorrect change made to
Specifications. Each time a transaction log is backed up using the default settings, the inactive
sts
portion of the log is automatically truncated. Therefore, it is not necessary to truncate the
transaction log again.
lTe
which makes updates to the databases. You test the application and know some data would be
lost but you want to recover transactions the application has made. If a disaster should occur you
should be able to restore each of the databases to the same consistent point. The application
makes use of the script below:
CertKiller.com wants to know what should be done to recover transactions made by the
application in each database to a consistent point if the error occurs at 12:35 P.M.
A. You should consider having the database reverted with the database snapshot on each
database.
B. You should consider having the latest full backup restored on each database with the latest
differential backup, and the transaction log backups in order. You should then make use of the
recovery keyword and STOPMARK = 'UPDATE CK_PRODUCTS discount';
C. You should consider having the database restored with the latest full backup each transaction
log backup in order on each database. You should then have each database recovered by using
WITH RECOVERY.
m
D. You should consider having the latest full backup restored on each database followed by the
latest transaction log backup. You should then have each database recovered with RECOVERY.
Answer: B
.co
sts
Explanation:
You should restore the full backup, the latest differential backup, and the transaction log backups
in order on each database. You should also use the recovery keyword and stopmark = i update
lTe
CK_PRODUCTS discount' ; to bring both databases back to the same consistent point. These
actions will not recover each database to the point of failure, but will recover each database to the
marked transaction of updating the CK_PRODUCTS discount. Any committed changes after the
tua
marked transaction will not be restored. When using marked transactions in two related
databases, you should have full database backups with differential backups. You should mark a
transaction block in both databases. You can use the WITH mark keyword in your script. You
Ac
should back up the transaction log for both databases. You must restore the database backups
with norecovery , and restore the logs with stopatmark to return to the marked transaction.
Incorrect Answers:
A: You should not revert the databases using the database snapshot. This action will only restore
the database up to 12:30 P.M. In the scenario, the error occurred at 12:35 P.M. Reverting the
snapshot would not bring the database up to the point of failure. When you revert a database from
a snapshot, you break the log backup chain. The tail-log backup that you made is not usable when
reverting a database. You will have to take a full backup of the database before you can make a
log backup.
C: You should not restore the latest full backup, each differential backup, and the latest transaction
log backup on each database and recover each database with recovery. You should not recover
each differential backup. You should only restore the latest differential backup since the last full
backup.
D: You should not restore the latest full backup, restore each transaction log backup in order on
m
WITM MARK 'UPDATE Product Discount prices';
GO
UPDATE CK_Sales.Products SET Discount = Price * 0.95;
.co
GO
sts
CertKiller.com is aware that the CK_SALES database is set to use the full recovery model and that
the application updates the prices at noon. During the course of the day you discover that a error
has occurred in the CK_SALES database. CertKiller.com wants you to ensure that all data is
recovered up to point of failure.
Ac
A. You should consider having a tail-log backup created and restore the full backup with
norecovery.
You should then have the transaction log backups and tail-log backup restored with norecovery,
and recover the database with recovery.
B. You should consider having a tail-log backup created and revert the CK_SALES database
using the database snapshot.
You should then have the tail-log backup restored with RECOVERY and STOPATMARK.
C. You should consider having the full backup restored with norecovery and restore the
transaction log backup with recovery and stopatmark.
D. You should consider having the CK_SALES database reverted using the database snapshot.
Explanation:
You should do the following to ensure that all data is recovered up to the point of failure:
Create a tail-log backup.
Restore the full backup with norecovery .
Restore the transaction log backups with norecovery and restore the tail-log backup with recovery.
To restore the database to the point of failure, you must create a tail-log backup. A tail-log backup
contains all the transactions that have not been backed up since the last transaction log backup
was performed. After performing the tail-log backup, you should restore the full backup that was
taken at midnight using the norecovery keyword and restore the transaction log taken at 8 A.M.
with the norecovery keyword.
You should then restore the tail-log backup with the recovery keyword. You should use the
m
recovery keyword only after the latest full backup, the latest differential backup, the latest
transaction log backups, and the tail-log backup have all been restored in the proper sequence.
.co
The database recovery, however, should be performed using the recovery keyword to ensure that
data can be rolled back after the entire set of data has been restored.
Incorrect Answers:
sts
B: You should not create a tail-log backup, revert the Products database using the database
snapshot, and restore the tail-log backup with recovery and stopatMark. When you revert a
database from a snapshot, you break the log backup chain. The tail-log backup that you made is
lTe
not usable when reverting a database. You will have to take a full backup of the database before
you can make a log backup.
C: You should not restore the full backup with norecovery and restore the transaction log backup
tua
with recovery and stopatMark. This action will not recover the database to the application update
performed at noon. The stopatMark keyword is used to recover a marked transaction. The script
used to update retail prices contains with mark 'update Product Discount prices'. This action will
Ac
only recover the database to the previous time that the application ran an update. Because the last
transaction log backup was taken at 8 P.M., it would not contain the update that was done at noon,
or restore data changes that were performed after noon.
D: You should not revert the Products database using the database snapshot. This action will only
restore the database up to noon. In the scenario, the error occurred sometime after noon.
Reverting the snapshot would not bring the database up to the point of failure.
CertKiller.com recently finished and application which updates the data in the database. You have
later discovered checking the logs that the application has added corrupt data in the database at
3:15 A.M. You decided to restore the database using the statement below:
m
RESTORE LOG CK_SALES
FROM CK_SalesBackups WITH RECOVERY,
STOPBEFOREMARK = 'Jun 14, 2009 3:15 AM' .co
C. You should consider making use of the restore statement below:
RESTORE LOG CK_SALES
sts
FROM CK_SalesBackups WITH RECOVERY,
STOPAT = 'Jun 14, 2009 3:15 AM';
D. You should consider making use of the restore statement below:
lTe
Answer: C
Ac
Explanation:
To restore a database, you should restore the latest full backup, restore the latest differential
backup, and then the transaction log backups after the latest differential backup. You must use the
recovery keyword with restore log statement. This keyword is used to ensure that data can be
rolled back after the entire set of data has been restored. The stop AT keyword allows a point in
time restore to an exact time. In this scenario, the restore is to June 14, 2009 at 3:15 A.M. You
should restore the each transaction log backup transaction after midnight with the stop at keyword.
You should also issue the restore database CK_SALES WITH RECOVERY to complete the
restore process.
Incorrect Answers:
A: You should not use the STOPATMARK keyword. This keyword can restore a database to a
marked transaction. This keyword accepts a mark name, not a date and time. You can use an
optional after <datetime> clause that will allow the STOPATMARK or STOPBEFOREMARK
keyword to accept a date. If you do not use the AFTER <datetime> clause, you can only use a
m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_PRODUCTS which is configured to use the full recovery model. CertKiller.com currently
possesses full backups and multiple log backups of the CK_PRODUCTS database. The
CK_PRODUCTS database has several file groups shown in the exhibit below:
sts
lTe
tua
Ac
m
F. You would be required to indicate the partial option in the restore database option.
You must have a full database backup that contains the primary filegroup . You do not require a
single backup that contains all filegroups .
You must specify the time in which you want to restore to in the partial restore sequences.
Ac
Incorrect Answers:
A: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you
must restore the Primary filegroup first. The sequence order of restoration of the filegroups is
important. You should restore the more important filegroups first. Read-only filegroups need to be
restored should be restored last because their data is static.
B: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you
must restore the Primary filegroup first. The sequence order of restoration of the filegroups is
important. You should restore the more important filegroups first. Read-only filegroups need to be
restored should be restored last because their data is static.
C: You do not have to restore all filegroups of the CK_PRODUCTS database. You do not have to
restore a read-only filegroup if the file that contains the filegroup is undamaged and consistent with
the database. In this scenario, FileGroup3 is undamaged and consistent with the CK_PRODUCTS
database.
D: You should restore the primary filegroup first; the secondary filegroups can be restored in the
m
ALTER TABLE Invoices
REBUILD PARTITION ALL WITH (DATA_COHPRESSION = PAGE ON PARTITIONS(1) );
B. You should consider running the statement:
ALTER TABLE Invoices
.co
REBUILD PARTITIONS WITH (DATA COMPRESSION = ROW);
sts
C. You should consider running the statement:
ALTER TABLE Invoices
REBUILD WITH (DATA_COHPRESSION = PAGE);
lTe
Answer: A
Explanation:
Ac
Page compression is usefully if the table stores reoccurring data. Page compression reduces data
redundancy in columns in multiple rows on a page. The redundant data is stored in on a single
page and then the data is referenced to multiple columns. By contrast, row compression reduces
the metadata overhead, uses variable-length storage format for numeric data types, and stores
fixed character strings by not storing the blank characters similar to the variable length format.
Incorrect Answers:
B: This statement is syntactically incorrect:
C: These statements apply data compression to a non-partitioned table. The Invoices table is a
partitioned table. You should use the rebuild partition keyword to compress a partitioned table.
Part 3: Design a recovery test plan (5 Questions)
D: These statements apply data compression to a non-partitioned table. The Invoices table is a
partitioned table. You should use the rebuild partition keyword to compress a partitioned table.
Part 3: Design a recovery test plan (5 Questions)
You work as a database administrator at CertKiller.com. You are responsible for administering the
SQL Server 2008 database servers.
You have finished configuring log shipping between a primary server and a secondary server. The
secondary database was configured in standby mode. You need to determine what effect the
configuration will have on the secondary database.
A. It will result in employees being disconnected when the secondary database is in standby
mode.
B. It will result in employees being unable run any queries on the secondary server.
m
C. It will result in transaction log restores not taking place on the secondary server.
D. It will result in the ability of configuring read-only queries on the secondary server.
Answer: D
.co
Explanation:
sts
The option stating that you will be able to configure read-only queries on the secondary server is
correct. When you configure the secondary database on the secondary server in standby mode,
lTe
you have the flexibility to shift the load of the read-only queries from the primary server to the
secondary server. This eases the load on the primary server. When you configure the database on
the secondary server in the standby mode, you can schedule users either to be disconnected or to
tua
be connected to the primary database only when there is no connection to the primary database.
The transaction log will be restored on the secondary server. If you choose to disconnect the
users, the users will be disconnected as soon as the restore of the transaction logs on the
secondary server is initiated.
Ac
Incorrect Answers:
A: The option stating that the users will always be disconnected when the secondary database is
in the standby mode is incorrect. The users are not able to connect to the database when it is in
the norecovery mode. In the standby mode, you can configure the users to be disconnected when
transaction logs are restored on the secondary server or wait for users to disconnect.
B: The option stating that the users will not be able to run any queries is incorrect. The users are
not able to run any queries when the database is in the norecovery mode. Users will be able to
perform queries on the secondary server when the secondary database is in STANDBY mode
.When you are backing up the transaction log on the secondary server, you should use the
norecovery mode. You need to back up the transaction logs using with norecovery from the
primary to the secondary server. When you back up the transaction logs from the primary server
using with norecovery, the database in the primary server goes into the restoring state. In this
state, the database is not available to users for updates.
CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use
of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_SALES.
The sales information of the company is located on CK_SALES. You receive an instruction from
the CIO to make sure that you are able to recover CK_SALES without any data loss exposure.
m
You thus need to devise a restore strategy that will accomplish this.
Answer: B,D,F
Ac
A. The recovery plan should have a RAID 1 volume tested and used that contains the operating
system.
B. The recovery plan should have a RAID 5 volume tested and used that contains the database
files.
"Pass Any Exam. Any Time." - www.actualtests.com 144
Microsoft 70-450: Practice Exam
C. The recovery plan should have a base-functionality script run.
D. The recovery plan should have the locations determined to store offsite backups.
E. The recovery plan should have a schedule created for overwriting backup media.
Answer: C,D,E
Explanation:
Your disaster recovery plan should include the following tasks:
Schedule for overwriting backup media
Determine locations to store offsite backups
Run a base-functionality script
There are number of items that should be included in your disaster recovery plan. You should
consider how long you will keep the media, how often you should overwrite the media, and where
to store the media. If you store the media offsite, you should also determine how long will it take to
m
retrieve the media and restore the data. Determining where you store this media could be a factor
in the time it takes to retrieve the data.
.co
You should always perform a restore of a database to test the backup sets and to test whether the
operator is skilled in performing a restore. You should also have a base-functionality script that
may execute insert, update, and delete statements or a batch of stored procedures to determine if
sts
everything is working correctly after a restore.
Incorrect Answers:
A: You should not test and use RAID-1 for the volume that has the operating system as part of a
lTe
disaster recovery plan. Using a RAID-1 can provide fault tolerance for the operating system if a
disk fails. RAID-1 is designed to prevent the server from stopping if a failure of a disk occurs. It
should be part of the design process, but not a part of the disaster recovery process.
tua
B: You should not test and use RAID-5 for the volume that contains the database files as part of a
disaster recovery plan. Using a RAID-5 can provide fault tolerance be supporting up to one drive
failure. RAID-5 should not be implemented for the drive that contains the transaction log files for a
Ac
database. RAID-5 is designed to prevent the server from stopping if a failure of a disk occurs. It
should be part of the design process, but not a part of the disaster recovery process.
A. You should consider making use of the restore verifyonly statement check the integrity of the
backup.
B. You should consider making use of the binary_checksum statement to on the backup device to
validate the checksum on the backup.
C. You should consider making use of the dbcc checkdb statement on the backup device to check
the integrity of the backup.
D. You should consider making use of the dbcc showcontig statement on the backup device to
check the integrity of the backup.
Answer: A
Explanation:
This statement can ensure the following conditions are met:
The backup set is complete.
m
Checksum is present on the media.
Volumes are all readable.
.co
The destination drive has sufficient space to restore.
sts
The restore verifyonly command does not guarantee that the data can be recovered. This
statement can be used to determine database integrity problems that could compromise the
backup set. Using the checksum keyword with your backup statement and using the restore
lTe
verifyonly statement to validate a backup increases the chances that your backup can be restored.
Incorrect Answers:
B: You should not use the binary_checksum statement to on the backup device to validate the
tua
checksum on the backup. This statement is used to check the checksum value for a row of a table.
It cannot be use to check the checksum of the backup media.
C: You should not use the dbcc checkdb statement. The dbcc checkdb statement is used to check
Ac
the integrity of a database and can be used on tables, indexes, and filegroups, but not on backup
devices.
D: You should not use the dbcc showcontig statement. The dbcc showcontig statement displays
fragmentation information for indexes and tables.
CertKiller.com wants you to plan for a disaster recovery by selecting what would be required to
restore the CK_DATA database should disaster strike.
A. You would require having a backup of the SSL certificate of the server.
B. You would require having the password for the media.
C. You would require having a backup of the certificate used to protect the database encryption
key.
D. You would require having the password for the account used for the SQL Server Agent service
m
E. You would require having access to CK_SALES.bak.
You should have access CK_Data.bak. This is the backup file for the database. It is imperative
tua
that you can access the backup file for the Sales database because without access to this file, the
database cannot be restored.
You should know the password to the media. The MEDIAPASSWORD keyword places a
Ac
password on the media to protect the media from being restored by rogue operators. However, a
rogue operator could use a password cracker to reveal the password for the media. The
MEDIAPASSWORD keyword is not a recommended way to secure your backup. Transparent
Data Encryption (TDE) is recommended by Microsoft to encrypt any backups of your database.
The MEDIAPASSWORD keyword will not be available in future versions of SQL Server 2008.
You should have a backup of the certificate used to protect the database encryption key as well as
a backup of the database. The backup of the database and the certificate should not be stored in
the same location for security reasons. If the certificate is lost, data on the encrypted backup will
not be decrypted, and thus will be unreadable.
Incorrect Answers:
A: You do not need to have a backup of the SSL certificate for the SQL server. The SSL certificate
can be used to have a SSL connection between a client and the SQL server, but you do not need
this certificate to restore a database.
D: You do not need the password for the SQL Server service or the SQL Server Agent service.
You later inspect the application used to update the database and discover that an invalid out-of-
range value were entered into the database by the network users based on column data type in
the tables in the CK_SALES database. You later come to the conclusion that the problem was not
m
caused by indexes in the database or hardware corruption. CertKiller.com wants you to find the
out-of-range values manually and modify them.
.co
What should you do?
sts
A. You should run the DBCC CHECKDB command with the EXTENDED_LOGICAL_CHECKS
Option.
B. You should run the DBCC CHECKDB command with the REPAIR_ALLOW_DATA_LOSS
lTe
Option.
C. You should run the DBCC CHECKDB command with the PHYSICAL_ONLY option.
D. You should run the DBCC CHECKDB command with the DATA_PURITY option.
tua
Answer: D
Explanation:
Ac
This option causes dbcc checkdb to check column values of tables to see if the data is out-of-
range or not valid. When a database is upgraded from a previous version of SQL Server, column-
value checks are not enabled by default. Because the Parts database used to be on a SQL Server
2000 server, you must run dbcc checkdb with the data_purity option to enable column-value
checks. Once dbcc checkdb with data_purity has been run error-free on the Paris database,
column-value integrity will be checked with dbcc checkdb .
You should not run dbcc checkdb with the extended_logical_checks option. This option performs
logical checks on an indexed view, XML indexes, and spatial indexes. You would specify with
extended_logical_checks only if you have the following issues:
Index problems that are not due to physical corruption
Disabled page-level checksums
Column-level hardware corruption
m
QUESTION NO: 150
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts
server. You have successfully configured log shipping with the monitor server and require
assigning the role of monitor server to another server removing the existing monitor server.
tua
A. You should consider having the new monitor server brought up and simply shut down the older
one.
Ac
B. You should consider having log shipping removed from the old monitor server first and then
configure the new monitor server with log shipping.
C. You should consider having the new server designated as the monitor server from the primary
server.
D. You should consider having the new server designated as the monitor server from the primary
and secondary servers.
Answer: B
Explanation:
To be able to configure a new server as the monitor server and remove the existing monitor
server, you will need to remove log shipping first from the existing monitor server, and then
reconfigure the new monitor server. This is the only method that can be used to change to a new
monitor server. After you configure log shipping with a monitor server, you cannot change the
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
.co
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day CertKiller.com planned using the
sys.server_event_notifications catalog to view and track server-scoped event notifications.
sts
Answer: D
Explanation:
Ac
When you execute a query for retrieving an event notification, the WMI Provider for Server Events
translates the query into another form, which is an event notification. The event notification is
created in the master database, which is used only for server-scoped event notifications. You use
the sys.server_event_notifications view to view the event notifications in rows, where each row
represents an event notification.
Server-scoped event notifications are not stored in the model or tempdb databases, or in any
database other than the master database. The event notifications specific to database or object
are stored in the database that you have specified in the query. The model and tempdb databases
are never used for event notifications.
You work as a database administrator at CertKiller.com. You are responsible for administering a
database server named CERTKILLER-DB01 with a SQL Server 2008 instance.
You are in the process of using a transactional database on the instance. It is anticipated that the
transactional database will have a high volume of INSERT, UPDATE, and DELETE activities. The
activities encompass the creation of new tables.
You receive an instruction from management to optimize the performance of the database as well
m
as maximizing the disk bandwidth. You need to accomplish this by ensuring that the contention in
the storage allocation structures is minimized.
.co
What should you do?
sts
A. You should consider enabling Server Auditing.
B. You should consider using multiple data files for the database.
C. You should consider using row-level compression.
lTe
Answer: B
tua
You work as a database administrator at CertKiller.com. Your duties include administrating the
SQL Server 2008 infrastructure of CertKiller.com.
You receive a notification from management requesting capacity planning data. You thus decide to
implement a long-term infrastructure monitoring strategy. You need to determine the tasks you
need to include in the design.
A. You should consider deploying the production databases after base lining the system.
B. You should consider using database snapshot.
C. You should consider setting the max worker threads.
D. You should consider creating a new Database profile.
Answer: A,E
CertKiller.com has employed you as a database administrator. You are responsible for
administering the SQL Server 2008 infrastructure.
During routine maintenance you discover that the instance is experiencing poor performance due
to excessive CPU usage, server processes paging as well as deadlocks. You receive an
instruction from the CIO to design a monitoring solution that will:Supply information including
detailed deadlock informationMonitor and troubleshoot performance issues.
m
You need to design this solution with the least amount of administrative effort.
Answer: C
tua
CertKiller.com has employed you as a database administrator. You are responsible for
Ac
You decide to implement a monitoring solution plan for the instance. You want to monitor the
object usage statistics. Your solution needs to identify a list of at least 15 objects for the
subsequent components:Stored procedures and functions that are often performed.Transact-SQL
statements that is long running.
Management wants you to use the monitoring solution plan in order to decrease the performance
effect. You need to accomplish this with the minimum amount of administrative effort.
Answer: D
m
You thus decide to implement a performance monitoring strategy plan. This plan will capture and
.co
store the subsequent information:The executed Transact-SQL statements as well as query
activity.Blocking and deadlock data.The counters for memory, disk and CPU.
sts
To ensure productivity you need to use the monitoring process. You need to accomplish this with
the least amount of administrative effort.
lTe
A. You should consider using the Background Intelligent Transfer Service (BITS).
tua
Answer: B
CertKiller.com has hired you as a database administrator for their network. The CertKiller.com
network contains four SQL servers that are configured to run SQL Server 2008.
You receive an instruction from the CIO to configure one of the SQL servers named
CERTKILLER-DB01 as a Central Management Server. CERTKILLER-DB01 will administer the
other SQL servers on the company network. You then create a server group on CERTKILLER-
DB01 that will contain the other SQL servers in order to manage them. You require data about the
memory and CPU from members of the server group. You need to determine a way to retrieve this
data.
"Pass Any Exam. Any Time." - www.actualtests.com 153
Microsoft 70-450: Practice Exam
Answer: A,D
Explanation:
Central Management Servers allow you to administer multiple servers simultaneously. The Central
Management Server uses server groups to maintain connection information for one or more
instances of SQL Server. You can use Transact-SQL statements or Policy-Based Management
policies to administer servers in server groups. After you configure a Central Management Server,
you can create a query to display the resource usage, such as CPU and memory, on the servers
m
that are members of the server group.
Incorrect Answers:
.co
B: You cannot use rules or dimensions to administer servers in server groups by using Central
Management Servers. Rules are database objects that are bound to columns or alias data types,
sts
and specify which data values are acceptable in a column.
C: A dimension is a structural attribute of a cube, which is an organized hierarchy of categories
that describe data in the fact table.
lTe
You are employed as the database administrator at CertKiller.com. Your duties include managing
a SQL Server 2008 server that host a database named CK_SALES.
Ac
Employees in the sales department make use of CK_SALES to update sales records for online
clients. You need to be able to check the amount of employees who are connected to CK_SALES
at any given time. You decide to make use of System Monitor in conjunction with SQL Server
objects and counters in order to capture the current amount of users for performance
benchmarking. You need to determine a way to accomplish this.
Explanation:
Using this object, you can capture information on the number of current connections to the SQL
Server. You can also view the number of users who either connect or disconnect with the SQL
Server instance. The connections and disconnections are displayed on per second basis. In this
scenario, you would use the User Connections counter to view the current number of users
connected an instance of SQL Server. Along with this counter, there are other counters available
with this object. These counters are Temp Tables for Destruction, Transactions, Active Temp
Tables, Connection resets/sec, and Logins/sec.
Incorrect Answers:
A: You should not use SQL Server: Workload Group Stats object to view the current number of
users. This object contains counters that monitor the performance of the Resource Governor
workload group. However, this object cannot be used for monitoring the current number of
connected users to an instance of SQL Server.
m
B: You should not use SQL Server: SQL Statistics object to view the current number of users. This
object contains counters used for monitoring compilation and recompilations of user queries sent
.co
to an instance of SQL Server. However, this object cannot be used for monitoring the current
number of connected users to an instance of SQL Server.
D: You should not use SQL Server: Databases object to view the current number of users. This
sts
object contains counters that help you monitor backup/restore throughput, transaction log
activities, and bulk copy operations. However, this object cannot be used for monitoring the
current number of users connected to an instance of SQL Server.
lTe
tua
During routine monitoring you discover that numerous high-priority applications performs poorly
when they are run simultaneously with low-priority resource-intensive applications on
CERTKILLER-DB01. In order to solve the error you decide to make use of the Resource
Governor. You thus need to determine what percentage of the processor is used by a particular
group of applications.
A. You should look at the SQL Server:Workload Group Statistics in System Monitor.
B. You should look at the SQL Server:SQL Statistics in System Monitor.
C. You should look at the SQL Server:General Statistics in System Monitor.
Answer: A
Explanation:
The SQL Server :Workload Group Statistics object allows you to look at various counters such as
CPU usage %. Max request cpu time, Max request memory grant (KB), and Query
optimizations/sec. You can apply these counters to the resource pools that you have defined in the
workload groups.
Incorrect Answers:
B: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL
Server:Exec Statistics objects. None of these objects allows you to apply the counters to an
instance of the resource pools that you have defined in the workload groups.
C: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL
Server:Exec Statistics objects. None of these objects allows you to apply the counters to an
m
instance of the resource pools that you have defined in the workload groups.
D: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL
.co
Server:Exec Statistics objects. None of these objects allows you to apply the counters to an
instance of the resource pools that you have defined in the workload groups.
sts
CK_SALES.
related errors. You decide to trace resource issues that are related to the disk I/O and memory.
You thus need to determine the appropriate System Data collection sets you should use.
A. Your best choice would be to use the Query Statistics collection set.
B. Your best choice would be to use the Disk Usage collection set.
C. Your best choice would be to use a combination of the Disk Usage and Server Activity
collection sets.
D. Your best choice would be to use the Server Activity collection set.
Answer: D
Explanation:
m
information on the databases hosted on the SQL Server 2008 system. The information gathered is
about the disk and the log usage on the SQL Server. You would use this collection set when you
.co
want to know how much a database and its related log files are growing on daily basis. The growth
is tracked in megabytes (MB) per day. There are two types of collection items in this collection set:
sts
Disk Usage - Data Files and Disk Usage - Log File. This collection set cannot gather information
related to disk I/O and memory.
C: You should not use a combination of the Disk Usage and Server Activity collection sets to solve
lTe
the problem stated in the scenario. You would not be able to use two collection sets in
combination. It is recommended that you use a specific collection set to solve a problem related to
one specific area in SQL Server performance. For instance, you can track the database growth
tua
The Sales department at CertKiller.com makes use of CK_SALES to accomplish their daily tasks.
You receive notification from the CIO to capture all events taking place on CERTKILLER-DB01 as
well as replaying a step-by-step analysis of the captured events. You thus need to determine the
most appropriate utility that will assist you in this task.
Answer: A
Explanation:
SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of
the SQL Server Database Engine or Analysis Service services. SQL Server Profiler allows you to
capture and save data about each event to a table or a file for analysis. You can also replay the
events captured by SQL Server Profiler to determine what exactly happened. You cannot use
System Monitor, Database Engine Tuning Advisor, or a Policy-Based Management policy for the
purpose stated in the scenario.
Incorrect Answers:
B: System Monitor is primarily used for monitoring resource usage associated with server
m
processes, but it does not allow you to replay captured events. Database Engine Tuning Advisor
allows you to analyze the performance effects of Transact-SQL statements executed against
databases you want to tune. .co
C: Policy-Based Management manages entities, such as databases or other SQL Server objects,
on an instance of SQL Server 2008.
sts
D: Database Engine Tuning Advisor provides recommendations to add, remove, or modify
indexes, indexed views, and partitions.
lTe
CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are
the administering SQL Server 2008 server named CERTKILLER-DB06.
Ac
You receive an instruction from the CIO to optimize the performance of CERTKILLER-DB06. You
need to gather data regarding the operating system-related memory usage of CERTKILLER-
DB06. You need to determine the suitable dynamic management views that will assist you to
accomplish the task.
Answer: A,C
m
regarding memory nodes and the amount of physical memory reserved by SQL Server.
.co
QUESTION NO: 163
sts
You receive an instruction from the CIO to test the SQL Server instance for memory leaks. You
tua
thus need to determine the appropriate dynamic management view you need to use to accomplish
this.
Answer: C
Explanation:
It also allows you to track memory objects allocated to the SQL Server 2008 instance. When
managing SQL Server, if there are performance issues related to memory, you can use this view
to locate any possible memory leaks that may be occurring.
Incorrect Answers:
CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for
m
administering a database server named CERTKILLER-DB01.
.co
You have received instruction from the CIO to test the Dedicated Administrator Connection (DAC)
connection with CERTKILLER-DB01. You need to determine the correct port DAC will it use by
default to connect to CERTKILLER-DB01.
sts
Answer: B
Ac
Explanation:
By default, DAC uses the Ioopback address, which is 127.0.0.1, along with port 1434. To initialize
DAC on the SQL Server, you should first use a client on the server itself. If you need to remotely
connect to the SQL Server instance using DAC, then you should run the sp_configure stored
procedure. This will enable DAC for the remote connections.
Incorrect Answers:
A: Port 1433 is the port on which SQL Server listens for client requests. This port is not used for
DAC connections.
C: Port 443 is the default SSL port. This port is not used for DAC connections.
D: Port 80 is the default HTTP port. This port is not used for DAC connections.
CertKiller.com has hired you as a database administrator for their network. You are responsible for
administering a Microsoft SQL Server 2008 server named CERTKILLER-DB01. CERTKILLER-
DB01 contains numerous databases that are accessed by aCertKiller.com users.
You receive numerous complaints from users regarding the poor performance of CERTKILLER-
DB01. You have a suspicion that the performance error is a result of deadlocks. You receive an
instruction from management to determine which transaction is causing the deadlocks. You decide
to collect the information regarding the deadlocks and save it in a file.
m
C. You should consider creating a SQL Server Profiler trace.
D. You should consider creating a Policy-based Management policy.
Answer: C
.co
Explanation:
sts
SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of
the SQL Server Database Engine or Analysis Service services. SQL Server Profiler allows you to
capture and save data about each event to a table or a file for analysis. You can also replay the
lTe
events captured by SQL Server Profiler to determine what exactly happened. To trace deadlock
events, you should add the Deadlock graph event class to a trace. To do this, you should create a
new trace by using SQL Server Profiler.
tua
Incorrect Answers:
A: You cannot create a new trace flag in SQL Server 2008. Trace flags typically diagnose
performance issues or debug stored procedures. Trace flags allow you to set particular
Ac
characteristics of a server on a temporary basis or to turn off specific behavior. SQL Server
contains some existing trace flags that can be used for this purpose. SQL Server 2008 does not
allow you to create new trace flags.
B: You should not create a System Monitor counter. System Monitor is primarily used for
monitoring resource usage associated with server processes. A System Monitor counter would not
allow you to capture information about deadlock events and save it in a table on the SQL server.
D: You should not create a Policy-Based Management policy because it cannot be used to collect
information about deadlock events and save it in a file. Policy-Based Management manages
entities, such as databases or other SQL Server objects, on an instance of SQL Server 2008.
CK_SALES is configured as a log shipping database. You have received instruction from the CIO
to create a maintenance plan in order to execute full backups, differential backups as well as
transaction log backups on CK_SALES. During routine monitoring you discover that log shipping
does not function properly on CK_SALES. To maintain productivity you need ensure that log
shipping functions properly.
A. This can be accomplished by ensuring that the database maintenance plan does not create
transaction log backups.
B. This can be accomplished by ensuring that the database maintenance plan does not create full
m
backups
C. This can be accomplished by rescheduling the backup job and alert job for log shipping
.co
D. This can be accomplished by rescheduling the copy job and restore job for log shipping
Answer: A
sts
Explanation:
In this scenario, if the maintenance plan and log shipping both attempt to create transaction log
lTe
backups of the Orders database, log shipping will not function correctly. You should only have the
maintenance plan create full backups and differential backups. You should use your log shipping
backup folder to archive the log backups. You should archive the logs to another media for long-
tua
term storage. You should also set the backup retention period to a longer time period to allow you
to store the log files.
Incorrect Answers:
Ac
B: You do not have to eliminate the full backups from the database maintenance plan. The conflict
is not caused by the full backup, but by the log shipping and maintenance plan trying to create log
backups of the same database.
C: You should not reschedule the any of the jobs for log shipping. When log shipping is
implemented, four jobs are needed: the backup job, copy job, restore job, and alert job. The
backup job performs the backup operation, logs history to the local server and the monitor server,
and removes old backup files and history information. The copy job resides on the secondary
server instance and copies the backup files from the primary server to the secondary server. The
restore job is created on the secondary server and restores the copied backup files to the
secondary databases. The alert job is created on the monitor server instance. This job raises
alerts for the primary and secondary databases when the backup and restore operations have not
completed successfully. Changing the schedule of these jobs will not fix the problem. The problem
is caused because the maintenance plan and log shipping are both attempting to create a
transaction log of the same database.
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.
.co
You have received instruction from the CIO to use the dbcc traceon 1222 command in order to
sts
enable a global trace. You enter command by omitting the -T parameter. You need to determine
what the result will be.
lTe
Answer: B
Explanation:
A trace flag can be either a session trace flag or a global trace flag. A session trace flag is active
for the current session only. A global trace flag is visible to every connection on the server. The -T
parameter applies only to a global trace flag. The trace flag will apply to the current session, but
not to any other sessions on the server.
To enable it globally, you should use the -T parameter at startup. You can also write a startup
script to apply the global trace flag. A trace flag can either be specific to a session or it can be a
global trace flag. A trace flag can be switched on or off by using the DBCC TRACEON and DBCC
TRACEOFF commands.
Incorrect Answers:
m
CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
.co
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for
administering a database server named CERTKILLER-DB01.
sts
You are in the process of monitoring the threads on CERTKILLER-DB01. You accomplish this
using the sys.dm_os_wait_stats view. You discover that there is a wait on the data packets. The
lTe
thread is also waiting for the query to end. You need to determine the type of wait that will illustrate
this.
tua
Answer: B
Explanation:
The CXPACKET wait occurs when there is a wait on the data packets and the thread is waiting for
the query to finish. This type of wait can be viewed using sys.dm_os_wait_stats view. To reduce
wait, you can either reduce the degree of parallelism, or use the MAXDOP query hint to limit the
number of processors used for the query.
Incorrect Answers:
A: The CHECKPOINT_QUEUE option is incorrect. This wait occurs when a checkpoint task is
made to wait for the next checkpoint request. The CHECKPOINT_QUEUE wait does not occur
when there is a wait on the data packets and the thread is waiting for the query to finish.
m
deadlocks that have occurred on CERTKILLER-DB01 whilst extracting the information to a
deadlock XML file.
.co
What should you do?
sts
A. You should consider making use of Dynamic management views.
B. You should consider making use of Database Engine Tuning Advisor.
C. You should consider making use of Performance Monitor.
lTe
Answer: D
tua
Explanation:
You should use the SQL Server Profiler to view deadlocks that have occurred on the server and to
extract the information to a deadlock XML file. You can use SQL Server Profiler to trace specific
Ac
events that take place in the database. To be able to capture a deadlock event, you need to add
the Deadlock graph event class to the trace that you use for tracking deadlock events. When you
add the Deadlock graph event, the information regarding the processes and objects in the
deadlock is added to the Text Data column. You can extract the XML document as a deadlock
XML document, which is . xdl file. You can then open the . xdl file in the SQL Server Management
Studio.
Incorrect Answers:
A: You should not use dynamic management views to view the deadlocks that have occurred on
the server. Dynamic management views are used for monitoring the health of a SQL Server and
its resources. You can also use dynamic management views to diagnose a variety of
performance-related issues that may arise while running the server.
B: You should not use Database Engine Tuning Advisor to view the deadlocks that have occurred
on the server. Database Engine Tuning Advisor is not meant to capture information on deadlocks.
m
to its clients due to an error. You have later created a Dedicated Administrator Connection with the
server and attempt to connect to CERTKILLER-DB01 from the SQL Server Management Studio
.co
Query Editor, but receive an error 17810. CertKiller.com wants you to resolve the error.
A. You should consider making use of the sqlcmd command-prompt utility to use DAC.
B. You should consider using port 80 as the default port.
lTe
Answer: C
Explanation:
Ac
There can only be one DAC connection to the SQL Server instance. Error 17810 occurs if you
attempt another connection when an existing connection is alive. You must disconnect the first
connection to be able to connect using DAC. With a single connection, this error does not occur.
You can connect either remotely or through the client on the server itself. If you want to connect
remotely, you must run the sp_configure procedure on the server to enable remote connections.
Also, anyone trying to establish a DAC connection must have the sqladmin permission on the SQL
Server.
Incorrect Answers:
A: You can use either the sqlcmd command-prompt utility or the SQL Server Management Studio
Query Editor to connect. It is not mandatory to connect using the sqlcmd command-prompt utility.
The error in this scenario does not relate to the command.
B: You should not use port 80 as the default port to resolve this problem. By default, DAC uses the
loopback address, which is 127.0.0.1, along with port 1434. To initialize DAC on the SQL Server,
m
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to lower the
.co
degree of parallelism after discovering a wait problem in the sys.dm_os_wait_stats view.
CertKiller.com wants you to identify which problem will be corrected taking the actions above?
sts
A. The CXPACKET problem will be corrected.
B. The CHECKPOINT_QUEUE problem will be corrected.
C. The CHKPT problem will be corrected.
lTe
Answer: A
tua
Explanation:
Lowering the degree of parallelism will affect the CXPACKET wait. This type of wait occurs when
there is a wait on the data packets and the thread is waiting for the query to finish. To be able to
Ac
reduce wait, you can either reduce the degree of parallelism or use the MAXDOP query hint to
limit the number of processors used for the query.
Incorrect Answers:
B: The option CHECKPOINT_QUEUE is incorrect. This wait occurs when the checkpoint task is
made to wait for the next checkpoint request. Lowering the degree of parallelism does not affect
this wait.
C: The CHKPT option is incorrect. CHKPT wait occurs when a SQL Server is starting up. CHKPT
informs the checkpoint thread to start during a SQL Server start. Lowering the degree of
parallelism does not affect this wait.
D: The EXCHANGE option is incorrect. This type of wait occurs in the query processor exchange
iterator when the synchronization phase of parallel queries is in process. Lowering the degree of
parallelism does not affect this wait.
A. The advantage of using a trace template is that you will be allowed to capture the same event
data each time.
B. The advantage of using a trace template is that you will be allowed to share the traces in a file.
m
C. The advantage of using a trace template is that you will be allowed to create a workload.
D. The advantage of using a trace template is that you will be allowed to capture events and
replay them later. .co
Answer: A
sts
Explanation:
The benefit of creating a trace template is that you will be able to capture the same event data
lTe
each time you use the template. When you define a trace template, you define trace definitions to
monitor for a specific event. With a template, you do not need to configure the trace definitions
repeatedly. The same template can be exported from one server and imported onto the other
tua
In SQL Server Profiler, you can have either a trace file or a trace template. The trace file contains
the captured trace data and the trace template contains consistent trace definitions that can be
used each time you run the template. SQL Server Profiler is typically used to trace specific events.
For instance, you can use SQL Server Profiler to view deadlocks that have occurred on the server
and extract the information to a deadlock XML file (. xdl ). You can use SQL Server Profiler to
trace specific events on the database that take place in the database.
Answer: B
m
Explanation:
You should generate a script to apply the recommendations, which can be done easily by
.co
exporting the script with the . sql extension. The same script can then be run on a database in
Query Editor. If you have a performance-related concern, you can use the Database Engine
sts
Tuning Advisor to recommend indexes for a single or multiple databases. The Database Engine
Tuning Advisor can work with different types of indexes, such as clustered or nonclustered . You
can also use the Database Engine Tuning Advisor to resolve unused or potential index issues.
lTe
Incorrect Answers:
A: You should not use dynamic management views. A number of dynamic management views or
functions are available to provide index status in a database. However, these views or functions
tua
do not provide recommendations and generate a script for applying the recommendations.
C: You should not use SQL Server Profiler because it does not provide recommendations on the
indexes in your database. It will also not be able to generate a script for the recommendations.
Ac
SQL Server Profiler is used for tracing certain events that take place within a database. An
example of such an event is login failures that may occur when connecting to a database.
D: You should not use SQL Query Analyzer because it no longer exists in SQL Server 2008. This
was part of the SQL Server 2000 or prior versions. From SQL Server 2005 onwards, it has been
replaced with SQL Server Management Studio.
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance.
Answer: D
m
CertKiller.com has employed you as a database administrator. You are responsible for
.co
administering the SQL Server 2008 infrastructure of the organization.
You receive an instruction from management to implement a maintenance strategy plan for a
sts
critical database that includes a table named CK_SALES. The maintenance strategy plan should
also include the index maintenance operations.
lTe
You consider the facts below prior to designing the strategy:The standard fragmentation for the
clustered index of the CK_SALES is less than 3 percent.New rows are added to CK_SALES
continuously.CK_SALES includes a column of the xml data type.CK_SALES is accessed
tua
continuously.
To ensure productivity you need to use strategy to make sure that the performance of the queries
Ac
A. You should consider having CK_SALES reorganizing by configuring the NTFS quotas.
B. You should consider stopping the clustered index of CK_SALES from reorganizing, scheduled
or rebuilding operations.
C. You should consider using the File Server Resource Manager (FSRM) on CK_SALES.
D. You should consider having the Storage Manager rebuilding montly.
Answer: B
CK_ PRODUCTS contains over three million rows and six columns with information for the year.
You receive an instruction from the CIO to replicate the information to numerous subscribers. You
decide to divide the table into multiple partitioned tables. You make use of transformable
subscriptions that exclude certain rows on a per subscriber basis to accomplish this. You need to
make sure that every table hold data for a specific quarter is included in a table.
m
D. You should consider using Normalization partitioning.
Answer: B .co
Explanation:
sts
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
able to split the table into fewer rows with the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
lTe
the same. You gain a performance benefit because you will have fewer rows to work with.
Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.
As an example, you can split the table into four different tables where each table represents data
tua
for a specific quarter for the year. However, in this type of partitioning, the number of columns
always remains the same across multiple tables.
Incorrect Answers:
Ac
A: In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
partitioning, the columns are divided among multiple tables with the same number of rows. Vertical
partitioning can be of two types:
C: In row splitting, fewer columns are retained, which means that each row contains a portion of
the logical row in the partitioned table. When you join the rows from the partitioned tables based
on a UNIQUE KEY column, it becomes the original row with the complete data.
D: In normalization, redundant columns are removed from the primary table and moved into
secondary tables. The redundant columns are then linked with the primary table using the primary
or foreign key.
CK_RESEARCH contains over four million rows and eight columns with information for one
annum. You receive an instruction from the CIO to replicate the information to numerous
subscribers. You decide to divide the table into multiple partitioned tables. You make use of
transformable subscriptions that exclude certain rows on a per subscriber basis to accomplish this.
You need to make sure that every table hold data for a specific quarter is included in a table.
m
D. You should consider using horizontal partitioning.
Answer: D .co
Explanation:
sts
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
able to split the table into fewer rows with the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
lTe
the same. You gain a performance benefit because you will have fewer rows to work with.
Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.
As an example, you can split the table into four different tables where each table represents data
tua
for a specific quarter for the year. However, in this type of partitioning, the number of columns
always remains the same across multiple tables.
Incorrect Answers:
Ac
A: In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
partitioning, the columns are divided among multiple tables with the same number of rows. Vertical
partitioning can be of two types:
B: In row splitting, fewer columns are retained, which means that each row contains a portion of
the logical row in the partitioned table. When you join the rows from the partitioned tables based
on a UNIQUE KEY column, it becomes the original row with the complete data.
C: In normalization, redundant columns are removed from the primary table and moved into
secondary tables. The redundant columns are then linked with the primary table using the primary
or foreign key.
A table in the database contains more than 6 million rows and 6 columns. You receive an
instruction from the CIO to replicate the data to a number of subscribers. You decide to partition
the information in a horizontal manner for a transformable subscription. You need to determine
how the subscribers will receive the subscription during the replication process.
A. It will result in the table having fewer rows and same amount of columns.
B. It will result in the table having same amount of columns and same amount of rows.
C. It will result in the table having same amount of rows but less columns.
D. It will result in the table having fewer columns and fewer rows.
m
Answer: A
Explanation:
.co
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
sts
able to split the table into fewer rows and the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
the same. You gain a performance benefit because you will have fewer rows to work with.
lTe
Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.
As an example, you can split the table into four different tables where each table represents data
for a specific quarter for the year. However, in this type of partitioning, the number of columns
tua
In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
Ac
partitioning, the columns are divided amongst multiple tables with the same number of rows.
Vertical partitioning can be of two types: normalization and row splitting. In normalization,
redundant columns are removed from the primary table and moved into secondary tables. The
redundant columns are then linked with the primary table using primary or foreign key. In row
splitting, fewer columns are retained, which means that each row contains a portion of the logical
row in the partitioned table. When you join the rows from the partitioned tables based on a
UNIQUE KEY column, it becomes the original row with the complete data. The remaining two
options are incorrect. They cannot be achieved by applying horizontal partitioning.
CertKiller.com has hired you as a database administrator for their network.. CertKiller.com
currently makes use of Microsoft SQL Server 2008 Enterprise Edition for hosting databases. You
You are in the process of creating a partition for a column named ItemID in the Items table that is
located in CK_ACCOUNTS. You decide to configure page partition on the partition. During routine
monitoring you discover that the performance of CERTKILLER-DB01 has degraded after page
compression was configured. You need to determine the dynamic management function you
should use in order to monitor the page compression statistics for the partition.
m
Answer: A
Explanation:
.co
SQL Server 2008 Enterprise and Developer editions allow you to configure compression for tables
sts
and indexes. The two types of data compression are row and page compression. When you have
configured partitions on a table or index, you can configure different types of compression for each
partition. You can use the data_compression parameter of the create table, create index , alter
lTe
table, and alter index Transact-SQL statements to configure data compression. The possible
values for this parameter are:
DATA_ COMPRESSION = { NONE | ROW | PAGE }
tua
Configuring row and page compression can affect the performance of your sever. When you
configure row and page compression, CPU utilization is increased, while I/O utilization and
memory utilization is decreased. You can query the sys.
Ac
You receive an instruction from the CIO to create a partitioned data warehouse fact table. Due to
the size of the table you need to store the information over a number of disks. CertKiller.com has
partitioning functions that split the tables horizontally based on the value in a particular column.
You need to make sure that the partitions are all compressed.
m
A. You should make use of ALTER TABLE and REBUILD PARTITION = 0.
B. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = 0.
.co
C. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = ALL.
D. You should make use of ALTER TABLE and REBUILD PARTITION = ALL.
sts
Answer: D
Explanation:
lTe
The alter table statement rebuilds one or all partitions. You can specify a single partition to rebuild,
or you can specify multiple partitions. If you specify rebuild partition = all, you can rebuild the table
on all partitions. The following code rebuilds all partitions for the Orders table on partitions.
tua
Partitions 1, 2 and 3 are rebuilt with page-level compression. Partitions 4, 5, and 6 are rebuilt with
row-level compression.
ALTER TABLE Orders REBUILD PARTITION = ALL WITH (DATA_COMPRESSION = PAGE
ON PARTITIONS (1 TO 3), DATA_COMPRESSION = ROW ON PARTITIONS (4 TO 6) )
Ac
In correct Answers:
A: You should not use the alter table statement and the rebuild partition = 0 option. The rebuild
partition option specifies the number of the partition to be rebuilt. The number of the partition
cannot be zero.
B, C: You should not use any option with the alter partition function statement. You can only
rebuild a partition for a table with the alter table statement, not the alter partition function
statement. Splits and merges are handled through the alter partition function statement.
During routine monitoring you discover that TESTDATA is experiencing high volumes of queries
and transactions that affect the performance of the processor. You send a proposal to
management outlining your plans to implement an incremental backup strategy for TESTDATA as
well as using backup compression. It is important that you make sure that the backup jobs have a
little effect on the performance of CERTKILLER-DB01.
m
A. This can be accomplished by using a resource-allocation policy.
.co
B. This can be accomplished by configure Background Intelligent Transfer Service (BITS) server
extensions.
C. This can be accomplished by configure the Distributed File System (DFS).
sts
D. This can be accomplished by ensuring that the Resource Governor is used.
Answer: D
lTe
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you discovered that the high-priority application used
with the database performs poorly when run at the same time with lower-priority resource intensive
applications on CERTKILLER-DB01. CertKiller.com wants you to configure the Resource
Governor.
Explanation:
You should perform the following steps in this order:
Create a resource pool.
Create a workload group.
Define a classifier function.
To control resources effectively, applications can be grouped by priority into resource pools using
the Resource Governor. Resource Governor must first be enabled. After the Resource Governor
has been enabled, you can create a resource pool to set limits on resource usage. You can then
limit the resource usage by application pool to prevent the lower-priority applications from taking
resources from high-priority applications.
You should create a workload group for the resource pool to specify limits and policies. After
creating the workload group, you should then create a classifier function. The classifier function
m
groups applications into workload groups so that limits can be applied to the workload groups for
their resource usage.
Incorrect Answers: .co
A: You should not create a trace log or a counter log. Trace logs and counter logs are not
configured in the Resource Governor.
sts
B: You should not create a trace log or a counter log. Trace logs and counter logs are not
configured in the Resource Governor.
C: You should not create a workload file. A workload file can be used by the database engine
lTe
tuning advisor to determine the usefulness of indexes. You do not need a workload file to
configure the Resource Governor. Part 3: Design policies by using Policy-Based Management (10
Questions)
tua
You have received instruction from the CIO to add the Policy-Based Management policies below
on CERTKILLER-DB01:All the tables in the user databases must have an index.All the stored
procedures in the user databases must begin with DS_Disabling Database Mail on CERTKILLER-
DB01.Only encrypted views must be created on the user databases.
It has come to your attention that transactional replication fails between CERTKILLER-DB01 and
several other SQL servers after the policies were implemented. You need to determine a way to
solve the problem.
A. You should consider disabling the policy that disables Database Mail on CERTKILLER-DB01.
B. You should consider disabling the policy that only permits encrypted views on the user
databases.
C. You should consider disabling the policy that indicates that the stored procedures in user
databases must begin with DS_.
D. You should consider disabling the policy that indicates that all tables in the user databases
must have an index.
Answer: D
Explanation:
When Policy-Based Management is applied on a SQL Server instance, the policies can affect the
functionality of the server. In this scenario, the policy that forces every table to have an index will
cause a problem with transactional replication. Transactional replication uses the systtanschemas
m
table. This table does not have an index. The policy that forces all tables to have an index will
conflict with the systranschemas table and cause transactional replication to fail. No other policies
will cause problems with transactional replication.
.co
Incorrect Answers:
sts
A: Disabling Database Mail will not cause transaction replication to fail. Transactional replication
relies on the publication database, distribution database, subscription database, and the log
reader agent. Database Mail is not a part of transactional replication.
lTe
B: Specifying that encrypted views must only be created in a database or specifying a stored
procedure must be named a certain way will not conflict with transactional replication. You can
replicate both views and stored procedures in transactional replication.
tua
C: Specifying that encrypted views must only be created in a database or specifying a stored
procedure must be named a certain way will not conflict with transactional replication. You can
replicate both views and stored procedures in transactional replication.
Ac
The branch offices of CertKiller.com store information regarding their clients in SQL Server 2008
databases. A CertKiller.com security policy states that client information stored across numerous
database instances should be security compliant. You make use of the Policy Based Management
feature to design a strategy for the custom policies that are in XML format.
You have to make sure that the strategy allows custom policies to be distributed to all instances
Answer: B
You work as a database administrator at CertKiller.com. Your duties include administering the
m
SQL Server 2008 infrastructure.
.co
You receive an instruction from management to enforce naming standards for the database
objects. You thus decide to implement a way to enforce naming standards. Due to the lack of staff
sts
you need to accomplish this with the least amount of programming and administrative efforts.
A. Your best option would be to execute the DBCC CHECKDB command on the SSMS.
B. Your best option would be to use the varbinary(MAX) data type with FILESTREAM storage of
tua
Answer: D
Due to company growth CertKiller.com acquired another company named Courseware Publishers.
Prior to acquiring the company you created a Policy-Based Management policy on CERTKILLER-
DB01. You receive an instruction from the CIO to apply the policy to the SQL 2008 servers in the
courseware.com domain.
A. This can be accomplished by evaluating the policy against all the instances of SQL Server in
the server group.
B. This can be accomplished by importing the policy to the courseware.com domain using the
Group Policy Management console.
C. This can be accomplished by creating a two-way trust between the courseware.com domain
and CertKiller.com domain.
D. This can be accomplished by creating a Central Management Server group that will include the
instances of the SQL Servers in the CertKiller.com domain as well as the courseware.com
domain.
E. This can be accomplished by forcing replication between the domains.
F. This can be accomplished by exporting the Policy-Based Management policy from
CERTKILLER-DB01 to an XML file.
m
G. This can be accomplished by creating a Central Management Server group that will hold the
instances of the SQL Servers in the courseware.com domain.
Answer: A,D,F
.co
Incorrect Answers:
sts
B: You should not use the Group Policy Management console to import the policy to the
courseware.com domain. A Policy-Based Management policy is not active directory based like a
group policy object (GPO). You should use the SQL Server Management Studio to import the
lTe
E: You do not have to create a two-way trust between the courseware.com domain and the
CertKiller.com domain and you do not have to force replication between the domains.
G: You should not create a Central Management Server group that contains only instances of the
Ac
SQL servers in the courseware.com domain. The Central Management Server group can contain
server instances from different domains or workgroups. You should have servers in both domains
in the Central Management Server group.
CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of Microsoft SQL Server 2008. You are responsible for administering a database
server named CERTKILLER-DB01.
You receive an instruction from the CIO to create a policy that requires all databases on
CERTKILLER-DB01 have the full recovery model and the Trustworthy property set. You decide to
create a condition for the Policy-Based Management policy.
Answer: D
Explanation:
The Database Options facet specifies options that can be set with the sp_dboptions stored
procedure as well as by configuring the Trustworthy property on the database and the recovery
m
model of the database.
Incorrect Answers:
.co
A: You should not use the Surface Area Configuration. This facet allows you to enable support for
the OPENROWSET and OPENDATASOURCE functions, CLR integration, Database Mail or SQL
sts
Mail, and the xp_cmdshell. The facet does not contain properties for the recovery model of the
database or the Trustworthy property of the database.
B: You should not use the Schema facet. This facet contains property for the name, ID, and owner
lTe
of the schema. The facet does not contain properties for the recovery model of the database or the
Trustworthy property of the database.
C: You should not use the Database Maintenance facet. This facet includes the property for the
tua
recovery model but does not allow you to set the Trustworthy property on the database.
Ac
A. Rory Allen should have the dc_admin role in the master database.
B. Rory Allen should have the dc_admin role in the msdb database.
Answer: D
Explanation:
Members of this role can create and test a policy for Policy-Based Management, as well as
perform all configuration and maintenance activities on Policy-Based Management policies and
the conditions associated with the polices.
Incorrect Answers:
A: You cannot add the user to the dc_admin role in the master database. The dc_admin role only
exists in the msdb database.
B: You should not add the user to the dc_admin role in the msdb database. Members of this role
can use, maintain, and administer the data collector for the SQL Server 2008 server instance. This
role cannot be used to manage policies in Policy-Based Management.
m
C: You cannot add the user to the PolicyAdministratorRole role in the master database. The
PolicyAdministratorRole role only exists in the msdb database, where policies are stored.
.co
QUESTION NO: 189
sts
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to enforce a
naming convention policy which has all tables beginning with the name CK and all views beginning
tua
You later made use of the Policy-Based Management for creating and testing a policy on
Ac
CERTKILLER-DB01. After testing the policy you decided to have the policy applied to
CERTKILLER-DB01 and new servers CERTKILLER-DB02, CERTKILLER-DB03 and
CERTKILLER-DB04. CertKiller.com wants you to ensure that the naming convention policy from
CERTKILLER-DB01 applies to all the database servers by taking the action below:
You have set CERTKILLER-DB01 as the Central Management Server.You have added
CERTKILLER-DB02, CERTKILLER-DB03 and CERTKILLER-DB03 as part of the Central
Management Server group.
CertKiller.com additionally wants you to ensure that the policy applies to all SQL Servers.
A. You should consider having the policy exported from CERTKILLER-DB01 and use DFS to
replicate the policy file to every server in the group.
Answer: D
m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_SALES. CertKiller.com hires a new assistant administrator named Rory Allen to assist you.
You want to allow Rory Allen to be able to disable any Policy-Based Management policies that he
thinks should not be applied.
sts
A. You should consider having Rory Allen added to the db_owner role in the master database.
B. You should consider having Rory Allen added to the db_securityadmin role in the master
database.
tua
C. You should consider having Rory Allen added to the PolicyAdministratorRole in the msdb
database.
D. You should consider having Rory Allen added to the sysadmin role in the model database.
Ac
Answer: C
Explanation:
A member of the PolicyAdministratorRole role can create, enable, and disable Policy-Based
Management policies on the SQL server.
Incorrect Answers:
A: The db_owner role specifies the owner of the database. Making a user a member of the
db_owner role will not give a user the ability to add, create, enable, or disable Policy-Based
Management policies. The user needs to be a member of the PolicyAdministratorRole to perform
this function.
B: Members of the db_securityadmin role can modify database role memberships and manage
permissions. This role does not give a user the ability to add, create, enable, or disable Policy-
Based Management policies.
D: Members of the sysadmin role have full access to all system and user databases. This role is a
"Pass Any Exam. Any Time." - www.actualtests.com 183
Microsoft 70-450: Practice Exam
server role and not a database role. Also, there is not a sysadmin role in the model database. This
role is only on the server.
A. You should consider having a facet created that uses the Surface Area Configuration condition.
m
B. You should consider having the expression as @DatabaseMailEnabled=False set in the facet.
C. You should consider having a policy named DBMail created to include the RestrictDBmail facet.
.co
D. You should consider having the expression as @DatabaseMailEnabled=True set in the
condition.
E. You should consider having a policy named DBMail created to include the RestrictDBmail
sts
condition.
F. You should consider having a condition created that uses the Surface Area Configuration facet.
lTe
Answer: D,E,F
Explanation:
tua
You should use the Surface Area Configuration facet to configure whether database mail is
enabled. You should specify the condition to use the Surface Area Configuration facet. In the
following example, the RestrictDBmail condition uses the Surface Area Configuration facet and
forces Database Mail to be disabled on a server.
Once the RestrictDBmail condition has been created, you can create a policy to use the condition.
The following screenshot shows a policy named DBMail using the condition of RestrictDBmail .
There is no server restriction set on the policy.
Incorrect Answers:
A: You should not create a facet that uses the Surface Area Configuration condition. You create
conditions from facets. You do not create a facet from a condition.
B: You should not set the expression as @DatabaseMailEnabled=False in the facet. In the
m
be implemented and should take effect immediately. You decide to complete the tasks listed
below:
.co
You have decided to create a condition called CK_Table which includes the facet of Multipart
Name with the expression of @Name like 'CK_'.You additionally decided to create a condition
called CK_DATA Database which includes the facet of Database with the expression of
sts
@Name='CK_DATA'.
lTe
You have created the policy named CK_DATA names which included both of the conditions.
CertKiller.com wants you to decide which execution mode should be set.
tua
Answer: B
Explanation:
You can specify the execution mode of a policy as follows:
On Demand: When you choose this execution mode, the policy will be evaluated when the user
manually runs the policy. Except for this policy execution mode, all other policy execution modes
are automated.
On Schedule: Choosing this execution mode allows you to define a schedule when the policy will
be evaluated automatically. The automatic evaluation of the policy is carried out by a SQL Server
Agent job. This mode is an automated mode and logs any violations of the policy in the Windows
Event log.
In this scenario, the evaluation mode of On Change -Prevent will create a database trigger on the
CK_DATA database to prevent a table from being named anything that does not begin with 'CK_'.
Incorrect Answers:
A: You cannot specify the evaluation mode Now. This is not a valid evaluation mode.
C: The On Demand evaluation mode will result in an error stating "Exception of
type'Microsoft.SqlServer.Management.Dmf.ConflictingPropertyValuesException' was thrown.
Execution Mode 'On Demand' does not support Enabled 'True'".
D: The On Schedule evaluation mode requires that a schedule should be defined. In this scenario,
you wanted the policy to be applied immediately and not on a schedule. Part 4: Design a data
m
compression (6 Questions)
.co
QUESTION NO: 193
sts
You are the newly appointed database administrator at CertKiller.com. Your job function includes
administering a SQL Server 2008 instance.
lTe
You deploy a new database named CK_RESEARCH that will be used to administer large
documents. These documents will be revised from time to time. You receive an instruction from
tua
the CIO to implement a table structure that will enable fast read access. It is important that you
reduce the storage space requirement.
Answer: B,C
CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are
the administrating a SQL Server 2008 infrastructure.
An instance on the infrastructure contains a database. The database in turn includes a table
named KINGDATA which has a column named CK_SALES. Microsoft Office Word 2003
documents is stored in CK_SALES. Management wants you to decrease the space taken by
CK_SALES. However, average performance is needed sot be kept when the CertKiller.com users
retrieve the data in the column.
m
Answer: B
You partition this table into four equal parts. During routine monitoring you discover that:The first
partition is hardly ever queried.The second partition is hardly ever queried.The third partition is
tua
often queried by several reports.The fourth partition is heavily queried and repeatedly modified
You have received instruction from the CIO to minimize the disk space of the table. You have to
Ac
make sure that this action does not have a great impact on the query performance.
A. Your best option would be to use the Database Engine Tuning Advisor tool.
B. Your best option would be to use the Windows System Monitoring tool.
C. Your best option would be to enable individual node.
D. Your best option would be for the first two partitions to enable PAGE compression.
E. Your best option would be for the third partition to enable ROW compression.
Answer: D,E
A. You should consider making use of row-level compression on the document table.
B. You should consider making use of the varbinary(MAX) data type with FILESTREAM storage.
C. You should consider making use of row-level compression on all columns that use the
vardecimal() data type.
D. You should consider making use of the NTFS file system compression on the volume.
m
Answer: B,D
.co
QUESTION NO: 197
sts
You work as a database administrator at CertKiller.com. Your duties include administrating the
SQL Server 2008 infrastructure of the organization.
lTe
You are assigned a database server named CERTKILLER-DB06 with an instance that hosts a
database named CK_SALES. CK_SALES includes a table named Stock. At present DML
tua
statements on the last two months data is executed by the application queries. Administrative
audits on data older than two months are conducted on a monthly basis.
Ac
You receive an instruction from the CIO to ensure performance without affecting the performance
of CERTKILLER-DB06.
A. Your best option would be to use the sys.dm_exec_sessions dynamic management view.
Thereafter another table named StockHistory should be created for data older than two months.
B. Your best option would be to use the sys.dm_exec_requests dynamic management view
another table older than two months and shift the information.
Answer: D
m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_SALES. During the course of the day you receive instruction from CertKiller.com to implement
either row compression or page compression depending which method yields the most free space
recovered.
sts
sys.sp_clean_db_free_space.
C. You should consider making use of the stored procedure:
sys.sp_autostats.
Ac
Answer: A
Explanation:
This stored procedure can determine which level of compression will give you the most space
before actually implementing compression. You can also use the Data Compression Wizard in the
SQL Server Management studio.
Row compression does not take any disk space for zero or null values. It takes into account
variable data type structures in a row. Page compression looks at redundant data in one or many
rows on a given page. Page compression occurs when the page is full.
Incorrect Answers:
B: You should not use sys.sp_clean_db_free_space. This stored procedure removes residual
information left on database pages on a database when a data modification has been completed.
"Pass Any Exam. Any Time." - www.actualtests.com 189
Microsoft 70-450: Practice Exam
This stored procedure is similar to sys.sp_clean_db_file_free_space, but it removes residual
information left on database pages for the entire database, not just a particular database file.
C: You should not use sys.sp_autostats. This stored procedure displays or changes the UPDATE
STATISTICS setting for an index or all indexes on a table.
D: You should not use sys.sp_clean_db_file_free_space. This stored procedure removes residual
information left on database pages on a database file when a data modification has been
completed. Part 5: Design a management automation strategy (4 Questions)
You work as a database administrator at CertKiller.com. Your duties include administrating a SQL
Server 2008 instance named CERTKILLER-DB01.
CERTKILLER-DB01 will be used to host the new database application. You are in the process of
m
implementing the security applications for the new database application. The CertKiller.com users
all have their own unique login to CERTKILLER-DB01. The database application will hold the
.co
stored procedures required to perform stored procedures in the MSDB database.
SQL Agent jobs will be scheduled by the stored procedures in the MSDB database. You have to
sts
make sure that the stored procedures is performed using the security context of the application
user.
lTe
A. This can be achieved by using the TRUSTWORTHY option on the new database.
tua
C. This can be achieved by setting the appropriate trace flags as a startup parameter in the MSDB
database.
D. This can be achieved by using varbinary(MAX) data type in the MSDB database.
Answer: A
You receive numerous complaints from CertKiller.com users regarding server's slow performance
after a process was implemented on the instance. You check whether there are any long running
Answer: B
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for managing a 32-bit
edition of SQL Server 2008
sts
You are in the process of executing a 32-bit package. To achieve this you make use of the
Execute Package Utility (dtexecui.exe). You need to use the same package on a 64-bit edition of
SQL Server 2008.
lTe
A. You should consider using the dtexec utility or the SQL Server Agent in order to run the
package.
B. You should consider upgrading the package to 64-bit thereafter you can run it using the
Execute Package Utility.
Ac
C. You should consider using the SQL Server Agent in order to run the package.
D. You should consider using the Execute Package Utility in order to run the package.
Answer: A
Explanation:
To execute the package on a 64-bit version of SQL Server 2008, you can use either the dtexec
utility or the SQL Server Agent. The SQL Server Agent is available in 64-bit editions of SQL Server
2008, but you must install Integration Services to have a 64-bit version of the dtexec utility.
Incorrect Answers:
B: You do not have to upgrade the package to 64-bit and run it using the Execute Package Utility.
This utility can run packages only in 32-bit mode. On a 64-bit version of SQL Server 2008, you can
run the package using either the dtexec utility or the SQL Server Agent.
C: You do not have to run the package using the SQL Server Agent only. You can also use the
m
What should you do?
.co
A. You should consider making use of Event Nitifications.
B. You should consider making use of sys.sp_cdc_enable_db stored procedure.
C. You should consider making use of DML triggers.
sts
D. You should consider making use of DDL triggers.
Answer: D
lTe
You are the newly appointed database administrator at CertKiller.com. CertKiller.com currently
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for
Ac
A CertKiller.com employee named Rory Allen works as an application developer. Rory Allen
creates the SQL Server 2008 Integration Services (SSIS) packages on the test server residing in
the Test Lab. The SQL Server 2008 Integration Services (SSIS) packages are in a shared project.
However, you need to use a fixed cache file on one of the packages. The packages will be
deployed to the production server as soon as the development is completed. You need to make
sure that Rory Allen is able to install the project to the production server.
A. Your best option would be to use the Hyper-V feature on the server and install the project.
B. Your best option would be to use the Windows Deployment Services (WDS) for all packages.
C. Your best option would be to use the Microsoft Multipath I/O to save the packages.
Answer: D
m
A. You should consider making use of the 32-bit version of the dtexec utility on CERTKILLER-
DB01. .co
B. You should consider having the package converted to 64-bit.
C. You should consider making use of the 32-bit runtime on the Execution options tab of the New
sts
Job Setup dialog box.
D. You should consider making use of the 32-bit Execution Package Utility.
lTe
Answer: A,C
Explanation:
To meet the required goal in the scenario, you can select Use 32 bit runtime on the Execution
tua
options tab of the New Job Step dialog box. Without enabling this option, you will not be able to
run the 32-bit package on a 64-bit edition of SQL Server 2008.
You also can use 32-bit version of the dtexec utility installed on CERTKILLER-DB01. For 32-bit
Ac
packages, you will need to install it using Client Tools or Business Intelligence Development
Studio when you are setting up SQL Server.
Incorrect Answers:
B: You do not have to convert the package to a 64-bit version. On a 64-bit version of SQL Server
2008, you can simply run the package in 32-bit mode by selecting the Use 32 bit runtime option on
the Execution options tab of the New Job Step dialog box.
D: You cannot select the 32-bit Execute Package Utility because it is available only in the 32-bit
version of SQL Server 2008. This utility would not be available on CERTKILLER-DB01 because it
is running the SQL Server 2008 64-bit edition. You could use the 32-bit Execute Package Utility
from a SQL Server instance that is using the 32-bit edition of SQL Server 2008.
Answer: A
m
Explanation:
When you attempt to execute a package and an error occurs, the OnError event handler will be
.co
triggered. An event handler is comprised of tasks and containers that form a sequence of
execution. If a specific event handler is defined for an event, such as OnError event handler for
sts
failure of execution of a package, a series of tasks are performed. You can use the OnError event
handler for logging the error condition that caused the package execution to fail. You can execute
OnError to detail the problems related to the package execution.
lTe
Incorrect Answers:
B: The Onlnformation event handler is an incorrect option. This type of event handler is executed
in the validation and execution stages of the package. This event handler is meant only to report
tua
D: The OnTaskFailed event handler is an incorrect option. This type of event handler is executed
when a task is failed. Part 2: Design a strategy to use linked servers (3 Questions)
CertKiller.com has hired you as a database administrator for their network. Your duties include
administering the SQL Server 2008 infrastructure as well as two instances named CK_PRODUCT
and CK_FINANCE.
CK_PRODUCT contains the Exams database and CK_FINANCE the Sales database. A
procedure in the Exams database starts a transaction. CertKiller.com is using a linked server to
update Exams.dbo.Order table as well as the Sales.dbo.OrderHistory table. You receive an
instruction from the CIO to make sure that a two-phase commit in used in the transaction.
A. This can be achieved by using the Windows System Resource Manager (WSRM) for
delegation.
B. This can be achieved by having a linked server configured in order to make use of distributed
transactions.
C. This can be achieved by using the VPN solution.
D. This can be achieved by using the Delegation of Control Wizard to enable the correct
transaction control.
Answer: B
m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you issue a begin distributed transaction statement on
sts
CERTKILLER-DB01. The session which is initiated connects with stored procedures located on
CERTKILLER-DB02 and CERTKILLER-DB03. CertKiller.com is aware that the stored procedure
on CERTKILLER-DB02 triggers a distributed query for CERTKILLER-DB04 and the stored
lTe
CertKiller.com wants to know which server is acting as the transaction originator in this scenario?
tua
A. CERTKILLER-DB04
B. CERTKILLER-DB03
C. CERTKILLER-DB05
Ac
D. CERTKILLER-DB02
E. CERTKILLER-DB01
Answer: E
Explanation:
In a distributed transaction scenario, any server that executes the query containing the begin
distributed transaction statement will be the transaction originator. The server issuing the begin
distributed transaction statement is always in command of the entire transaction. Upon the
completion of the transaction, which can be either a commit transaction or a rollback transaction,
the transaction originator uses Microsoft Distributed Transaction Coordinator (MS DTC) to
complete the transaction on all the servers that are involved in the transaction. A series of steps
are performed in the distributed transaction process. These steps are as follows:
In the initial stage, a Transact-SQL script or an application connect uses a statement, which is a
m
QUESTION NO: 208 CORRECT TEXT
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
sts
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
lTe
CK_SALES. During the course of the day you receive instruction from CertKiller.com to setup
multiple linked SQL Servers. CertKiller.com additionally requested that you initiate distributed
transactions making use of the linked servers.
tua
What should you do? (Click and drag the required steps from the left column in the correct order
on the column to the left)
Ac
CertKiller.com has employed you as a database administrator. You are responsible for
administering a SQL Server 2008 database server named CERTKILLER-DB01.
m
A. This can be accomplished by using the BULK INSERT command in multiple staging tables.
.co
Thereafter the partitions should be changed into CK_SALES.
B. This can be accomplished by create an ADMX file that should be used in CK_SALES and the
publication reinitialized.
sts
C. This can be accomplished by configuring the File Server Resource Manager (FSRM).
D. This can be accomplished by configuring the resource-allocation policy for process-based
management.
lTe
Answer: A
tua
The Tele-marketing team makes use of notebook computers to update customer orders in a local
database. You need to make sure that the local database is able to synchronize with
CK_MARKETING when the notebook computers connect to the London office. You decide to set
up the creation of a replication model that will be used to copy the local database to
CK_MARKETING.
You need to make sure that the replication model has the following criteria:The Tele-marketing
team must be able to synchronize data at scheduled times as well as on demand.The Tele-
marketing team must not be able to update confidential information.The model must be able to
You thus need to use the best type to replicate the information. This needs to be accomplished
with the least amount of development efforts.
A. You should consider using the LUN Management settings with the SSIS packages.
B. You should consider setting up the notebook computers as a subscriber and use merge
replication.
C. You should consider setting up caching on the shared folder.
D. You should consider using folder redirection with the notebook computers.
Answer: B
m
QUESTION NO: 211
.co
You work as a database administrator at CertKiller.com. You are responsible for administering
multiple SQL Server 2008 servers that hosts a multiple databases. These databases contain the
sts
networks critical information.
You receive the subsequent instructions from the CIO to:Configure replication whereby you are
lTe
able to send different updates to different subscribers at different locations.Replicate a certain set
of information to one subscriber as well as another set to another subscriber.Ensure that
subscribers are able to work offline and later synchronize the modifications with the publisher.
tua
You thus need to determine the appropriate replication type that will meet the requirements.
Ac
Answer: D
Explanation:
In this scenario, merge replication would be able to meet the required goal. You use merge
replication typically when you need to meet the following requirements:
Allow subscribers to modify information in an offline state and then replicate it back to the
publisher. A subscriber can also replicate information to other subscribers.
Provide data filtering. In data filtering, you can filter different updates to different subscribers at
m
subscribers to work offline and then replicate changes when they are back online. This replication
also does not have the flexibility to filter data during replication.
.co
C: You should not use peer-to-peer replication. This type of replication is typically used when you
need high availability and scalability. This type of replication does not have the ability to allow
sts
subscribers to work offline and then replicate changes when they are back online. This replication
also does not have the flexibility to filter data during replication.
lTe
CertKiller.com has hired you as a database administrator for their network. CertKiller.com has its
headquarters in Paris and branch offices in London, Berlin and Milan. All the servers in the
environment are configured to run Microsoft SQL Server 2008.
Ac
You have received instruction from the CIO to configure data replication. You need to make sure
that the data replication offers the network high availability and scalability with the minimum of
latency. You should thus determine the type of transactional replication that will accomplish this.
Answer: A
m
the replication. You use merge replication typically when you need information to be replicated to
users who are mobile and are not always connected to the SQL Server. You can also use this
.co
replication when there is a requirement of data filtering. In data filtering, you can filter different
updates to different Subscribers at different locations. In merge replication, data is replicated more
sts
frequently to the Subscriber and therefore requires high latency. Therefore, in this scenario, this
type of replication will not be useful.
D: You should not use snapshot replication. Snapshot replication is not a type of transactional
lTe
replication. This type of replication is used when you need to replicate large volume of information.
This type of replication will not be useful in this scenario because you need high availability and
scalability with minimal latency. Snapshot replication is very infrequent, which will not provide high
tua
availability and scalability because the changes are replicated rarely, and the replicated data may
be outdated. Therefore, this replication will not be suitable in this scenario.
Ac
You work as a database administrator at CertKiller.com. You are responsible for administering
numerous Microsoft SQL Server 2008 servers that hosts multiple databases.
The databases hold the companies critical information. You have received instruction from the CIO
to configure a replication solution for these servers in order to replicate database information to
each other. The replication solution should be configured so that the slightest change will trigger
instant replication to the replicated copy.
What should you do? Which replication strategy should you use in this situation?
Answer: D
Explanation:
You would typically use this type of replication when you need to propagate incremental changes
to from one server to another server immediately. As soon as a change occurs in a database, the
data is replicated to its partners. For instance, if there is a row value that changes multiple times,
every change will be replicated to its partner. In this type of replication, there are typically fewer
subscribers keeping the read-only copy of replicated data. This type of replication does not have
the ability to resolve conflicts during replication updates.
Incorrect Answers:
A: You should not use peer-to-peer replication. This type of replication is typically used when you
m
need high availability and scalability. This type of replication does not have the ability to replicate
all updates to its partners.
.co
B: You should not use merge replication. In this type of replication, only the last updated value will
be replicated to the partners. In merge replication, subscribers make changes to the data and later
synchronize the changes with the publisher. For instance, if there are ten value changes to a field
sts
in a row at the subscriber before synchronizing with the publisher, only the tenth value will be
replicated, not all ten values. Merge replication has the ability to resolve conflicts that may occur
during the replication. You use merge replication typically when you need information to be
lTe
replicated to users who are mobile and are not always connected to the SQL Server. You should
also use this replication when you need the ability to resolve conflicts that occur during replication.
C: You should not use snapshot replication. This type of replication is used when you need to
tua
replicate a large volume of information. This type of replication does not have the ability to
replicate all updates to its partners.
Ac
Answer: D
m
QUESTION NO: 215
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering multiple
sts
database servers hosting multiple databases containing company sensitive data. During the
course of the day you receive instruction from CertKiller.com to configure a replication solution for
the databases to replicate with each other. CertKiller.com wants to have the information replicated
lTe
so the smallest change will trigger immediate replication to the replicated copy.
Answer: D
Answer: B,D
Explanation:
Peer-to-peer transactional replication allows you insert, update, or delete data at any node in a
topology and have data changes propagated to the other nodes. Because you can change data at
any node, data changes at different nodes could conflict with each other. In SQL Server 2008,
peer-to-peer replication introduces the option to enable conflict detection across a peer-to-peer
topology. This option helps you prevent the issues that are caused by undetected conflicts. When
m
you enable conflict detection, a conflicting change is considered a critical error that causes the
Distribution Agent to fail. In the event of a conflict, the topology remains in an inconsistent state
.co
until the conflict is resolved and the data is made consistent across the topology. To use conflict
detection, all nodes must be running SQL Server 2008 or a later version, and detection must be
sts
enabled for all nodes. You can enable and disable detection in Management Studio either by using
the Subscription Options page of the Publication Properties dialog box or the Configure Topology
page of the Configure Peer-to-Peer Topology Wizard. You can also enable and disable conflict
lTe
Incorrect Answer:
A: The sp_help_peerconflictdetection stored procedure returns information about the conflict
detection settings for a publication that is involved in a peer-to-peer transactional replication
Ac
topology.
C: You cannot use the sp_addsubscriber stored procedure or the sp_help_peerconflictdetection
stored procedure because these stored procedures cannot be used to enable conflict detection.
The sp_addsubscriber stored procedure is used to add a new subscriber to a publisher, enabling it
to receive publications.