Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1Y0-972" Exam

yeah...its very easy to pass!!!!!!

 yeah...its very easy to pass!!!!!!
u must visit this site for success 
itcertkeys.com
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-450 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-450" Exam

Designing, Optimizing and Maintaining a Database Administrative Solution Using Microsoft SQL Server 2008

 Question 1.
You work as a database administrator at ABC.com. You are in the process of preparing the deployment of a new database that will have 45 gigabytes storage space for the transaction log file, and 280 gigabytes storage space for the database data file. There are approximately six 120 GB disk drives available for the database in the storage array. ABC.com contains a RAID controller that supports RAID levels 0, 1, 5 and 10. The disks are on the RAID controller. You have received an instruction from the CIO to make sure that the transaction log’s write performance runs at optimum. The CIO has also instructed you to make sure that in the event of a drive failure, the database and transaction log files are protected. To achieve this goal, you decide to configure a storage solution.

Which of the following actions should you take?

A. You should consider using a RAID 1 volume as well as a RAID 5 volume in your storage 
    configuration. 
B. You should consider using a RAID 1 volume as well as a RAID 10 volume in your storage  
    configuration.
C. You should consider using a RAID 3 volume as well as a RAID 5 volume in your storage  
    configuration.
D. You should consider using a RAID 1 volume as well as a RAID 3 volume in your storage  
    configuration.

Answer: A

Explanation:

Question 2.
You work as a database administrator at ABC.com. ABC.com has a database server named ABCDB04 with a SQL Server 2008 instance that includes an extensive mission-critical database that is constantly being used ABC-DB04 has a quad-core motherboard with four CPUs. When it is reported that ABC-DB04 often encounters CPU pressure, you receive an instruction from management to make sure that the accessible CPU cycles are not exhausted by online index rebuilds.

Which of the following actions should you take?

A. You should make use of the affinity I/O mask option.
B. You should make use of the optimize for ad hoc workloads option.
C. You should make use of the affinity mask option.
D. You should make use of the max degree of parallelism option.

Answer: D

Explanation:

Question 3.
You work as a database administrator at ABC.com. ABC.com has a database server named ABCDB01 with a SQL Server 2008 instance. During routine monitoring on ABC-DB01, you discover that the amount of CXPACKET waits experienced by the instance is low, while the amount of lazy writer waits is abundant. You have been instructed to enhance the operation of the instance to ensure productivity. 

Which of the following actions should you take?

A. You should consider setting up the Windows System Monitoring tool to better the performance.
B. You should consider setting up the Asynchronous database mirroring to better the  
    performance.
C. You should consider using the SQLAGENT.OUT log to better the performance.
D. You should consider setting up the software non-uniform memory access (soft-NUMA) to 
    better the performance.

Answer: D

Explanation:

Question 4.
You work as a database administrator at ABC.com. ABC.com has a database server named ABCDB01. ABC-DB01 is configured with 4 quad-core processors, 80 gigabytes of RAM, and multiple independent raid volumes. You are in the process of using a transactional database on the instance. It is anticipated that the transactional database will have a significant amount of INSERT, UPDATE, and DELETE activities, which incorporates the creation of new tables. You receive an instruction from management to minimize the contention in the storage allocation structures so that database performance is optimized, and the disk bandwidth maximized.

Which of the following actions should you take?

A. You should consider enabling Server Auditing.
B. You should consider using multiple data files for the database.
C. You should consider using row-level compression.
D. You should consider using the checksum page verify option.

Answer: B

Explanation:

Question 5.
You work as a database administrator at ABC.com. ABC.com has informed you that a new database, named ABCData, has to be installed on a SQL Server 2008 instance. ABCData is made up of several schemas, of which one will host a significant amount of read-only reference information. Information is regularly inserted and updated on ABCData. You have received instructions from the management to configure a physical database structure that enhances the backup operation.

Which of the following actions should you take?

A. This can be accomplished by using multiple filegroups and a single log file to set up the  
    database.
B. This can be accomplished by using caching on the multiple data files.
C. This can be accomplished by using multiple downstream servers to create the database.
D. This can be accomplished by using the Database Engine Tuning Advisor tool to create the  
    database.

Answer: A

Explanation:

Question 6.
You are the newly appointed database administrator at ABC.com. Your job function includes administering a SQL Server 2008 instance. You have recently implemented a database named ABCResearch that is employed to administer large documents. From time to time, modifications will be made to these documents. You receive instructions from the CIO to implement a table structure that will enable fast read access, and to reduce the capacity prerequisites for storage.

Which combination of the following actions should you take? (Choose all that apply.)

A. This can be accomplished by utilizing the resource-allocation policy for process-based  
    management.
B. This can be accomplished by utilizing the varbinary(MAX) data type with FILESTREAM 
    storage.
C. This can be accomplished by utilizing the NTFS file system compression on the volume.
D. This can be accomplished by utilizing caching on the shared folder.

Answer: B, C

Explanation:

Question 7.
You work as a database administrator at ABC.com. ABC.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named ABC-DB01, which has an instance that hosts a database named ABC_SALES. During the course of the day you receive instruction from ABC.com to administer the newly installed instance of SQL Server 2008 Reporting Services (SSRS). ABC.com wants you to plan and implement an authentication solution for SSRS reports, which makes use of SQL Server data connections. ABC.com wants you to make sure that the new instance communicates to all SSRS reports via the Kerberos authentication protocol.

Which of the following actions should you take?

A. You should consider having the named pipes protocol disabled.
B. You should consider having a service principal name (SPN) registered in the Active Directory  
    directory service for the new SSRS instance.
C. You should consider having the default Web site on the new instance configured to use the  
    Integrated Security type.
D. You should consider having the VIA protocol enabled.

Answer: B

Explanation:

Question 8.
You work as a database administrator at ABC.com. You are in the process of implementing security for a database application that will run on an SQL Server 2008 instance. The database 5
has a table that was created by running the following T-SQL code:
CREATE TABLE ABC_Staff
(
StaffID INT NOT NULL IDENTITY(1,1),
JobLevel INT NOT NULL,
Salary MONEY NOT NULL,
Commission VARBINARY(MAX) FILESTREAM
)
You have received instructions from the CIO to make sure that Commission column cannot be accessed by unauthorized users. You want to make sure that this column is a secure as possible.

What should you do?

A. This can be accomplished by ensuring that the Job Activity Monitor tool is utilized on all  
    columns in the database.
B. This can be accomplished by ensuring that the NTFS file system security is utilized and 
    Access of the database files is limited to the SQL Server 2008 Service account.
C. This can be accomplished by ensuring that the appropriate trace flags are utilized for the  
    database.
D. This can be accomplished by ensuring that the SQL Profiler trace is utilized.

Answer: B

Explanation:

Question 9.
You are employed as the database administrator at ABC.com. Your job function encompasses administering a SQL Server 2008 instance that hosts a database named ABC_SALES. ABC_SALES is used by a Web based application that manages an average of 600,000 transactions per hour. ABC_SALES contains a column, named ABCDATA, which stores classified information that is only used by the Web based application. You receive instructions from the CIO to make sure that the classified information is stored as securely as possible, and that the consumption of memory space and processor time is kept to a minimum.

Which of the following actions should you take?

A. You should consider making use of Database snapshot.
B. You should consider making use of the Internet Information Services.
C. You should consider making use of symmetric key encryption.
D. You should consider making use of Key Management Service (KMS).

Answer: C

Explanation:

Question 10.
You work as a database administrator at ABC.com. ABC.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named ABC-DB01 with an instance that hosts a database named ABC_SALES. During the course of the day you receive instruction from ABC.com to install a new database application, which will make use of SQL CLR integration to develop stored procedures, to the instance. ABC.com wants you to make sure that the EXTERNAL_ACCESS code access security settings are enabled for the application. You have also been informed that the application must be fully functional subsequent to the deployment.

Which of the following actions should you take?

A. You should consider having the peverify.exe utility used to confirm if the code meets the  
    Typesafety requirements.
B. You should consider registering the VPN solution for the installation.
C. You should consider using the File Server Resource Manager (FSRM) with static fields.
D. You should consider using the Windows System Resource Manager (WSRM) with read write 
    static fields.

Answer: A

Explanation:

Question 11.
ABC.com has hired you as a database administrator for their network. Your duties include administrating a SQL Server 2008 instance named ABC-DB01. You are currently configuring the requirements for a new database application’s security. The new database application is named TestAPP1, and makes use of a code segment that contains a method that is used to access the file system on a network file server. The code segment has a method that provides access to the registry on ABC-DB01, as well as a class definition that will make use of the public static fields. Furthermore, the code segment is applied as a single assembly that makes use of SQL CLR integration.

Which of the following actions should you take to make sure that the application is installed on ABC-DB01?

A. Your best option would be to replace the File Server Resource Manager (FSRM).
B. Your best option would be to replace the Distributed File System (DFS) role service.
C. Your best option would be to make use of the Database Engine Tuning Advisor tool for the  
    assembly.
D. Your best option would be to use public static read-only fields instead of public static fields.
    Thereafter the EXTERNAL_ACCESS code should be used to access security for the 
    assembly.

Answer: D

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.