You are on page 1of 54

Microsoft 70-432

70-432 TS: Microsoft SQL Server 2008 ,


Implementation and Maintenance
Practice Test
Version 10.1

Microsoft 70-432: Practice Exam


================================================================================
==========================
QUESTION NO: 1
You work as the network administrator at CertKiller.com. CertKiller.com has acqu
ired an
enterprise application that runs SQL Server 2008. The stored procedures that the
application uses
make use of the EXECUTE AS clause that makes use of the Microsoft Windows accoun
ts.
A new CertKiller.com security policy requires that all enterprise applications m
ust run under the
context of a service account. It is imperative that this account complies with t
he company policy
that states all accounts must have the least amount of privileges whilst allowin
g duties to be
carried out. Consequently this service account must have as little privileges as
possible. You have
received instructions to configure the SQL Server service to be used in a suitab
le context for the
installation of the new enterprise application.
What should you do?
A. You should
unt.
B. You should
ount.
C. You should
tor account.
D. You should
count.

consider running the SQL Server service under the domain user acco
consider running the SQL Server service under the local system acc
consider running the SQL Server service under the local Administra
consider running the SQL Server service under the local service ac

================================================================================
==========================
QUESTION NO: 2
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_DB. CK_
DB has
its data file and the transaction log file on drive D. You have received instruc
tions to move both the
data file and the transaction log file to drive G.
What should you do?
A. You should consider adding the following Transact-SQL statement:
ALTER DATABASE CK_DB SET RESTRICTED_USER WITH ROLLBACK_IMMEDIATE;
B. You should consider moving the data file and use the following Transact-SQL s
tatement:
ALTER DATABASE CK_DB MODIFY FILE(NAME = CK_DB_Data, FILENAME = mdf');
ALTER DATABASE CK_DB SET MULTI_USER;
C. You should consider adding the following Transact-SQL statement:
ALTER DATABASE CK_DB SET OFFLINE WITH ROLLBACK_IMMEDIATE;
ALTER DATABASE CK_DB mdf';

ALTER DATABASE CK_DB SET ONLINE;


D. You should consider moving the data file and then start the SQL Server servic
e with the
following Transact-SQL statement:
IEXEC sp_attach_single_file_db @dbname = N' CK_DB ',@physname = N'v:\SQLServer\
CK_DB_Data.mdf';
E. You should consider moving the data file and transaction log file and then st
art the SQL Server
service with the following Transact-SQL statement:
EXEC sp_attach_db @dbname = N' CK_DB ',@filename1 = N'G:\SQLServer\
CK_DB_Data.mdf',@filename2 = ldf';
F. You should consider moving the data file and transaction log file and then st
art the SQL Server
service with the following Transact-SQL statement:
EXEC sp_attach_db @dbname = N' CK_DB ',@filename1 = N'G:\SQLServer\
CK_DB_Data.mdf',@filename2 = N 'g:\SQLServer \CK_DB_log.ldf';
Explanation:
Incorrect answer:
"You should consider moving the data file and then start the SQL Server service
with the following
Transact-SQL statement: IEXEC sp_attach_single_file_db @ dbname = N' CK_DB ',@ p
hysname
= N'v :\ SQLServer \ CK_DB_Data.mdf';"
If you take a look at this, you are only attaching a single file, in this case t
he data file(. mdf ) and
from the'v:' Drive. So with this answer, we did not fulfill the requirements of
moving both data and
log from g:'.
Part 2, Configure SQL Server instances. (4 questions)
================================================================================
==========================
QUESTION NO: 3
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. Management wants the prefix usp_ on all instances using all userdefined stored
procedures; however, they do not want you to develop stored procedures which do
not include this
prefix.
What should you do?
A. You should consider using a method that will point to the stored procedure wh
ich is evaluated
on demand.
B. You should consider using a method that will point to the stored procedure wh
ich is evaluated
on change.
C. You should consider using a method where the condition targets point to the s
tored procedure
which is evaluated on demand.

D. You should consider using a method where the policy targets point to the stor
ed procedure
which is evaluated on demand.
================================================================================
==========================
QUESTION NO: 4
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instructions from management to allow the users
at
CertKiller.com on the SQL Server sample to use the OPENROWSET() function to sear
ch remote
information sources.
What should you do?
A. You should consider
ration.
B. You should consider
re configuration.
C. You should consider
tion.
D. You should consider
re configuration.

configuring the Transaction Logs for sp_configure configu


configuring the Ad Hoc Distributed Queries for sp_configu
configuring the router control for sp_configure configura
configuring the Ad Lib Distributed Queries for sp_configu

================================================================================
==========================
QUESTION NO: 5
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. Because of a new application, you installed a second SQL Server 2
008 instance
that will work with the new application. However, these two instances should be
functional with
their respective applications without changing the environment of the applicatio
n and with the
minimal amount of cost.
What should you do? (Each correct answer presents part of the solution. Choose T
WO.)
A. You should
r 2008.
B. You should
C. You should
8 instance.
D. You should
E. You should
nce.

consider changing the SQL Server 2000 application to use SQL Serve
consider installing the new SQL Server 2008 as a named instance.
consider changing the SQL Server 2000 instance to a SQL Server 200
consider setting set the new application to use the new instance.
consider modifying the SQL Server 2008 to run as the default insta

================================================================================
==========================
QUESTION NO: 6 CORRECT TEXT
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instruction from management to move a web appli

cation from
Microsoft SQL Server 2005 to Microsoft SQL Server 2008. Be reminded that when a
web
application is moved then the features will be stopped and you need to control t
he SQL Server
sample to remember the use of features.
What should you do?
================================================================================
==========================
QUESTION NO: 7
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_DB. Man
agement
wants CK_DB to have the following characteristics.
* I/O streaming access should be enabled on CK_DB.
* The data on CK_DB should be accessible to remote clients.
* Ensure that CK_DB is enabled.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

configuring
configuring
configuring
configuring

the
the
the
the

IIS
SQL
SQL
Web

Service.
Server service.
Server VSS Writer.
Service.

Explanation:
Part 4, Configure additional SQL Server components. (5 questions)
================================================================================
==========================
QUESTION NO: 8
You work as a database administrator at CertKiller.com. CertKiller.com is using
SQL Server 2008.
CertKiller.com contains a SQL Server 2008 server named CERTKILLER-DB04. CERTKILL
ERDB04
will be used to run the Reporting Services. However, the Reporting Services must
be able to
run the database backups and other maintenance job automatically. Because CertKi
ller.com has
no other SQL systems, you need to make use of the SQL's DNS name.
What should you do?
A. You should consider using the SQL Server Web Service and the Microsoft Distri
buted
Transaction Coordinator technology.
B. You should consider using the SQL Server Browser and the SQL Server Web Servi
ce
technology.
C. You should consider using the Microsoft Distributed Transaction Coordinator a
nd the SQL
Server Browser technology.
D. You should consider using the Internet Information Services and the Microsoft

Distributed
Transaction Coordinator technology.
================================================================================
==========================
QUESTION NO: 9
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 database that makes use of the Analysis Services and Reporting Services. Ho
wever,
installed components at CertKiller.com adhere to the CertKiller.com security pol
icy. You have
received instruction to ensure that you adhere to the CertKiller.com security po
licy.
What should you do?
A. You should consider changing the configuration of the SQL Server Best Practic
es Analyzer
(BPA) and assign the least amount of privilege.
B. You should consider changing the Default Resource Pool configuration file and
run it again.
C. You should consider developing a Transact-SQL script based on the sp_configur
e stored
procedure.
D. You should consider developing policies based on the security policy before a
pplying the
policies against a server group which contains the database servers which need t
o be set.
================================================================================
==========================
QUESTION NO: 10
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instructions to publish an instance of SQL Serv
er Reporting
Services (SSRS) that will keep the old information to the same machine, and as d
efault as
possible.
What should you do?
A. You should consider
and update the
SSRS instance.
B. You should consider
C. You should consider
.
D. You should consider
database.

using the Internet Information Services default Web site


using the Single mode and update the SSRS database.
using the http.sys listener and install the SSRS instance
using the SharePoint integrated mode and update the SSRS

================================================================================
==========================
QUESTION NO: 11
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server

2008 instance that contains a database named CK_Prod. CertKiller.com is using Mi


crosoft SQL
Server 2005 Analysis Services (SSAS) that is accessed by an Internet Information
Services
application by using anonymous access. However, management wants the SSAS sample
to be
processed by the application.
What should you do?
A. You should consider increasing a new Microsoft SQL Server 2005 Analysis Servi
ces (SSAS) to
the Security\ RequireClientAuthentication server configuration.
B. You should consider setting the Security\RequireServerAuthentication server c
onfiguration to
False.
C. You should consider setting the Security\RequireClientAuthentication server c
onfiguration to
False.
D. You should consider setting the Security\RequireServerAuthentication server c
onfiguration to
Default value.
================================================================================
==========================
QUESTION NO: 12
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2000 instance that contains a database named CK_DB1. One day you installed a SQL
Server
2008 instance for business. Management wants you to ensure that the third-party
applications can
run on both database instances with the minimum amount of administrative effort.
What should you do?
A. You should consider
the SQL Server
2008 instance.
B. You should consider
e new
application to utilize
C. You should consider
the new
application to utilize
D. You should consider
erver 2008.

updating the SQL Server 2000 instance application to use


installing SQL Server 2008 as a named instance and set th
the new instance.
installing SQL Server 2008 as a default instance and set
the new instance.
updating the SQL Server 2000 application to use the SQL S

Explanation:
Part 5, Implement database mail. (1 question)
================================================================================
==========================
QUESTION NO: 13
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You are busy with the setting of the Database Mail profile. You w

ant the Database


Mail profile to send reports to all of the users at CertKiller.com. You then use
the sp_send_dbmail
stored procedure to send reports during office hours. However, this method will
take its time to
send delivery reports to management. Furthermore, management wants the reports a
s soon as
possible.
What should you do?
A. You should consider changing the SMTP configurations.
B. You should consider increasing another SMTP account for the delivery reports.
C. You should consider setting a new Database Mail profile that will be used for
the delivery
reports to management.
D. You should consider changing the Database Mail system configurations.
Explanation:
Part 6, Configure full-text indexing. (2 questions)
================================================================================
==========================
QUESTION NO: 14
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_Prod wh
ich make
use of the Fulltext indexes. However, some of the records have the word 'root' i
n CK_Prod. This
causes the Fulltext index, when searching for the root word, an empty resultset.
You need to
include 'root' in the query that returned.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

adding a full-text index.


changing a full-text index.
rebooting the MSFTESQL services.
reproducing the full-text index.

================================================================================
==========================
QUESTION NO: 15
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod that has a table named CK_T
bl that
keeps data about the entire catalogue of products. The users at CertKiller.com s
earch CK_Tbl
which is based on the TestPro column. The TestPro column owns the NULL value for
the entire
catalogue except products such as Televisions. However, there is no index on the
TestPro column
presently. You have received instructions from management to ensure that queries
are performed

more efficiently while minimizing the effect your solution will have on the disk
space.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

developing
developing
developing
developing

a unique index on the TestPro column.


a default index on the TestPro column.
an un-cluttered index on the TestPro column.
a filtered index on the TestPro column.

================================================================================
==========================
QUESTION NO: 16
You work as a database administrator at CertKiller.com. The CertKiller.com netwo
rk contains a
SQL Server 2008 computer named CERTKILLER-DB01. CERTKILLER-DB01 needs the SQL
Server service and the SQL Server Agent service to start automatically. Besides
that, it should
also audit all user names and application names that access the system. Auditing
should be on
always and the result should be there for about a decade.
What should you do? (Choose TWO.)
A. You should consider setting the authentication mode to SQL Server and Windows
Authentication mode.
B. You should consider
ocedure.
C. You should consider
D. You should consider
rvice starts.
E. You should consider

create a SQL Server Agent job for the SQL Trace stored pr
disabling the C2 Audit Tracing setting.
configuring the job to start when the SQL Server Agent se
setting the Login auditing to log all logins as events.

================================================================================
==========================
QUESTION NO: 17
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance hosts quite a few applications. Furt
hermore, the
SerTest\Test account is used by the SQL Server Agent service. CertKiller.com als
o uses a file that
can be stored to a log server, by using a job named CK_MTest. However, CK_MTest
cannot
access the log server as it should. You then decide to set the service of SQL Se
rver Agent. You
need to ensure that the settings of the SQL Server Agent service can access the
entire log server.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

the
the
the
the

Remote Service account.


Domain service account.
Local Service account.
Domain account.

================================================================================

==========================
QUESTION NO: 18
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains SQL Server Agent jobs. Thes
e SQL
Server Agent jobs uses ten shared schedules that is used 24/7. You have received
instructions to
ensure that a job named CK_Tst does not execute on Sundays.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

deleting
creating
deleting
creating

the schedule from CK_Tst for Sundays.


another Tester schedule for CK_Tst for Sundays.
all the scheduled tasks for Sundays.
a separate schedule for Sundays.

================================================================================
==========================
QUESTION NO: 19
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You want the tasks in the database to have the following characte
ristics:
* Examining database integrity.
* Reproducing indexes.
* Stores a report to a text file.
You have received instructions to ensure that you could change the SQL Server in
stance in such a
way that an e-mail notification is sent to the developers when the maintenance p
lan could not run
normally.
What should you do?
A. You should consider disabling a fail-safe operator for the SQL Server Agent.
B. You should consider modifying the SQL Server Agent job so that it runs the da
tabase
maintenance plan to send e-mail notifications to the developers.
C. You should consider modifying the database maintenance plan to contain a Noti
fy Operator
task that will e-mail the proper developers.
D. You should consider enabling a fail-safe operator for the SQL Server Agent.
Explanation:
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains two SQL Server 2008 servers named CERTKIL
LER-DB1
and CERTKILLER-DB2. CERTKILLER-DB1 does the transaction log backups and CERTKILL
ERDB2
is to reset by using the SQL Server Surface Area Configuration. However one morn
ing you
notice that the CERTKILLER-DB2 did not run the maintenance tasks automatically.

What should you do?


A. You should consider resetting a full backup of the master database manually.
B. You should consider resetting the Web service to only grant access to an admi
nistrator.
C. You should consider resetting CERTKILLER-DB1 to use Windows Integrated authen
tication
exclusively.
D. You should consider resetting CERTKILLER-DB2 so that the SQL Server Agent ser
vice starts
automatically.
================================================================================
==========================
QUESTION NO: 20
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance has a stored procedure which runs a
database
maintenance process. You were instructed to develop a SQL Server Agent job which
implements
the stored procedure; however it should delete the job when it is finished.
What should you do?
A. You should consider developing an Alert that will be raised when the job comp
letes.
In addition you should also set the alert to call another job when activated.
B. You should consider developing a Transactions Log to run twice on a schedule.
C. You should consider developing a job that uses the automatically remove job o
ption.
D. You should consider developing a job which belongs to the Database Maintenanc
e category.
Explanation:
Part 2, Manage SQL Server Agent alerts. (0 questions)
Part 3, Manage SQL Server Agent operators. (1 question)
================================================================================
==========================
QUESTION NO: 21
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains a SQL Agent job that runs every 5 minutes
. CertKiller.com
also has a text file called CK_Tst.log on F: drive that logs all the information
of the job. One
morning during monitoring you notice the following:
* The SQL Server Agent job does not function
* The SQL Server Agent service does not execute.
You need to make sure why the SQL Server Agent service got lost.
What should you do?
A. You should consider checking the TRANSACTION log.
B. You should consider checking the SQLAGENT.OUT log.

C. You should consider checking the ERRORLOG log.


D. You should consider checking the VIEWDELETE log.
Explanation:
Part 4, Implement the declarative management framework (DMF). (1 question)
================================================================================
==========================
QUESTION NO: 22
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that has a table named CK_StockOnHand. CK_StockOnHand contains a c
olumn
named CK_Price. A new CertKiller.com policy states that the value in CK_Price ca
nnot be
decreased by more than 10 percent in any single database operation. However, ad
hoc queries
and various other methods are used to update CK_Price. You need to make sure tha
t the
CertKiller.com policy is being complied with.
What should you do?
A. You should consider developing
policy compliant
changes to CK_Price.
B. You should consider developing
icy compliant
changes to CK_Price.
C. You should consider developing
ller.com policy
compliant changes to CK_Price.
D. You should consider developing
contains valid
prices on CK_Price.

a trigger which rolls back non-CertKiller.com


a view which rolls back non-CertKiller.com pol
a stored procedure which rolls back non-CertKi
a primary key constraint to a table which only

Explanation:
Part 5, Back up a SQL Server environment. (1 question)
================================================================================
==========================
QUESTION NO: 23
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains a SQL Server 2008 server named CERTKILLER
-DB1.
There are also SQL Server Agent jobs on the server. Furthermore the database is
backed up at a
daily basis. One morning, the master database on CERTKILLER-DB2 went down. You t
hen
restore and rebuild the database. The CertKiller.com managers want CERTKILLER-DB
1 to work
as it was in the past.
What should you do?
A. You should consider rebuilding the entire SQL Server Web Service for the data

base.
B. You
.
C. You
D. You
users'

should consider reserving the model and master databases for the database
should consider reserving all the Transaction Logs for the database.
should consider starting from scratch and rebuilding the database of all
memories.

================================================================================
==========================
QUESTION NO: 24
You work as a database administrator at CertKiller.com. CertKiller.com is using
two SQL Server
2008 sample named CKSmp1 and CKSmp2. Furthermore, CKSmp1 contains a database nam
ed
CK_DB. A CertKiller.com user named Mia Hamm uses her name Mia to log on to the d
atabase on
CKSmp1. During the week you have transferred CK_DB to CKSmp2 with Mia Hamm crede
ntials.
However, when she tries to login on CK_DB at CKSmp2, she received an error messa
ge stating
that she is not allowed access. Mia Hamm needs to access CK_DB and you need to m
ake it
happen.
What should you do?
A. You should
CK_DB;
B. You should
'
UNLOCK;
C. You should
D. You should

consider using CK_DB and ALTER LOGIN Mia WITH DEFAULT_DATABASE =


consider using CK_DB and ALTER LOGIN Mia WITH PASSWORD = 'Re#99$45
consider the following: USE CK_DB and ALTER LOGIN Mia ENABLE.
consider using CK_DB and change USER Mia WITH LOGIN = Mia;

================================================================================
==========================
QUESTION NO: 25
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The a SQL Server 2008 instance is used on a Windows Server 2000 s
erver and
uses the mixed authentication mode. Management wants you to ensure the following
:
* SQL Server 2008 authenticated logins has the same password complexity rules wh
ich are
enforced by Windows Server 2000.
* Full compliance of all users with regarding to adhering to the password comple
xity rules.
What should you do? (Choose TWO)
A. You should consider using the ALTER LOGIN ... CHECK_EXPIRATION = OFF statemen
t to
change the entire login of all users.
B. You should consider using the ALTER LOGIN ... CHECK_POLICY = ON statement to
change
the entire login of all users.
C. You should consider using the ALTER LOGIN ... CHECK_POLICY = OFF statement to

change
the entire login of all users.
D. You should consider developing an SQL Server Agent job which implements to ra
ise an alert, if
triggered by a violation by any user.
Explanation:
Part 2, Manage users and database roles . (2 questions)
================================================================================
==========================
QUESTION NO: 26
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_DB that
contains a
table named CK_Tbl. CK_DB also contains a stored procedure named CK_Prod that us
es a
sp_executesql Transact-SQL statement to get data from CK_Tbl.
A new CertKiller.com security policy does not allow users to access tables direc
tly in any
database. If it does happened that a user runs ProcedureTest"Msg 229, Level 14,
State 5, Line 1,
it will give the following error.
The SELECT permission was denied on the object ' CK_Tbl', database ' CK_DB ', sc
hema 'dbo'."
You need to ensure that the users can run CK_Prod and still comply with the Cert
Killer.com
security policy.
What should you do?
A. You should consider
option
to its header.
B. You should consider
its
header.
C. You should consider
D. You should consider

modifying CK_Prod and increase the WITH EXECUTE AS OWNER


modifying CK_Prod and the WITH EXECUTE AS OWNER option to
running, GRANT SELECT ON dbo.Master'TO Clerk.
running, GRANT SELECT ON dbo.CK_Tbl'TO Clerk.

================================================================================
==========================
QUESTION NO: 27
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. During your leave, you have
given a
CertKiller.com user named Mia Hamm permission to keep the database snapshots. Yo
u need to
make sure that Mia Hamm has the appropriate rights assigned to remove database s
napshots.
What should you do?

A.
B.
C.
D.

You
You
You
You

should
should
should
should

allow
allow
allow
allow

Mia
Mia
Mia
Mia

Hamm
Hamm
Hamm
Hamm

to
to
to
to

use
use
use
use

UPDATE.
DROP DATABASE.
INSERT ANY DATASPACE.
RECREATE.

Explanation:
Part 3, Manage SQL Server instance permissions. (3 questions)
================================================================================
==========================
QUESTION NO: 28
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_Tester
that is used
by the CertKiller.com's developers. You need to allow the developers to access t
he SQL Server
Profiler to get traces which can be used to troubleshoot the application that CK
_Test uses.
What should you do?
A. You should consider making use of Transaction Logs to grant login access to t
he developers.
B. You should consider giving suitable server-level rights to the whole SQL Serv
er to grant login
access to the developers.
C. You should consider converting the database roles of the developers to a fixe
d database role.
D. You should consider giving suitable server-level rights to the default SQL Se
rver grant login
access to the developers.
================================================================================
==========================
QUESTION NO: 29
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instructions from management to configure the f
ollowing:
* The required permission for Clerk and other users at CertKiller.com.
You need to complete this task with the least amount of SQL administrative state
ments.
What should you do?
A. You should consider adding the following:
CREATE ROLE Developers;EXEC sp_addrolemember 'sp_dbdatareader', 'Developers';
EXEC sp_addrolemember 'sp_dbddladmin', 'Developers';
EXEC sp_addrolemember 'Developers', ' Clerk';
B. You should consider adding the following:
DROP ROLE Developers;GRANT VIEW DEFINITION TO Developers;
GRANT SELECT TO Developers;
EXEC sp_addrolemember 'Developers', 'Clerk ';
C. You should consider adding the following:
CREATE ROLE Developers;

GRANT VIEW DEFINITION TO Developers;


GRANT SELECT TO Developers;
EXEC sp_addrolemember 'Developers', 'Clerk ';
D. You should consider adding the following:
GRANT VIEW ANY DEFINITION TO 'Clerk;
EXEC sp_addrolemember 'db_datareader', 'Clerk ';
================================================================================
==========================
QUESTION NO: 30
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. A new CertKiller.com security policy requires allows members of a
Windows group
name CK_Prod to build new links to the SQL Server instance that should occurs be
tween the
business hours of 10:00 and 22:00. Furthermore, the other CertKiller.com users a
re not allowed to
connect the database at any time. At the bottom the Transact-SQL statements:
CREATE TABLE Security.RestrictedTester(
ProductID int NOT NULL IDENTITY(1,1),
GroupTest sysname NOT NULL,
RestrictedTesterTimeStart time NOT NULL,
RestrictedTesterTimeStop time NOT NULL,CONSTRAINT RestrictedTester _pk PRIMARY K
EY
CLUSTERED(Id));
INSERT INTO Security.RestrictedTester
(GroupTest,RestrictedTesterTimeStart,RestrictedTesterTimeStop)VALUES (' CK_Prod
',CAST('10:00' AS time),CAST('22:00' AS time));
You have received instructions from management to run the new CertKiller.com sec
urity policy
which is reserved in the RestrictedTester table.
What should you do?
A. You should consider developing a Microsoft SQL Server 2005 Reporting Services
(SSRS) that
will result in the SQL Server Windows service to stop during non-business hours.
B. You should consider developing a SQL Server Agent job that will result in the
SQL Server
Windows service to stop during non-business hours.
C. You should consider developing a logon trigger which could not permit the con
nection to
CK_Prod during non-business hours.
D. You should consider developing a Microsoft SQL Server 2005 Integration Servic
es (SSIS) that
will result in the SQL Server Windows service to stop during non-business hours.

Explanation:

Part 4, Manage database permissions. (1 question)


================================================================================
==========================
QUESTION NO: 31
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. CertKiller.com has a SQL S
erver login
named CK_Tst that maps to a CertKiller.com learner administrator named CK_ProdAp
p in
CK_Prod. You have received instruction from management that the CertKiller.com u
ser can to do
the following:
* That the entire stored procedures which at present exist in CK_Prod can be run
.
* That the entire stored procedures will be developed in CK_Prod can be run.
What should you do?
A. You
base.
B. You
C. You
D. You

should consider allowing the proper database-level rights to default data


should consider allowing the proper database-level rights to CK_Tst.
should consider allowing the proper database-level rights to CK_ProdApp.
should consider increasing a new role in the default domain group.

Explanation:
Part 5, Manage schema permissions and object permissions. (2 questions)
================================================================================
==========================
QUESTION NO: 32
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. CK_DB contains a table named
CK_Prod
where the Sales Product resides. You have received instruction to move CK_Prod'
test to a new
schema named CK_Tester. You need to complete this task using the appropriate Tra
nsact-SQL
statement.
What should you do?
A. You should consider adding the following:
ALTER TABLE Products. Test SWITCH TO CK_Tester.Table1;
B. You should consider adding the following:
ALTER AUTHORIZATION ON Products. Test TO CK_Tester;
C. You should consider adding the following:
ALTER USER Products WITH DEFAULT_SCHEMA = CK_Tester;
D. You should consider adding the following:
ALTER SCHEMA CK_Tester TRANSFER Products. Test
================================================================================
==========================
QUESTION NO: 33
You work as a database administrator at CertKiller.com. CertKiller.com is using

a SQL Server
2008 instance that contains a database named CK_Prod. CertKiller.com also has a
Windows
group named CertKiller\Managers that makes use of CK_Prod. Some of the users in
that group
are members for the db_owner role. However, one member in the CertKiller\Manager
s group
named Mia is not allowed to access the SQL Server instance. You have received in
structions from
the CEO to make sure that the Mia does not access the instance. You need to comp
lete this task
using the appropriate Transact-SQL statement.
What should you do?
A. You should consider using the following:
EXEC dbo.sp_droprolemember 'db_master', "CertKiller\Mia";
B. You should consider using the following:
DROP LOGIN "CertKiller\Mia";
C. You should consider using the following:
CREATE LOGIN "Mia\Mia" FROM Windows;DENY CONNECT SQL TO " Mia\Mia ";
D. You should consider using the following:
REMOVE LOGIN "CertKiller\Mia";
Explanation:
Part 6, Audit SQL Server instances. (3 questions)
================================================================================
==========================
QUESTION NO: 34
You work as a database administrator at CertKiller.com. CertKiller.com have 12 r
etail stores, each
store is equipped with their own SQL Server 2008 computer.
A database table named CK-Sales is used to store point-of-sale transactions. Fur
thermore, CKSales also hosts sales information from all 12 of the CertKiller.com stores to a
ccommodate
customer returns of products. Consequently the data should be refreshed from the
main office to
all 12 retail stores every hour, on the hour. To this end you make use of a trig
ger called
trg_Coupon to produce sales coupons based on customer sales and buying patterns.
Currently
replication between the server in each of the 12 retail stores and a middle serv
er in the main office
occurs in real time. You should receive instruction to eliminate this replicatio
n.
What should you do? (Each correct answer presents part of the solution. Choose T
WO.)
A. You should consider using multiple merge publications, one at every store and
one in the main
office.
B. You should consider using transactions log between all the servers in the Cer
tKiller.com
domain

C. You should consider using snapshot replication.


D. You should consider using merge replication.
E. You should consider setting the trg_Coupon trigger on the server in each reta
il store to use the
NOT FOR REPLICATION option.
F. You should consider setting the trg_Coupon trigger on the server in each reta
il store to use the
NOT FOR REPLICATION option.
================================================================================
==========================
QUESTION NO: 35
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains a SQL Agent job that contains a Windows P
owerShell job
step that uses the SQLCmd function to move data between servers. You need to ens
ure that an
operator named TestTeam is notified through an e-mail message if the job is lost
while being
moved between servers.
What should you do? (Each correct answer presents part of the solution. Choose T
WO.)
A. You
r.
B. You
tor.
C. You
or.
D. You
lure.
E. You
F. You

should consider adding a stored procedure to develop the TestTeam operato


should consider enabling the Notifications and develop the TestTeam opera
should consider creating Transactions Log and develop the TestTeam operat
should consider leading the Notification the TestTeam operator on job fai
should consider giving the operator as the failCsafe operator.
should consider enabling all jobs.

================================================================================
==========================
QUESTION NO: 36
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instruction from management to set the instance
to utilize one
thread for searches which owns an estimated execution cost less than 2.
What should you do?
A.
B.
C.
D.
E.

You
You
You
You
You

should
should
should
should
should

consider
consider
consider
consider
consider

setting
setting
setting
setting
running

the cost threshold for parallelism.


the DBCC SHRINKFILE.
the DBCC INDEXDEFRAG.
the store procedure.
a Transact-SQL statement.

Explanation:
Part 7, Manage transparent data encryption. (2 questions)
================================================================================

==========================
QUESTION NO: 37
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instructions from management to encrypt the dat
abase of
CertKiller.com. However, you have just installed the new license and need to use
it for encryption.
What should you do?
A.
B.
C.
.
D.

Every individual node should have the encryption license installed.


The local group should have the encryption license installed.
The no-cluster and cluster group should have the encryption license installed
The no-cluster group should have the encryption license installed.

================================================================================
==========================
QUESTION NO: 38
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. CertKiller.com contains a lo
t of customer
data which is processed by the Web application. You need to keep the customer in
formation safe
since it is confidential.
What should you do?
A. You should consider adding a transaction Log on CK_DB, and set the informatio
n to be
encrypted for a fixed time.
B. You should consider enabling the Transparent Database Encryption on CK_DB and
back up
the transaction log.
C. You should consider enabling the Transparent Database Encryption on CK_DB and
then make
a backup of the system data and the master database.
D. You should consider making CK_DB running normal using stored procedures and f
unctions that
is set to encrypt data..
Explanation:
Part 8, Configure surface area. (0 questions)
================================================================================
==========================
QUESTION NO: 39
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains two SQL Server 2008 computers named CERTK
ILLERDB1
and CERTKILLER-DB2. Both of these computers contain a copy of a database named
CK_DB. You are using transactional replication between CERTKILLER-DB1 and CERTKI
LLERDB2
for CK_DB. The backups of the databases are as follows:

* Full backup is performed nightly.


* Transaction log backups are performed hourly.
Furthermore, replication latency is less than two minutes. One morning CK_DB bec
omes corrupt
on CERTKILLER-DB1 and its state was rendered irreparable. Fortunately, the datab
ase on
CERTKILLER-DB2 was not affected. You need to return CK_DB on CERTKILLER-DB1 and
ensure that minimal amount of data loss impact on the users of these servers.
What should you do?
A. You should consider reserving only the latest transaction log backup.
B. You should consider reserving the latest full database backup and the whole t
ransaction logs
made since the past backup could be made.
C. You should consider detaching CK_DB on CERTKILLER-DB2 and copy CK_DB to
CERTKILLER-DB1, and link the database on both servers.
D. You should consider reserving a full database backup on CERTKILLER-DB2 and re
serve the
backup to CERTKILLER-DB1.
================================================================================
==========================
QUESTION NO: 40
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. Management wants the backups to be done on a daily basis. Transac
tion log
backups must be every afternoon and morning and thus you should keep in mind tha
t the content
of the log will grow exponentially resulting in a large transaction log file tha
t needs to be backed
up. You thus received instructions to take appropriate measures when doing the b
ackups of the
transaction log files.
What should you do?
A. You should consider cutting down the number of times between transaction log
backups for the
database.
B. You should consider cutting the SQL sentences down in size in order to make t
he smallest
value for the database.
C. You should consider setting the database to use the simple recovery model for
the database.
D. You should consider using the DBCC SHRINKFILE statement towards the transacti
on log file
for the database.
================================================================================
==========================
QUESTION NO: 41
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. CK_Prod need to be backed
up

completely.
The transaction log for CK_Prod runs from 08:00 to 17:00, in two hour intervals.
The database
snapshot needs to be done daily at 07:00.
A CertKiller.com user named Mia Hamm has removed all the information on CK_Prod
which was
entered into the CurrentSpeaker table the previous day. Deletion is the first st
ep for the database.
However, later in the day many other changes in CK_Prod have been effected. You
received
instructions to run a full backup on CK_Prod despite all these problems.
What should you do?
A. You should consider reserving the Full Backup of the previous night and all t
ransaction log
backups until the 10:00 backup.
Then you should use the STOP AT statement on some of the restores.
B. You should consider using the Delete subquery in the INSERT statement to tran
sfer the deleted
rows from the morning's database before the snapshot to the CurrentSpeaker.
C. You should consider reserving the Full Backup and all transaction log backups
until the 10:00
backup.
Then you should use the STOP AT statement on the last restore.
D. You should consider using the SELECT subquery in the INSERT statement to move
the
deleted rows from this morning's database snapshot to the CurrentSpeaker table.
================================================================================
==========================
QUESTION NO: 42
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. You have received instructio
ns from
management to cut the content of the entire database backup files of CK_DB.
What should you do?
A. You should consider using the following Transact-SQL statement:
BACKUP DATABASE CK_DB TO DISK = 't:\backups\finance.bak'
B. You should consider using the following Transact-SQL statement:
BACKUP DATABASE CK_DB TO DISK = 't:\backups\finance.bak' WITH DIFFERENTIAL;
C. You should consider using the following Transact-SQL statement:
BACKUP DATABASE CK_DB TO DISK = 't:\backups\ TT_DB.bak' WITH COMPRESSION;
D. You should consider using the following Transact-SQL statement:
BACKUP DATABASE CK_DB TO DISK = 't:\backups\finance.bak' WITH COMPRESSION,
DIFFERENTIAL;
================================================================================
==========================
QUESTION NO: 43
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The CertKiller.com failure recovery plan demands of you to back u

p the default
trace. However, you need to backup the subdirectory which comprises of the defau
lt traces.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

the
the
the
the

TRANSACTION LOG.
BACKUP.
DATA.
LOG.

================================================================================
==========================
QUESTION NO: 44
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. CK_DB have 100 GB informatio
n where 2
GB of the information is changed daily. CK_DB has its recovery model set for Sim
ple. However,
CertKiller.com states that data loss of more than three hours worth of transacti
ons during business
hours is a NO - NO. You need to ensure to use a backup strategy will use the lea
st number of disk
spaces and still complies with CertKiller.com.
What should you do?
A. You should consider running
business hours.
B. You should consider running
ups daily.
C. You should consider running
siness hours.
D. You should consider running
ackup every three
hours during business hours.

a transaction log backup every three hours during


incremental as well as differential database back
an incremental backup every three hours during bu
a full database backup daily and a differential b

================================================================================
==========================
QUESTION NO: 45
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. The backup of CK_Prod is a
s follows:
* Full backup at 01:00 daily
* Transaction log backup every 20 minutes
* Differential backup every 5 hours
However, you need to do a full backup of CK_Prod at 12:00. You need to make sure
that the
backup would not affect the overall backup and restore procedures for CK_Prod an
d that you can
restore the Backup files in correct sequence.
What should you do?
A. You should consider using the following:

bak' WITH COPY_ONLY;


B. You should consider using
bak ' WITH NOUNLOAD;
C. You should consider using
trn' WITH DIFFERENTIAL;
D. You should consider using
trn' WITH COPY_ONLY;
E. You should consider using
trn ' WITH NOUNLOAD;
F. You should consider using
bak' WITH DIFFERENTIAL;

the following:
the following:
the following:
the following:
the following:

Explanation:
By using copy_only you do not affect the backup sequence.
Incorrect answer:
trn ' WITH DIFFERENTIAL;
by doing this you already affected your backup sequence and you are only backing
up the
transaction log.
Part 2, Restore databases. (8 questions)
================================================================================
==========================
QUESTION NO: 46
You work as a database administrator at CertKiller.com. CertKiller.com is using
SQL Server 2008
Enterprise Edition. CertKiller.com contains a database that unfortunately has to
rn page errors. You
need to solve the problem of the torn page errors.
What should you do?
A. You should consider restoring the database from the latest snapshot of the da
tabase.
B. You should consider restoring the latest database backup and then restore the
transaction logs
which have been made since the latest backup.
C. You should consider using DBCC CHECKDB.
D. You should consider using the newest database backup to restore only the torn
page.
Thereafter you should restore any transaction logs which have been made since th
e latest full
backup.
================================================================================
==========================
QUESTION NO: 47
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database. The database at CertKiller.com contains
transaction
information which is for the Web-based order system.
The full recovery model is used on the database. CertKiller.com is awaiting a fe

w orders that will


come through between 20:00 and 04:00. However, there could be a one hour risk wh
en the
system is running the Database backup. You need to run the backup as soon as pos
sible and get
a solution that will negate this type of risk.
What should you do?
A. You should consider running the full backup of the database hourly.
Then set a Check Database Integrity task to run every day to avoid this kind of
risk.
B. You should consider running a full backup daily at 20:00.
Then set a second Back up Database task to run differential backups.
Then you should also consider setting a third Back up Database job to run hourly
transaction log
backups.
C. You should consider running a full backup daily at 20:00.
Then set a second Back up Database task to run differential backups.
Then you should also consider running a Check Database Integrity task to run hou
rly.
D. You should consider running a full backup daily at 09:00 and 14:00.
Then set a second Back up Database task to do hourly transaction log backups.
================================================================================
==========================
QUESTION NO: 48
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_Prod th
at contains
has a backup method which is as follows:
* CK_Prod is backed up to a file called CK_Prod.bak is performed at 08:00 hours
each day.
* Transaction log backed up to a file called CK_Prod _HHMM.trn is executed every
20 minutes
starting at 09:30 hours.
Furthermore, CK_Prod is configured in single-user mode. One morning at 09:40, a
CertKiller.com
user named Mia Hamm stated that some information was removed by a search which w
as
executed at 09:20. You have received instructions to ensure that you recovery th
e database to its
original status.
What should you do?
A. You should consider using the following:
bak WITH NORECOVERY;
RESTORE LOG Product FROM "t:\backups\ CK_Prod_0930.trn"
WITH RECOVERY, STOPAT = 'Mar 8, 2010 09:20 AM';
B. You should consider using the following:
bak WITH NORECOVERY;
RESTORE LOG Product FROM "t:\backups\ CK_Prod_0915.trn"
WITH RECOVERY, STOPAT = 'Mar 8, 2010 09:20 AM';
C. You should consider using the following:
bak WITH NORECOVERY;
RESTORE LOG Product FROM "t:\backups\ CK_Prod_0915.trn"

D. You should consider using the following:


WITH RECOVERY, STOPAT = 'Mar 8, 2010 09:20 AM';
bak WITH STOPAT = 'Mar 8, 2010 09:23 AM';
Explanation:
There wouldn't be any transaction log back at 9:15 to restore from. The backups
are taken every
20 minutes from 09:30.
================================================================================
==========================
QUESTION NO: 49
Duplicate of Question 1 in the Restore Databases section.You work as a database
administrator at
CertKiller.com. CertKiller.com is using SQL Server 2005 Enterprise Edition. You
need to get the
information on the torn page errors of the database. However, you need to get a
solution on the
torn page errors
What should you do?
A. You should consider restoring the latest database backup and then restore the
transaction logs
which have been made since the latest backup.
B. You should consider using the newest database backup to restore only the torn
page.
Thereafter you should restore any transaction logs which have been made since th
e latest full
backup.
C. You should consider using DBCC CHECKDB.
D. You should consider restoring the database from the latest snapshot of the da
tabase.
================================================================================
==========================
QUESTION NO: 50
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB1. The backup method of CK_DB1
is
follows:
* Full backup, Sunday at 01:00
* Differential backup, weekdays at 22:00
* Transaction log backup weekdays at 08:00; 12:00 and 16:00
You have received notification that the user database data files have failed on
Wednesday at
17:00. You need to ensure that CK_DB1 are saved with the minimal amount of data
loss.
What should you do?
A. You should consider recovering the full backup taken daily and thereafter rec
over the
differential backup taken on Wednesday.
B. You should consider recovering the full backup on Wednesday and thereafter re

cover the
differential backup taken on Sunday.
C. You should consider recovering the full backup on Sunday and thereafter recov
er the
differential backup taken on Wednesday.
D. You should consider backing up the transaction log and recovery the full back
up taken on
Sunday and then recovery differential backup taken on Tuesday.
================================================================================
==========================
QUESTION NO: 51
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. The backup of CK_DB is as fo
llows:
* Full backup at 13:00
* Differential backup at 15:00
* Database snapshots at 20:00 and 21:00
Furthermore, the backups and the database snapshots are reserved on a different
disk. However,
CK_DB has failed at 18:30. You have received instruction to recover CK_DB with t
he minimal
amount of data loss.
What should you do?
A. You
B. You
les.
C. You
D. You
E. You

should consider recovering the Differential backup files only.


should consider recovering the Full backup and the differential backup fi
should consider recovering the Full backup files only.
should consider recovering the database snapshot from 21:00.
should consider recovering the database snapshot from 20:00.

================================================================================
==========================
QUESTION NO: 52
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. During monitoring you notice that one of the computers that have
the data files is
not working. However, you need to reserve the database which is from the most re
cent
configurations of backups as soon as possible.
What should you do?
A. You should
tabase.
B. You should
C. You should
D. You should

consider using the most recent store produce log backup for the da
consider using the old database backup for the database.
consider running a stored procedure for the database.
consider running a transaction log backup for the database.

================================================================================
==========================
QUESTION NO: 53

Duplicate of Question 1 in the Maintaining a SQL server database section.You wor


k as a database
administrator at CertKiller.com. CertKiller.com is using a SQL Server 2008 insta
nce.
CertKiller.com contains two SQL Server 2008 computers named CERTKILLER-DB1 and
CERTKILLER-DB2. Both of these computers contain a copy of a database named CK_DB
. You
are using transactional replication between CERTKILLER-DB1 and CERTKILLER-DB2 fo
r
CK_DB. The backups of the databases are as follows:
* Full backup is performed night by night.
* Transaction log backups are performed hourly.
Furthermore, replication latency is less than two minutes. One morning CK_DB bec
omes corrupt
on CERTKILLER-DB1 and its state were not repairable. However, the database on CE
RTKILLERDB2
was not affected. You need to return CK_DB on CERTKILLER-DB1 and ensure that min
imal
amount of data loss impact on these servers.
What should you do?
A. You should consider detaching CK_DB on CERTKILLER-DB2 and copy CK_DB to
CERTKILLER-DB1, and link the database on both servers.
B. You should consider reserving the latest full database backup and the whole t
ransaction logs
made since the past backup could be made.
C. You should consider reserving only the latest transaction log backup.
D. You should consider reserving a full database backup on CERTKILLER-DB2 and re
serve the
backup to CERTKILLER-DB1.
Explanation:
Part 3, Manage and configure databases. (3 questions)
================================================================================
==========================
QUESTION NO: 54
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. The CertKiller.com's SQL S
erver 2008
is configured to make use of the -T1222 and -T1204 trace flags while booting up.
You have
received instructions to make sure that the use of these trace flags are also in
cluded in the
recovery method of the backups.
What should you do?
A.
B.
C.
D.
E.

You
You
You
You
You

should
should
should
should
should

consider
consider
consider
consider
consider

backing
backing
backing
backing
using a

up the
up the
up the
up the
stored

SQL Server Log.


default database.
SQL Server registry hive.
master database.
procedure.

================================================================================

==========================
QUESTION NO: 55
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. CK_Prod database does exec
ute the
logged operations. You have received instructions to ensure that the database ca
n be recovered
to a specific point in time.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

ensuring
ensuring
ensuring
ensuring

that
that
that
that

CK_Prod
CK_Prod
CK_Prod
CK_Prod

uses
uses
uses
uses

the
the
the
the

full recovery model.


half recovery model.
Transactions Log.
store procedure.

================================================================================
==========================
QUESTION NO: 56
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. The CK_Prod contains the f
ollowing file
groups:
* The PRIMARY file group that contains the On-Line Transaction Processing (OLTP)
information
that is kept in the reserved in the E: volume.
* A file group named CK_USERS that contains the older information that is kept i
n the F: volume.
* A transaction log of the information that is kept in the I: volume.
Data transferring occurs from the PRIMARY file group to CK_USERS, as a member of
the
archiving strategy for CK_Prod. The backup of CK_Prod is as follows:
* The PRIMARY file group six times a day.
* The CK_USERS at 20:00
* The transaction log every 20 minutes
However, the volume that contains CK_USERS was lost at 14:00 hours. You have rec
eived
instructions to perform a recovery of CK_USERS with minimal data loss and in the
shortest time
as possible.
What should you do?
A. You should consider backing up the transaction log and recovery
ckup of
CK_USERS and recovery the entire transaction log backups after the
ackup.
B. You should consider backing up the transaction log and recovery
ckup of
CK_USERS and recovery the entire transaction log backups after the
ackup.
C. You should consider recovering the oldest backup of CK_USERS.
D. You should consider recovering the latest backup of CK_USERS.

the latest ba
most resent b
the oldest ba
most resent b

Explanation:
Part 4, Manage database snapshots. (4 questions)
================================================================================
==========================
QUESTION NO: 57
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. The CK_Prod database uses
a full
recovery model. To adapt to business requirements, CertKiller.com now need to ma
ke use of a
process which changes 20,000 records from the Accounts table at 22:00 hours, whi
ch is
published, daily. You have received instruction to ensure that any changes to th
e records could be
effected without the database going offline.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

Database Recovery.
stored procedure.
Transaction log backup.
Database snapshots.

================================================================================
==========================
QUESTION NO: 58
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod1. One of CertKiller.com pol
icies is that
the database should not be changed too often on business days. Thus you have rec
eived
instructions from management to create a read-only copy of CK_Prod1 for reportin
g purposes at
the start of each business day.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

read-only limitations on the Transactions Log.


a stored procedure.
the database snapshots.
the schema-bound views and XML schema.

================================================================================
==========================
QUESTION NO: 59
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a stored procedure which is used as the data source
for a report.
However, a CertKiller.com user named Mia Hamm complains that the data returned b
y the report
does not comply with normal safety standards. During the investigation you notic
e that the results

are caused by phantom reads. You need to make sure that the report result does n
ot connect to
the other users at CertKiller.com.
What should you do?
A. You should consider
B. You should consider
lation level.
C. You should consider
D. You should consider
ed Snapshot
isolation level.

making the database Read Committed Snapshot isolation.


changing the stored procedure to utilize the Snapshot iso
making the database run an Auto Update Statistics.
changing the stored procedure to utilize the Read Committ

================================================================================
==========================
QUESTION NO: 60 CORRECT TEXT
You work as a database administrator at CertKiller.com. CertKiller.com is using
SQL Server 2008
for its database administration. CertKiller.com has five automated testing areas
for completely
assembled items. The Testing results of every area are stored on the SQL Server
2008 instance.
You have received instructions to create a replication method to ensure that tes
t results flow from
the testing areas to the SQL Server efficiently and that it can be used for repo
rting.
What should you do? (Each correct answer forms part of the solution. Choose TWO.
)
================================================================================
===========================
QUESTION NO: 61
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. The other day you have rec
eived
instructions to update a SQL Server 6.0 database to the SQL Server instance. You
need to ensure
that suspect pages in CK_Prod be detected early.
What should you do?
A. You should consider configuring the PAGE_VERIFY database selection to CHECKSU
M for the
database.
B. You should consider configuring the database compatibility level option to 1.
C. You should consider switching of the TRUSTWORTHY database selection for the d
atabase.
D. You should consider configuring the PAGE_VERIFY database selection to
TORN_PAGE_DETECTION.
================================================================================
==========================
QUESTION NO: 62

You work as a database administrator at CertKiller.com. CertKiller.com is using


a SQL Server
2008 instance. The newly appointed CertKiller.com trainee wants to know what can
be used to
check if the database integrity check (DBCC CHECKDB) was implemented for a speci
al database.
What should you reply?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

tell
tell
tell
tell

him
him
him
him

to
to
to
to

check
check
check
check

the
the
the
the

log
log
log
log

file
file
file
file

of
of
of
of

INDEXDEFRAG.
ERRORLOG.
SQLAGENT.
VIEWDELETE.

================================================================================
==========================
QUESTION NO: 63
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 to administrate and maintain its database. You have received instruction fr
om management
to create a repository of function information. This repository should be create
d with the following
characteristics:
* The data collector is utilized to collect function information.
* One database reserves function information for all the instances.
* 15 Day old function information must be removed.
* Administrative effort to query and operate function data should be minimal.
What should you do?
A. You should consider creating a single Microsoft SQL Server 2005 Analysis Serv
ices (SSAS)
package process to reserve and remove performance data.
B. You should consider setting a management data warehouse process on every inst
ance to
reserve and remove performance data in one database for all the instances.
C. You should consider creating a single Microsoft SQL Service Integration Servi
ces (SSIS)
package process to reserve and remove performance data.
D. You should consider creating a single Microsoft SQL Server 2005 Reporting Ser
vices (SSRS).
Explanation:
Part 6, Maintain a database by using maintenance plans. (1 question)
================================================================================
==========================
QUESTION NO: 64
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 sample that contains an On-Line Analytical Processing (OLAP) database and a
dimension
table named CK_TST. CK_TST contains data that is not in use, but you refresh the
table on an
hourly basis. Consequently this results in a large chunk of disk space being tak
en up by

superfluous data. You need to keep the disk space that will be used to reserve t
he CK_TST table.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

Page compression.
Windows NTFS file system compression.
Transaction compression.
Row compression.

================================================================================
==========================
QUESTION NO: 65
You work as a database administrator at CertKiller.com. You have just installed
Microsoft SQL
Server Management Studio (SSMS) on one of CertKiller.com's workstations but not
the Microsoft
Business Intelligence Development Studio (BIDS). However, you need to design a p
ackage with
the following characteristics:
* It
* It
* It
What

must be transactional.
must be able to accommodate the use of 10 tables.
must be stored in the msdb database of server that is offsite.
should you do?

A. You should consider using the Package Migration Wizard to create the package.
B. You should consider using the DTS Designer to create the package.
C. You should consider using the Create Package submenu to create the package.
D. You should consider using the Microsoft SQL Server Import and Export Wizard t
o create the
package.
================================================================================
==========================
QUESTION NO: 66
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance to administrate and maintain their database. The SQL Server 2008 i
nstance
contains a database named CK_DB that contains a table named CK_Tbl.
You have to put the output of the entire information from CK_Tbl to a file. You
have received
instructions from management to ensure that your solution will provide the desir
ed output in a
Microsoft Office Open XML document format whilst making sure that the data expor
t process is
protected for reuse.
What should you do?
A. You
B. You
C. You
output
file.

should consider using the bulk copy program function.


should consider using the SQLCmd function and save the output to a file.
should consider using the SQL Import and Export Data Wizard and save the
to a

D. You should consider using the bulk copy program function along with a format
file and an
output file.
================================================================================
==========================
QUESTION NO: 67
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. You have received instruct
ions to
ensure that the entire SQL Server samples are set to comply with the following r
equirements.
* Security configurations should be accommodated
* Data fragmentation should be avoided
* Naming conventions should be accommodated
* Force index creation should be accommodated
What should you do?
A. You should
B. You should
io.
C. You should
ement Studio.
D. You should

consider using the Process Control Tool.


consider creating a policy in Microsoft SQL Server Management Stud
consider creating a maintenance plan in Microsoft SQL Server Manag
consider creating a recovery plan using the Web Service Tool.

================================================================================
==========================
QUESTION NO: 68
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You are using the SQL Server Import and Export Wizard to export i
nformation from
a SQL Server database to a Microsoft Excel file format. However, you need to sav
e the package
definition to a file using the appropriate command line.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

Register.exe.
sqlmaint.exe.
dtexec.exe.
update.exe.

================================================================================
==========================
QUESTION NO: 69
Duplicate of Question 1 in Performing Data Management Tasks: Import and export d
ata.
You work as a database administrator at CertKiller.com. You have completed the i
nstalled
Microsoft SQL Server Management Studio (SSMS) on one of CertKiller.com's worksta
tions but not
the Microsoft Business Intelligence Development Studio (BIDS). However, you need
to design a
package with the following characteristics:

* The package should be transactional.


* The package can use 10 tables.
* The package should be stored in the msdb database of a server which is remote.
What should you do?
A. You should consider using the Package Migration Wizard to create the package.
B. You should consider using the DTS Designer to create the package.
C. You should consider using the Create Package submenu to create the package.
D. You should consider using the Microsoft SQL Server Import and Export Wizard t
o create the
package.
Explanation:
Part 2, Manage data partitions. (2 questions)
================================================================================
==========================
QUESTION NO: 70
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_DB that
has a
table named CK_Tbl that is partitioned on the ProID column. The partitioning cha
racteristics are as
follows:
Partition 1 has integer values between 5 and smaller than 30,000.
Partition 2 has integer values greater than 30,000.
Due to the growth in business operations the CertKiller.com management foresees
the need to
have a third partition in the table. You receive instructions to create a third
partition on the table.
This partition must be able to include the integer values greater than 60,000.
What should you do?
A. You
Split
B. You
Merge
C. You
D. You

should consider
clause.
should consider
clause.
should consider
should consider

adjusting existing partition function through utilizing a


adjusting existing partition function through utilizing a
adjusting existing partition scheme.
developing a new partition function.

================================================================================
==========================
QUESTION NO: 71
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB1. The CK_DB1 database contain
s an
OrderHistory table that has two table partitions which is as follows: The one pa
rtition contains the
entire information and the other partition is null. You then create a process to

transfer information
from the partition which includes information for the oldest month of the Orders
table to the proper
partition of the OrderHistory table. However, you have received instructions to
ensure that the
process is capable of running at double capacity at the end of each month.
What should you do?
A. You should consider changing the partition function of the OrderHistory table
by using the split
selection and change the proper partition of the Orders table to the proper.
B. You should consider changing the configurations of the Transaction Logs.
C. You should consider changing the Orders table by using the merge selection an
d change the
partition function of the Orders table through utilizing the split selection.
D. You should consider changing the OrderHistory table by using the merge select
ion and change
the Orders table by utilizing the merge option.
E. You should consider changing the partition function of the Orders table throu
gh utilizing the split
and then change the Orders table by using the merge selection.
Explanation:
Part 3, Implement data compression. (0 questions)
Part 4, Maintain indexes. (11 questions)
================================================================================
==========================
QUESTION NO: 72
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance to manage and maintain its databases. The SQL Server 2008 instance
contains a
database named CK_DB that has a table named CK_Tbl. You then add a Geography dat
a type
column named CK_Colmn to CK_Tbl. The CertKiller.com management also wants CK_Col
mn to
make allowance for the development of a spatial index.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

creating
creating
creating
creating

a
a
a
a

clustered index for CK_Tbl.


primary key for CK_Tbl.
default index for CK_Tbl.
secondary key for CK_Tbl.

================================================================================
==========================
QUESTION NO: 73
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_DB that
has a
stored procedure which is as follows:

1 CREATE PROCEDURE Products.TestProcedure


2 AS
3 IFOBJECT_ID(' Products. TableTest1') IS NOT NULL
4 DROPTABLE Products.TableTest1;
5
6 CREATE TABLE Products. TableTest1 (
7 Idint PRIMARY KEY CLUSTERED,
8 Namevarchar(100);
9 );
10
11 ...
12 GO
However, a CertKiller.com user has called the TestProcedure and received the fol
lowing:
Msg 262, Level 14, State 1, Procedure TestProcedure, Line 15CREATE TABLE permiss
ion
permitted in database ' CK_DB '."
You need to correct the problem. What should you do?
A. You
B. You
nd 2.
C. You
user.
D. You
nd 4.

should consider changing the CREATE TABLE permission.


should consider adding the WITH EXECUTE AS 'dbo' clause between lines 1 a
should consider adding the ALTER permission on the Products schema to the
should consider adding the WITH EXECUTE AS 'dbo' clause between lines 3 a

================================================================================
==========================
QUESTION NO: 74
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2005 database that contains a table named CK_Prod. Product, that has over 50 col
umns. The
normal Transact-SQL statement queries are as follows:
--QUERY 1
SELECT [Name], [ProductLine], [ListPrice], [Class], [Style] FROM [CK_Prod]. [Pro
duct]WHERE
[ProductLine] = 'T'
--QUERY 2
SELECT * FROM [CK_Prod]. [Product] ORDER BY [Name]
You have received instructions to minimize the space for the indexes, however, y
ou should keep
the most common searched to CK_Prod. Product.

What should you do?


A. You should consider
Class and Style
columns.
B. You should consider
C. You should consider
D. You should consider
ce columns.

creating a clustered index on the ProductLine, ListPrice,


creating a clustered index on the Name column.
creating a nonclustered index on the Name column.
creating a nonclustered index on the ProductLine, ListPri

================================================================================
==========================
QUESTION NO: 75
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database. During monitoring, you notice that the f
ollowing TransactSQL query is running slow:
SELECT VideoTitle, UpcNum, RetailPrice, Release Date FROM Srvideo.VideoTitle WIT
H
(INDEX(0)) WHERE ReleaseDate BETWEEN '20050401' AND '20050510'
With regards to the output, a clustered index exists on the VideoTitle column. F
urthermore there is
a nonclustered index on the ReleaseDate column that has the UpcNum and RetailPri
ce columns.
You also notice that the avg_fragmentation_in_percent is 30 percent, when you ex
plore the
sys.dm_db_index_physical_stats dynamic management function (DMF) or the VideoTit
le table.
You have recievewd instructions to find the method to resolve the problem.
What should you do?
A. You should
B. You should
C. You should
n unclustered
index seek.
D. You should

consider reproducing the entire index on the VideoTitle table.


consider deleting the query hint from the query.
consider changing the query hint to force the optimizer to force a
consider recreating the index on only the ReleaseDate column.

================================================================================
==========================
QUESTION NO: 76
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. CK_DB also contains spatial
data types.
You have received instructions to run a database consistency check on CK_DB to h
old the spatial
indexes and to make the effect on the database concurrency minimized.
What should you do?
A. You should consider running the following:
DBCC CHECKDB (CK_DB) WITH VIEWDELETE;

B. You should consider running the following:


DBCC CHECKDB (CK_DB) WITH EXTENDED_LOGICAL_CHECKS;
C. You should consider running the following:
DBCC INDEXDEFRAG(CK_DB)
D. You should consider running the following:
DBCC SHRINKFILE(CK_DB)
================================================================================
==========================
QUESTION NO: 77
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You then install an important cluster which allows constant avail
ability on two
cluster-ready nodes. However, you have received instructions from management to
make sure
that the service disruption is minimized by setting the cluster to failover.
What should you do?
A. You
B. You
C. You
ption.
D. You
n.

should consider using the Prevent automatic failback option.


should consider using the Allow failback immediately option.
should consider using the Allow failback only during non-business hours o
should consider using the Allow failback only during business hours optio

================================================================================
==========================
QUESTION NO: 78
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB1. CK_DB1 contains a table nam
ed
CK_Prod that has a clustered primary key called CK_ProdID. Also, the CK_DB1 cont
ains a single
XML column called CK_ProdXml which stores XML data. However, CK_ProdXml has an X
ML
index. You then create a new column called CK_ProdName to the Production table.
You need to
make CK_ProdID the primary key.
What should you do? (Each correct answer presents part of the solution. Choose T
WO.)
A. You should consider making the XML index on CK_ProdName disabled.
B. You should consider changing the XML index
C. You should consider reproducing the XML index.
D. You should consider transferring the XML data to a temporary before clearing
the XML
information from the original table by configuring CK_ProdName to NULL.
E. You should consider setting the ALLOW_ROW_LOCKS = ON option.
F. You should consider using the statement "Drop the XML index on the table" and
change the
primary key.
================================================================================
==========================

QUESTION NO: 79
You work as a database administrator at CertKiller.com. CertKiller.com is using
a Microsoft SQL
Server 2008 Analysis Services (SSAS) instance. You have received instruction to
deploy a data
mining structure that has the Microsoft Clustering mining model "From Scalable K
-Means to Nonscalable K-Means". You need to modify the attribute of the mining model.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

changing
changing
changing
changing

SHRINKFILE.
MODELLING_CARDINALITY.
CLUSTERING_METHOD.
INDEXDEFRAG.

================================================================================
==========================
QUESTION NO: 80
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB. CK_DB contains a table named
CK_Prod
that contains several indexes and numerous rows. However, 40 % of the indexes on
CK_DB are
fragmented. You have received instructions to ensure that the effect on database
availability is
minimized.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

the
the
the
the

Full index option.


Page index option.
Online option.
Offline option.

================================================================================
==========================
QUESTION NO: 81
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. CertKiller.com is using th
e following to
join two tables on a column called CK_Cmn.
SELECT P.*, PD.*FROM Products
AS PINNER JOIN Products AS PD ON PD.CK_Cmn = PD.CK_Cmn
However, when you run the search you received the following error:
"Msg 468, Level 16, State 9, Line 17Cannot resolve the collation conflict betwee
n
'SQL_Latin1_General_CP1_CS_AS' and 'SQL_Latin1_General_CP1_CI_AS' in the equal t
o
operation."
You need to ensure that you can change the ON clause of the search to perform a

join. What
should you do?
A. You should consider adding the following:
CK_Cmn) = UPPER(P.CK_Cmn)
B. You should consider adding the following:
CK_Cmn) = TRIM(P.CK_Cmn)
C. You should consider adding the following:
CK_Cmn= P.CK_Cmn COLLATE SQL_Latin1_General_CP1_CI_AS
D. You should consider adding the following:
CK_Cmn= P.CK_Cmn COLLATE SQL_Latin1_General_CP1_CS_AS
================================================================================
==========================
QUESTION NO: 82
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 cluster. You have received instructions from management to perform a manual
failover on
the cluster.
What should you do? (Choose TWO)
A.
B.
C.
D.
E.

You
You
You
You
You

should
should
should
should
should

consider
consider
consider
consider
consider

Unplugging the network cable(s) from the active node.


recreating a cluster for a backup to the active node.
using Encrypting File System (EFS).
deleting the shared array from the active node.
unplugging all superfluous cables from the active node.

Explanation:
Part 5, Manage collations. (0 questions)
================================================================================
==========================
QUESTION NO: 83
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. One morning you have received numerous complaints from the CertKi
ller.com
users that they cannot connect to the default instance or the named instances. Y
ou need to make
sure that the users can access the entire SQL instances.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

the
the
the
the

IIS Service.
Service of Web Service.
Service of SQL Server Browser.
Service of Server.

================================================================================
==========================
QUESTION NO: 84
You work as a database administrator at CertKiller.com. CertKiller.com contains
a SQL Server
2008 computer named CERTKILLER-DB01. CERTKILLER-DB01 contains three examples of

SQL
Server that is supposed to have the ability to connect to the dedicated administ
rative connection to
have a disaster recovery plan. During testing you can connect to the connection
on CERTKILLERDB01'
s default example to test its ability; however, you cannot connect to the dedica
ted
connection on the two other examples. You have received instructions to do the f
ollowing:
* Make sure that the examples are implementing.
* Make sure that the client applications can approach them.
* Ensure that the other administrators cannot connect to any dedicated connectio
ns on
CERTKILLER-DB01.
* Ensure that you could connect to the dedicated connection on all three example
s.
What should you do?
A. You should consider
B. You should consider
C. You should consider
onnection.
D. You should consider
automatically.

rebooting the default examples of SQL Server.


resetting the default example and not use port 1434.
using the IIS tool to make the dedicated administrative c
starting the SQL Server Browser service and set is to run

================================================================================
==========================
QUESTION NO: 85
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You need to use the Windows System Monitor and process the output
of how
many users access the SQL Server instance.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

have
have
have
have

the
the
the
the

object
object
object
object

of
of
of
of

SQLServer:General Statistics captured.


SQLServer:Exec Statistics captured.
SQLServer:Buffer Manager captured.
SQLServer:Access Methods captured.

Explanation:
Part 2, Identify concurrency problems. (3 questions)
================================================================================
==========================
QUESTION NO: 86
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. However, recently CK_Prod
has
produced deadlock problems. You have received instructions from management to ge
t the
deadlocks on the SQL Server error log.

What should you do? (Choose TWO)


A. You
B. You
C. You
ance.
D. You

should consider using the SQL Profiler trace.


should consider enabling the Server Auditing for CK_Prod.
should consider setting up the trace flags and reboot the SQL Server inst
should consider using the Transactions Log.

================================================================================
==========================
QUESTION NO: 87
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. A CertKiller.com user named Mia Hamm was complaining that she is
waiting
forever for a search to finish. You need to make sure if the query is blocked.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

the
the
the
the

IIS utility.
Process Monitor utility.
Job Activity Monitor utility.
Activity Monitor utility.

================================================================================
==========================
QUESTION NO: 88
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instructions to clarify the longest-running com
mon language
runtime (CLR) searched.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

the
the
the
the

sys.dm_exec_requests view.
sys.dm_exec_sessions view.
sys.dm_exec_query_stats view.
sys.dm_os_wait_stats view.

Explanation:
Part 3, Identify SQL Agent job execution problems. (1 question)
================================================================================
==========================
QUESTION NO: 89
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance for a Server Agent job. During a routine monitoring, you notice th
at the Server
Agent job is not running as it should be. However, when you check the job histor
y information, you
saw that it was not complete and shortened. However, in the future, you need to
ensure that the
info from the job history is useful for browsing.

What should you do?


A. You should
essages.
B. You should
C. You should
D. You should

make use of the Transactions Log to keep all the execution trace m
make use of job steps to send the output to a file enable.
enable the write OEM file.
enable the notifications.

Explanation:
Part 4, Locate error information. (5 questions)
================================================================================
==========================
QUESTION NO: 90
You work as a database administrator at CertKiller.com. You are working on a SQL
Server 2005
database called TestCont and are using a Transact-SQL script to restore TestCont
. The TransactSQL script is as follows:
RESTORE DATABASE TestCont
FROM contracts_bu_device
WITH CONTINUE_AFTER_ERROR, CHECKSUM, RECOVERY
However, after the restore there were still errors in some page restores in the
SQL Server logs.
You have received instructions to repair the database pages as soon as possible.
What should you do?
A. You should consider adding the following:
DBCC CHECKDB (Contracts, REPAIR_ALLOW_DATA_LOSS) WITH NO_INFOMSGS
B. You should consider adding the following:
ALTER DATABASE Contracts SET TORN_PAGE_DETECTION ON
C. You should consider adding the following:
ALTER DATABASE Contracts SET TRUSTWORTHY ON
D. You should consider adding the following:
DBCC CHECKDB (Contracts, REPAIR_ALLOW_DATA_LOSS) WITH TABLOCK
================================================================================
==========================
QUESTION NO: 91
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. You have received instruction from management to keep a managemen
t data
warehouse. It will be used to store functions data through utilizing the data co
llector. For this, you
need to use a process which gathers and uploads information in the management in
formation
warehouse on different schedules.
What should you do?
A. You should consider developing different SQL Agent jobs.
B. You should consider developing an on-demand non-cached data collection.

C. You should consider developing a cached data collection.


D. You should consider developing a scheduled non-cached data collection.
================================================================================
==========================
QUESTION NO: 92
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB1. The CertKiller.com manageme
nt would
like the database to conform to the following security requirements:
Only successful and failed logon attempts in log files.
The SQL Server 2008 instance must close if the records are not written to the lo
g files.
You need to set the SQL Server sample to conform to the security requirements.
What should you do?
A. You should consider using the following:
sp_configure 'show advanced options', 1;
GO
RECONFIGURE;
GO
sp_configure 'common criteria compliance enabled', 1;
GO
RECONFIGURE
GO
B. You should consider using the following:
(STATE=ON);
GO
ALTER SERVER AUDIT Srv_Audit WITH (STATE=ON);
GO
C. You should consider using the following:
sp_configure 'default trace enabled', 0;
GO
RECONFIGURE
GO
D. You should consider using the following:
sp_configure 'show advanced options', 1;
GO
RECONFIGURE;
GO
sp_configure 'common criteria compliance enabled', 0;
GO
RECONFIGURE
GO
E. You should consider adding the following:
CREATE SERVER AUDIT Srv_Audit TO FILE ( FILEPATH ='\\SQL_SERVER\Audit\' ) WITH
(ON_FAILURE = SHUTDOWN);
GO
CREATE SERVER

F. You should consider using the following:


sp_configure 'show advanced options', 0;
GO
RECONFIGURE;
GO
================================================================================
==========================
QUESTION NO: 93
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_DB. You
are
planning to collect performance information on the whole examples with the data
collector. You
should reserve collected data in CK_DB and to gather and load function data in t
he management
data warehouse every 12 hours.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

developing
developing
developing
developing

a cached data collection.


an on-demand non-cached data collection.
an on-demand cached data collection.
a scheduled non-cached data collection.

================================================================================
==========================
QUESTION NO: 94
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. One morning you have a complaint from a CertKiller.com user that
applications on
the server is performing very sluggish. However, you do not want to use the tabl
e scans get more
information because of the poor performance.
What should you do?
A. You should consider
System Monitor.
B. You should consider
ystem Monitor.
C. You should consider
em Monitor.
D. You should consider
System
Monitor.

using the SQLServer:Buffer Cutting utility in the Windows


using the SQLServer:Disk Manager utility in the Windows S
using the SQLServer:Databases utility in the Windows Syst
using the SQLServer:Access Methods utility in the Windows

================================================================================
==========================
QUESTION NO: 95
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains quite a few databases that are utilized b
y applications. You
are planning to use the Resource Governor to cut the result of searches. These s
earches are run

via Microsoft SQL Server Management Studio. However, the characteristics should
be as follows:
The searches done by the SQL Server Management Studio should not exceed 40 % of
CPU
utilization and the applications need of 200 % CPU utilization may be allowed wh
en needed. You
need to comply with the CertKiller.com needs.
What should you do?
A. You should consider developing a new resource pool and set up the
CENT
selection to 60.and grant this resource pool to the workload group.
B. You should consider developing a new resource pool and set up the
CENT
selection to 40.and grant this resource pool to the workload group.
C. You should consider developing a default resource pool and set up
_PERCENT
selection to 60.and grant this resource pool to the workload group.
D. You should consider developing a default resource pool and set up
_PERCENT
selection to 40.and grant this resource pool to the workload group.

MAX_CPU_PER
MAX_CPU_PER
the MAX_CPU
the MAX_CPU

Explanation:
Part 2, Use the Database Engine Tuning Advisor. (1 question)
================================================================================
==========================
QUESTION NO: 96
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains a database that is used by a mission crit
ical application.
You have received complaints from a CertKiller.com user named Mia Hamm that the
performance
of the server is not running by her as it should be. You need to use the Databas
e Engine Tuning
Advisor to help the functions of the application however you should ensure that
the performance of
the server does not affect the other users.
What should you do?
A. You should consider
e server.
B. You should consider
server.
C. You should consider
ing, before using
the dta.exe utility on
D. You should consider
server.

making the XP_MSVER stored procedure disable on the remot


making the XP_MSVER stored procedure enable on the remote
setting up a test server which has the same hardware sett
the test server along with an XML input file.
making the XP_MSVER stored procedure enable on the local

Explanation:
Part 3, Collect trace data by using SQL Server Profiler. (3 questions)
================================================================================

==========================
QUESTION NO: 97
You work as a database administrator at CertKiller.com. CertKiller.com is using
a remote SQL
Server 2008 instance. One morning you have received complaints that the applicat
ions are
running sluggish. To get hold of the workload, you need to trace the table on th
e remote SQL
Server instance. You need to use the Database Engine Tuning Advisor and use the
SQL Profiler
tool to analyze the workload of the remote SQL Server instance on a local SQL Se
rver instance.
What should you do?
A. You should consider enabling the XP_MSVER stored procedure on the local serve
r.
B. You should consider enabling the XP_MSVER stored procedure on the remote serv
er.
C. You should consider recapturing the workload to a trace file by using the SQL
Profiler tool.
D. You should consider capturing the workload to a trace file by using the SQL P
rofiler tool.
================================================================================
==========================
QUESTION NO: 98
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2005 instance. In CertKiller.com there are 15 servers which are used by other ad
ministrator at the
company. However, they need to comply with the company service level agreements
(SLAs) on
querying response time. Some of the administrators need information of the metho
d on controlling
query response times on the servers.
What should you do?
A. You should consider teaching them to use the System Monitor Control Tool.
B. You should consider creating a query that searches the sys.dm_db_partition_st
ats dynamic
management view (DMV) and distribute this search to them.
C. You should consider developing SQL Server Profiler templates, which contain q
uery start times
and end times and distribute these templates to the administrators.
D. You should consider developing an XML schema which includes the event and col
umn names
of the query response times. That can be captured in SQL Server Profiler.
================================================================================
==========================
QUESTION NO: 99
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains databases that host two applications for acquiring a
nd selling.

You were busy with the setting of the Resource Governor with the purpose of cutt
ing the maximum
CPU search time permitted through the applications. However, after the setting,
you notice that
some of the reports of the acquiring application does not execute successfully.
You need to
ensure that you alter the Resource Governor settings to permit more CPU time.
What should you do?
A. You should
.
B. You should
application.
C. You should
he acquiring
application.
D. You should
t.

consider permitting the workload group that is utilized by default


consider permitting the workload group that clarifies the selling
consider permitting the workload group which is utilized through t
consider permitting the classifier function that is used by defaul

Explanation:
Part 4, Collect performance data by using Dynamic Management Views (DMVs). (3 qu
estions)
================================================================================
==========================
QUESTION NO: 100
You work as a database administrator at CertKiller.com. One morning you have rec
eived
numerous complaints from the users at CertKiller.com that the SQL Server 2008 ap
plication is
running very sluggish. You need to check the disk, CPU, and memory utilization;
information and
still consider the network.
What should you do?
A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

checking
checking
checking
checking

the
the
the
the

master database's recovery model.


proper dynamic management views (DMVs).
distribution of the hosted statistics.
statistics update command's the output.

================================================================================
==========================
QUESTION NO: 101
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB1. CertKiller.com also contain
s an
application that makes use of the SELECT command that triggers the population of
multiple
tables. This application also makes use of CK_DB1. One morning you have received
several
complaints from the users that the application is performing very sluggish. You
now need to
control the status of the sample without affecting the application performance.

What should you do?


A.
B.
C.
D.

You
You
You
You

should
should
should
should

consider
consider
consider
consider

using
using
using
using

the
the
the
the

Process Monitor Tool.


Web Service.
SQL Server Resource Governor.
Dynamic Management Views.

================================================================================
==========================
QUESTION NO: 102
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2005 instance. The database enables the CertKiller.com users to operate both ad
hoc and
predefined searches. There is however a suspicion that some searches will cost t
oo much of the
available resources and you need to make sure which searches use the most resour
ces.
What should you do?
A. You should
B. You should
C. You should
D. You should
(DMV).

consider
consider
consider
consider

using
using
using
using

the
the
the
the

DBCC INPUTBUFFER requirements.


sqldiag function.
SHOWPLAN session selection.
sys.dm_exec_query_stats dynamic management view

Explanation:
Part 5, Collect performance data by using System Monitor. (0 questions)
Part 6, Use Performance Studio. (0 questions)
================================================================================
==========================
QUESTION NO: 103
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains three databases named CK_DB1, CK_DB2 and CK_DB3. Eac
h of
these databases runs on different servers.
CK_DB1 and CK_DB2 have an important database that is mirrored. CK_DB3 is a helpe
r and
CK_DB1 is considered the principle database. You then implement a patch that req
uires CK_DB1
and CK_DB2 to be rebooted. However since the patching was done as quickly as pos
sible the
database that was online at the time could not use the patch. This database cann
ot use the patch
present which result in that the database does not failover to the other partner
.
What should you have done?
A. You should consider using the patch to the server that implements CK_DB1 befo
re using the
patch to the server that implements CK_DB2.

B. You should consider using the patch to the server that implements CK_DB3 befo
re using the
patch to the server that implements CK_DB1.
C. You should consider using the patch to the server that implements CK_DB2 befo
re using the
patch to the server that implements CK_DB1.
D. You should consider stopping the mirroring session, use the patch to the serv
er that
implements CK_DB2 and resume the mirroring session.
Explanation:
Part 2, Implement a SQL Server clustered instance. (0 questions)
Part 3, Implement log shipping. (3 questions)
================================================================================
==========================
QUESTION NO: 104
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. The SQL Server 2008 instance contains a database named CK_Prod wh
ich are
logged shipping to a remote SQL Server 2008. However, after reboot of the primar
y SQL Server
instance, you notice that the log shipping has no functionality. You need to tro
ubleshoot the log
shipping of CK_Prod.
What should you do next?
A. You should make sure that the SQL Server Agent is started on the main server.
B. You should consider using the EXTENDED_LOGICAL_CHECKS option and run a DBCC
INDEXDEFRAG statement on CK_Prod.
C. You should make sure that CK_Prod uses the Simple recovery model.
D. You should consider using the EXTENDED_LOGICAL_CHECKS option and run a DBCC
CHECKDB statement on CK_Prod.
================================================================================
==========================
QUESTION NO: 105
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 sample named CKSmp1. Furthermore, CKSmp1 contains a database named CK_DB. T
he
CK_DB uses the bulk-logging recovery mode. You then use the WAN to log ship CK_D
B.
Furthermore, CK_DB's indexes are reproduces by a scheduled work. You then make c
ertain that
the log shipping adds the number to the job. You need to minimize the size of th
e log backups
used by log shipping.
What should you do?
A. You should consider using the Full recovery mode on CK_DB.
B. You should consider using the half recovery mode on CK_DB.

C. You should consider deleting the indexes and create new one.
D. You should consider making a compress of the log file backups.
================================================================================
==========================
QUESTION NO: 106
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_DB1. The CK_DB1 database uses SQ
L
Server log shipping; however, log shipping will occur within the hour. You have
received
instructions to make a full backup however; you need to cut the net bandwidth ut
ilization when
maintenance takes place at night.
What should you do?
A. You
model.
B. You
C. You
D. You

should consider setting the database to utilize the bulk-logged recovery


should consider adding the time during transaction log backups.
should consider disabling log shipping after the nightly maintenance.
should consider reproducing only those indexes that ask it at night.

Explanation:
Part 4, Implement replication. (2 questions)
================================================================================
==========================
QUESTION NO: 107
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance. CertKiller.com contains a SQL Server 2008 sample named CKSam that
contains a
database named CK_DB. Furthermore, CK_DB does have a ProductItems table. A Repli
cation
topology is needed to copy the ProductItems table to the SQL Server samples incl
uded in
computers. The only time the ProductItems will be refreshed, is when the compute
rs do not link to
the CertKiller.com network. Furthermore, the Products table is from between reco
nnections
frequently. You need to run the Replication topology alongside the Subscription
type with the
minimum amount of bandwidth usage.
What should you do?
A. You should consider
h a Pull
Subscription.
B. You should consider
h a Push
Subscription.
C. You should consider
usly with a Push
Subscription.
D. You should consider

running the Merge Replication topology simultaneously wit


running the Merge Replication topology simultaneously wit
running the Transactional Replication topology simultaneo
running the default Replication Replication topology simu

ltaneously with a
Pull Subscription.
================================================================================
==========================
QUESTION NO: 108
You work as a database administrator at CertKiller.com. CertKiller.com is using
a SQL Server
2008 instance that contains a database named CK_Prod. The database contains a Pr
oducts table.
You have developed a Merge Replication topology and a Publication which owns a 2
5-day
retention period; so that the Products table can be reproduce to the SQL Server
instances at
remote locations. After a one month break the CertKiller.com user named Mia Hamm
, noticed that
CK_Prod does not include her latest data. During the investigation you came upon
the following
error message: "Replication: expired subscription dropped."
Mia Hamm needs the latest data in her database and you should ensure that the in
formation
changes are properly doubled.
What should you do?
A. You should consider uploading synchronized changes.
B. You should consider reinitializing the publication and produce a new snapshot
immediately.
C. You should consider uploading unsynchronized changes and reinitializing the p
ublication.
D. You should consider uploading unsynchronized changes.
================================================================================
===========================

================================================================================
==========================
================================================================================
==========================
================================================================================
==========================

You might also like