You are on page 1of 203

Microsoft 70-450

70-450 PRO: Designing, Optimizing and Maintaining a Database Administrative Solution Using Microsoft SQL Server 2008

Practice Test
Version 10.0

Microsoft 70-450: Practice Exam QUESTION NO: 1 CertKiller.com has hired you as a database administrator for their network. Your duties include administering the SQL Server 2008 servers. You receive an instruction from the CIO to implement page compression on numerous partitions in order to save space. You need to determine what effect implementing compression will have on the SQL Server components. What should you identify? (Choose all that apply.) A. Restore operations will not be affected by implementing page compression. B. Backup operations will not be affected by implementing page compression. C. Bulk export operations will not be affected by implementing page compression. D. Bulk import operations will not be affected by implementing page compression. E. Existing query plans will not be affected by implementing page compression. F. Log shipping will not be affected by implementing page compression. Answer: A,B,F

QUESTION NO: 2

You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance. You are currently planning the deployment of a new database. The database will have the subsequent capacity requirements:45 GB for the transaction log file280 GB for the database data file There are approximately six 120 GB disk drives available for the database in the storage array. CertKiller.com contains a RAID controller that supports RAID levels 0, 1, 5 and 10. The disks are on the RAID controller. You receive an instruction from the CIO that is as follows:The transaction log's write performance should be maximized.In the event of a drive failure, it is expected that the "Pass Any Exam. Any Time." - www.actualtests.com 2

Ac

tua

Explanation: Page level or row level compression does not affect backup operations, restore operations, or log shipping operations. These operations simply read the data or write the data to the disk. Reading and writing functions are not affected by page level or row level compression. Incorrect Answers: E: Existing query plans that are used to view data on partitions will be affected by compression. When row compression or data compression is enabled, data will be stored in different numbers of pages and number of rows. The query plans would need to be re-optimized after compression is implemented.

lTe

sts

.co

Microsoft 70-450: Practice Exam database and transaction log files is protected. You then decide to plan a storage system. You need to determine the storage configuration that will accomplish this. What should you identify? A. You should consider using a RAID 1 volume as well as a RAID 5 volume. B. You should consider using a RAID 1 volume as well as a RAID 10 volume. C. You should consider using a RAID 3 volume as well as a RAID 5 volume. D. You should consider using a RAID 1 volume as well as a RAID 3 volume. Answer: A

QUESTION NO: 3

You work as a database administrator at CertKiller.com. You are responsible for administering the SQL Server 2008 infrastructure for CertKiller.com. During routine monitoring you discover that the instance experiences a low number of CXPACKET waits as well as a large number of lazy writer waits. To ensure productivity you need to better the performance of the instance. What should you do?

Answer: D

QUESTION NO: 4 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You receive an instruction from management to make sure that your department is prepared in the event of a natural disaster. You thus decide to create a disaster readiness plan. You need to determine the appropriate actions that should be included in your disaster readiness plan.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

A. You should consider setting up the Windows System Monitoring tool to better the performance. B. You should consider setting up the Asynchronous database mirroring to better the performance. C. You should consider using the SQLAGENT.OUT log to better the performance. D. You should consider setting up the software non-uniform memory access (soft-NUMA) to better the performance.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam What should you do? (Choose all that apply.) A. You should consider testing and using RAID 5 for the volume that contains the database files. B. You should consider testing and using RAID 1 for the volume that has the operating system. C. You should consider maintaining the system logs in a secure manner. D. You should consider performing the recovery of a database(s) on another SQL server. E. You should consider testing and using RAID 5 for the volume that has the operating system. F. You should consider testing and using RAID 1 for the volume that contains the database files. Answer: C,D Explanation: To ensure disaster readiness, you should maintain system logs in a secure manner and perform recovery of a database on another SQL server. The full set of recommendations for disaster readiness is as follows: Ensure that your personnel are trained in restoring a database or server. Have your staff test the backups and recovery sets. Ensure that the regular database and transaction log backups are performed frequently. Maintain system logs in a secure manner. Keep detailed records of what service packs were installed and when. Keep records of the SQL server configuration. Perform and document the restoration of a server or database to another server. Maintain a base-functionality script that may execute insert, update, and delete statements or a batch of stored procedures to determine if everything is working correctly after a restore.

QUESTION NO: 5

CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01. You are in the process of enabling FILESTREAM on a volume on CERTKILLER-DB01. You have received instruction from the CIO to ensure that the volume store documents in compressed form. You notice that volume F:\ is not formatted. You need to make sure that the volume will be able to store documents in a compressed form. What should you do? A. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:8192 /C command. B. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:8192 command. C. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:4096 command. "Pass Any Exam. Any Time." - www.actualtests.com 4

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam D. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:4096 /C command. Answer: D Explanation: This command will format the volume, convert it to NTFS and then label it as BLOBContainer . This command will also set the NTFS cluster size to 4096. It is important to note that the cluster size must be 4096 or smaller for compression to be enabled for a volume. Finally, the /c parameter will compress the volume. When you are storing the FILESTREAM data, you can store it on a compressed or a non-compressed volume. The data in FILESTREAM is actually stored on the file system. There are a number of benefits to storing the data on the file system. For instance, you will be able to compress data with the NTFS compression capabilities. When the data is stored, it is in compressed form and when the data is retrieved, it is decompressed. Incorrect Answers: A: The commands format B: The commands format C: The command format F: /FS:NTFS /V:BLOBContainer /A:4096 will not work in this scenario. This command does not use the /c switch that is required to enable compression. With the execution of this command, only /A: drive will be formatted as a NTFS volume with a 4096 cluster size but without any compression.

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. During the course of the day you receive instruction from CertKiller.com to design a RAID solution for the CK_DATA database which has high read/write activity. CertKiller.com wants you to ensure that the I/O performance of CERTKILLER-DB01 is improved whilst ensuring that there is fault tolerance for the database. CertKiller.com wants you to make use of the existing resources as funds are tied to other projects. What should you do? A. You should consider making use of a RAID 5 solution. B. You should consider making use of a RAID 10 solution. C. You should consider making use of a RAID 1 solution. D. You should consider making use of a RAID 0 solution. Answer: A Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

QUESTION NO: 6

sts

.co

Microsoft 70-450: Practice Exam In this scenario, you should use RAID 5 for CK_DATA. RAID 5 will provide good performance throughput and prevent data loss if there is a disk failure. CK_DATA has high read/write activity, and therefore RAID 5 will be a better choice when compared to RAID 0 and RAID 1 in terms of data availability and data protection. For an ideal SQL Server configuration, you should have a combination of RAID 1 and RAID 5. You should mirror the operating system using RAID 1, and place transaction logs on a RAID 1 that is separate from the RAID 1 that hosts the operating system. SQL Server writes data to the transaction logs and maintains serial information of all modifications that occurred in a SQL database. The transaction log files can be used for rollback and roll forward of information from a SQL Server database. The SQL Server files and filegroups should be placed on a RAID 5, because you get best performance throughput by placing database files on RAID 5 disk array. Incorrect Answers: B: You should not use RAID 10 in this scenario. RAID 10 is a better choice than RAID 5, but the scenario states that you have financial constraints. RAID 10 would be more expensive than RAID 5. RAID 10 is a combination of RAID 0+1, which is known as striping with mirroring. You should first mirror disks and then create a stripe set of mirrored disks. This provides high fault tolerance for data and excellent throughput performance. C: You should not use RAID 1 in this scenario. RAID 1 is known as disk mirroring. You need a minimum of two disks to form a RAID 1 array. One primary disk is used for read/write operations and the data is replicated to the second disk. This RAID level offers better read performance but slower write performance. Therefore, it is not a suitable solution. D: You should not use RAID 0 in this scenario. RAID 0 is known as disk striping. This RAID level stripes data across disks in the array, offering better throughput on the read/write operations. However, there is no data protection offered in this RAID level. If one disk fails, the data stored on the disk will be lost. Therefore, this RAID level will not be a suitable solution for CK_DATA database.

QUESTION NO: 7

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_STAFF which is hosted on a RAID 5 volume. During the course of the day you receive instruction from CertKiller.com to change the default size of the allocation unit which is set at 4096 bytes. CertKiller.com wants you to accomplish the task which having the RAID 5 volume data assigned to Drive E: to retain is existing volume name. What should you do? A. You should consider making use of the format E: /A:4096 /V:Data command. B. You should consider making use of the format E: /A:4K /V:Data command. "Pass Any Exam. Any Time." - www.actualtests.com 6

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam C. You should consider making use of the format E: /A: 64K /V:Data command. D. You should consider making use of the format E /A:65536 /V:Data command. Answer: C Explanation: When you create a RAID 5 volume, you need to format it to ensure that it is usable for storing data. By default, the allocation unit for a logical unit number (LUN) is 4096 bytes (4 KB) on an NTFS partition. When you are storing data with large files on a RAID 5 volume, you should change the allocation unit to 64 KB, which is 65536 bytes. When you run execute the command format f: / A : 64K /V: Data, you will be able to format the RAID 5 disk with a new allocation unit. In this command, you would need to provide the volume letter, which is f: in this case, the /A :size clause defines the allocation unit size, which is 64 KB in this scenario, and /V: is the volume name. Incorrect Answers: A: The format E: /A:4096 /V:Data command will work in this scenario but will result in retaining the default allocation unit size, which is 4096 bytes. To keep the default allocation unit size, you can simply run the format command without specifying the allocation unit size. B: The format E: /A:4K /V:Data command will not work in this scenario. You would be prompted with Invalid parameter -/A:4K error. You must provide the size of the allocation unit in bytes if the allocation unit size is below 16 KB, for instance, 8192 for 8 KB. For allocation unit sized at 16 KB and above, the value must be written in K, such as 16 KB. D: The format E: /A:65536 /V: Data command will not work. You would be prompted with Invalid parameter - /A:65536 error upon executing this command. You must provide the size of the allocation unit in KB for 16, 32, and 64 KB. For the value below 16 KB, you must write the value in bytes, for instance, 8192 for 8 KB.

QUESTION NO: 8

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA which is used by an online portal for storing data. The portal is expected to receive large numbers of queries which will require high availability for the data. CertKiller.com wants you to meet the company requirements below: CertKiller.com wants to have the SQL Server 2008 configuration optimized to ensure the database remains intact even when a hard disk fails.CertKiller.com wants to have the data recovery method to be reliable and provide faster recovery if a hard disk fails whilst ensuring database performance is optimized.CertKiller.com wants to have the databases available even when the operating system (OS) disk fails. What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam A. You should consider making use of RAID 1 for the operating system and Transaction Logs; and RAID5 for the SQL Server files and filegroups. B. You should consider making use of RAID 0 for the operating system and Transaction Logs; and RAID 5 for the SQL Server files and filegroups. C. You should consider making use of RAID 0 for the operating system; RAID 1 for the Transaction Logs; and RAID 5 for the SQL Server files and filegroups. D. You should consider making use of the same RAID 1 for the operating system and Transaction Logs; and RAID 5 for the SQL Server files and filegroups. Answer: A Explanation: You should configure your SQL Server 2008 implementation in the following manner: SQL Server files: RAID 5 Operating System files: RAID 1 Transaction files: RAID 1

To meet varying requirements for response time, data reliability, and performance, you typically use different RAID levels depending on how you are designing the SQL Server deployment. These RAID levels are: RAID 5: Known as Striping with Parity. The parity information is written across all disks in the array. You need minimum of three disks to form a RAID 5 array. This RAID level offers better read/write performance as long as all disks in the RAID 5 are present. If one disk is missing, the read performance is degraded. RAID 5 stripes data across all disks in the array. RAID 0: Known as Disk Striping. This RAID level stripes the data across disks in the array, offering better throughput on the read/ write operations. However, there is no data protection offered in this RAID level. If one disk fails, the data stored on the disk will be lost. RAID 1: Known as Disk Mirroring. You need minimum of two disks to form a RAID 1 array. One primary disk is used for read/write operations, and the data is replicated to the second disk. This RAID level offers better read performance and fault tolerance, but slower write performance than RAID 0. The scenario states that the database must be functional even if a drive fails in the system. To meet this goal, you must have the operating system files on RAID 1. Using RAID 1, you will mirror the operating system so that even if a disk fails, the operating system will function. The transaction logs should be placed on a separate RAID 1 array. SQL Server writes data to the transaction logs and maintains serial information of all the modifications that occurred in a SQL database. The transaction log files can be used for rollback and roll forward operations from a SQL Server database. To enhance the performance of SQL databases, you should place the transaction log files on a dedicated RAID 1. Finally, the SQL Server files and filegroups should be placed on a RAID 5 array to achieve the best performance throughput. Incorrect Answers: "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam B: This configuration uses RAID 0 or disk striping for the operating system. If one disk fails in a RAID 0 array, the database will no longer be online, which is contrary to the goal stated in the scenario. However, placing the transaction logs and SQL Server files and filegroups on RAID 1 and RAID 5 is appropriate. C: This configuration uses RAID 0 or disk striping for the operating system. If one disk fails in a RAID 0 array, the database will no longer be online, which is contrary to the goal stated in the scenario. However, placing the transaction logs and SQL Server files and filegroups on RAID 1 and RAID 5 is appropriate. D: You should not use this configuration. It places the operating system and transaction logs on the same RAID 1 disk array, and places the SQL Server files and filegroups on RAID 5. For an appropriate configuration, you should place the operating system and transaction logs on separate RAID 1 arrays. This provides better I/O performance and throughput because the transactions are continuously written to the transaction logs. If there are continuous read/write operations by the operating system on the same RAID 1, then the transaction log performance is degraded. Therefore, it is always recommended that you place transaction logs on a separate RAID 1.

QUESTION NO: 9

What should you do?

A. You should consider placing the CK_SALES database on the same RAID 1 disk as the operating system. B. You should consider placing the CK_SALES database on the same RAID 0 disk as the operating system. C. You should consider placing the CK_SALES database on a separate RAID 0 solution. D. You should consider placing the CK_SALES database on a separate RAID 5 solution. Answer: D

QUESTION NO: 10 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a "Pass Any Exam. Any Time." - www.actualtests.com 9

Ac

tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to reconfigure the CK_SALES database for placement on the disk subsystem. CertKiller.com wants you to place the database on the fastest I/O subsystem whilst ensuring user data is not lost when a disk failure occurs.

lTe

sts

.co

Microsoft 70-450: Practice Exam database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a new CK_PRODUCTS database which should meet the capacity requirements set below: CERTKILLER-DB01 will require 175 GB for the database data file.CERTKILLER-DB01 will require 60 GB for the transaction log. The CERTKILLER-DB01 storage array has six 200 GB disk drives available for the database which are attached to a RAID controller supporting RAID levels 0, 1, 5 and 10. CertKiller.com wants to have the write performance of the transaction log maximized whilst having the database and transaction log protected from drive failure by designing the storage system. What should you do? A. You should consider making use of a RAID 0 volume and RAID 5 volume. B. You should consider making use of a RAID 1 volume and RAID 5 volume. C. You should consider making use of a single RAID 5 volume. D. You should consider making use of a single RAID 10 volume. Answer: B

QUESTION NO: 11

During the course of the day you discover that CERTKILLER-DB01 is experiencing a low number of CXPACKET waits whilst experiencing a large number of lazy writer waits. CertKiller.com wants you to optimize the performance of CERTKILLER-DB01. What should you do? A. You should consider having the software non-uniform memory access (soft-NUMA) configured. B. You should consider having an increase configured in the maximum degree of parallelism option. C. You should consider having the Resource Governor configured. D. You should consider having the Windows System Resource Manager configured. Answer: A

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CERTKILLER-DB01 hardware configuration is shown below: CERTKILLER-DB01 has eight quad-core processors.CERTKILLER-DB01 has 128-GB RAM.

lTe

sts

.co

10

Microsoft 70-450: Practice Exam Explanation: Part 2: Design SQL Server instances. (7 Questions)

QUESTION NO: 12 You are employed as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 database server named CERTKILLER-DB01 that consists of four processors. CERTKILLER-DB01 contains numerous databases which include the databases named CK_PRODUCTS and CK_RESEARCH. The subsequent rules are applied CERTKILLERDB01:Four processors should be used for operations on CK_PRODUCTS.Two processors should be used by the CK_App application for queries on the tables in CK_RESEARCH.Four processors should be used for all imports, exports, queries or operations on the other databases located on CERTKILLER-DB01. What should you do? (Choose all that apply)

Answer: B,C

Explanation: If you do not want to use all of the installed processors in your SQL Server operations, you can limit the use of processors by configuring the processor value to a lower number than the actual number of processors installed. For instance, if a server has four processors and you want to use only three for parallelism, then you should set the max degree of parallelism option to 3. When you want to use a specific number of processors for an individual query or index operation, you can use the MAXDOP query hint or index option to provide better control. MAXDOP overrides the settings defined in the max degree of parallelism option. The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint or index option. Incorrect Answer: A: If you set the max degree of parallelism option to 2, all databases on CERTKILLER-DB01 will use only two processors, not four as required in the scenario. In this scenario, you want to use four processors for any operations used by CK_PRODUCTS and in any other database. You can use "Pass Any Exam. Any Time." - www.actualtests.com 11

Ac

tua

lTe

A. This can be accomplished using MAXDOP in order to set the processor number to four. B. This can be accomplished using MAXDOP in order to set the processor number to two. C. This can be accomplished using the max degree of parallelism option and setting the value to 4. D. This can be accomplished using MAXDOP with the default value. E. This can be accomplished using the max degree of parallelism option and setting the value to 2.

sts

.co

Microsoft 70-450: Practice Exam the following script to set CERTKILLER-DB01 to use four processors. sp_configure 'max degree of parallelism1, 4; GO RECONFIGURE WITH OVERRIDE; GO D: MAXDOP does not have a default value. The max degree of parallelism option has a default value of 0, which defines the actual number of processors installed in the system for parallel execution of queries and indexes. E: If you use MAXDOP to set the processor number to four, all four processors will be used by the query. As stated earlier, the use of MAXDOP is limited to the execution of query that contains the MAXDOP query hint or index.

QUESTION NO: 13 You are employed as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 hosts five databases. CERTKILLER-DB01 contains two processors. You have received instruction from the CIO to make use of more than one processor for parallelism. You thus set the Show Advanced Options to 1. You then write the subsequent code: sp_configure 'max degree of parallelism', 6; GO RECONFIGURE WITH OVERRIDE; GO You need to determine what the result will be when you execute the code above. What should you identify?

A. It will result in four processors being used. B. It will result in three processors being used. C. It will result in two processors being used. D. It will result in one processor being used. Answer: C Explanation: When you are using the maximum degree of parallelism, you must first set the Show Advanced Options to 1, which was already done in the scenario. The number of processors that can be used for all query and index operations is configured with the max degree of parallelism option, which by default is set to 0. The default option, 0, uses the actual number of processors installed in the system for the parallel execution plans of queries and index operations. Any non-zero numeric value indicates the exact number of processors being used. If you specify more processors than are installed in the system, then it will use all available processors and not return an error. In this "Pass Any Exam. Any Time." - www.actualtests.com 12

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam scenario, the server only has two processors. You configured the max degree of parallelism option to use 6 processors. Since you do not have 6 processors, only two will be used. If you do not want to use all of the installed processors for SQL Server, you can configure the max degree of parallelism option to the value equal to the number of processors you wish to use. For instance, if the server has four processors and you want to use only three for parallelism, you should set the max degree of parallelism option to 3. When you want to use a specific number of processors for an individual query or index operation, you can use the MAXDOP query hint or index option to provide better control over operations than the max degree of parallelism option. MAXDOP overrides the settings defined in the max degree of parallelism option. The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint or index. For instance, if you have a query for which you want to utilize all processors installed in the system, then you can use MAXDOP to override the max degree of parallelism option. SQL Server will use more than one processor, but only use the maximum of 2 processors even though the max degree of parallelism option is set to 6. You cannot three or four processors because the server only has two processors.

QUESTION NO: 14

What should you do?

A. You should consider making use of the sys.dm_os_memory_nodes dynamic management view. B. You should consider making use of the sys.dm_os_sys_info dynamic management view. C. You should consider making use of the sys.dm_os_stacks dynamic management view. D. You should consider making use of the sys.dm_os_process_memory dynamic management view. Answer: B Explanation: This dynamic management view was introduced in SQL Server 2008. The sys.dm_os_sys_info view provides rather simple display of physical and virtual memory available with the operating system. This view also provides information regarding the system resources available and consumed by SQL Server. You can also use the sys.dm_os_sys_memory view to see a detailed view of physical memory and memory-resource notification bits, which provide the state of the "Pass Any Exam. Any Time." - www.actualtests.com 13

Ac

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com requires information about the system resources like the amount of memory available and consumed by CERTKILLER-DB01.

sts

.co

Microsoft 70-450: Practice Exam memory resource. The sys.dm_os_sys_memory view displays the memory usage in ten columns. Some of the columns are total_phys . avail_phys ,sys _cache , and sys_hi_signal . Incorrect Answers: A: You should not use the sys.dm_os_memory_nodes view. This view displays information regarding the memory nodes and the amount of physical memory reserved by SQL Server. C: You should not use the sys.dm_os_stacks view. This view keeps track of debug data such as outstanding allocations. D: You should not use the sys.dm_os_process_memory view. This view is used to display memory allocations for the SQL Server process space. For instance, you can use it to track the number of page fault count incurred by the SQL Server process.

QUESTION NO: 15 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to select what the recommended size of the allocation unit should be when your database is expected to have a high number of transactions. What should you do?

Answer: A

Explanation: By default, the allocation unit for a logical unit number (LUN) is 4096 bytes on an NTFS partition. When you are storing data with large files on a RAID 5 volume, you should change the allocation unit to 64 KB, which is 65536 bytes. The format f: / A : 64K /V: Data command will allow you to format the RAID 5 disk with a new allocation unit. In this command, you would need to provide the volume letter, which is f: in this case. The /A :size clause defines the allocation unit size, which is 64 KB in this scenario, and /V: is the volume name. Incorrect Answers: B: 8192 and 32 KB are incorrect because these are not recommended options for storing large databases with high transaction rates. However, if required, you can set the allocation unit to these values. C: The allocation unit size 4096 is the default size assigned to a RAID 5 volume. To be able to change this value, you need to format the volume with a new allocation unit size. "Pass Any Exam. Any Time." - www.actualtests.com 14

Ac

tua

A. You should consider having the allocation unit size 64 K. B. You should consider having the allocation unit size 32 K. C. You should consider having the allocation unit size 4096. D. You should consider having the allocation unit size 8192.

lTe

sts

.co

Microsoft 70-450: Practice Exam D: 8192 and 32 KB are incorrect because these are not recommended options for storing large databases with high transaction rates. However, if required, you can set the allocation unit to these values.

QUESTION NO: 16 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 containing four processors with an instance that hosts a database named CK_SALES. During the course of the day CertKiller.com decided to configure the MAX Degree of Parallelism option set to 2. You have later created an index making use of the MAXDOP option and set the number of processors to 3. CertKiller.com wants you to determine what the results would be? A. The current configuration would make use of one processor only. B. The current configuration would make use of two processors by the default setting of Max Degree of Parallelism option overriding the MAXDOP option. C. The current configuration would make use of four processors only. D. The current configuration would make use of three processors only. Answer: D

Explanation: The option stating that three processors will be used for index creation is correct. The number of processors that can be used for all query and index operations are set using the Max Degree of Parallelism option, which by default is set to 0. The default option, 0, uses the actual number of processors installed in the system for parallel execution plans for queries and index operations. When you want to use a specific number of processors for an individual query or index operation, you can use the MAXDOP query hint or index option to provide better control. The MAXDOP query hint overrides the settings defined in the Max Degree of Parallelism option. The use of the MAXDOP query hint is limited to the execution of query that contains the MAXDOP query hint or index option. This query hint can also be used with online index creation, and allows you to restrict the number of processors in the SQL Server 2008 server to be used in the online index creation. During online index creation, the MAXDOP setting overrides the Max Degree of Parallelism option. Incorrect Answers: A: Only one processor will not be used. One processor can be used only under two conditions, either using a MAXDOP value that overrides the Max Degree of Parallelism option, or by setting the Max Degree of Parallelism option to 1 when MAXDOP is not used explicitly used in any of the query or index creatio B: The default setting for the Max Degree of Parallelism option will not override the MAXDOP setting. MAXDOP overrides the default setting of the Max Degree of Parallelism option. Also, the default setting for Max Degree of Parallelism option is 0, not 2 "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

15

Microsoft 70-450: Practice Exam C: The option stating that all four processors will be used for index creation is incorrect. As stated in the scenario. MAXDOP is set to use three processors.

QUESTION NO: 17 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 containing multiple processors and has an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to create a large volume of indexes and delete older indexes whilst optimizing CPU performance on CERTKILLER-DB01. What should you do? A. You should consider making use of the MAXDOP index option in the index statement. B. You should consider making use of the MAXDOP index option with the ALTER INDEX REORGANIZE statement. C. You should consider setting the Max Degree of Parallelism option to 0. D. You should consider setting the Max Degree of Parallelism option to 1. Answer: A

Explanation: You should use the MAXDOP index option in the index statement to optimize the CPI performance on SQL Server 2008. The number of processors that can be used for all query and index operations is set using the Max Degree of Parallelism option, which by default is set to 0. The default option, 0, uses the actual number of processors installed in the system for parallel execution plans for queries and index operations. When you want to use a specific number of processors for an individual query or index operation, you can use the MAXDOP query hint or index option to provide better control. MAXDOP overrides the settings defined in the Max Degree of Parallelism option. The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint or index option. MAXDOP can also be used with online index creation, and allows you to restrict the number of processors in the SQL Server 2008 server to be used in the online index creation. MAXDOP overrides the Max Degree of Parallelism option with index creation as well. Incorrect Answers: B: You should not set the Max Degree of Parallelism option to 1. When you set the Max Degree of Parallelism option to 1, the parallel plan generation is suppressed. The query execution is no longer executed in parallel, and is executed in serial. You cannot use the MAXDOP index option with the ALTER INDEX REORGANIZE statement. C: You should not set the Max Degree of Parallelism option to 0. This is the default value defined for this setting. With the default value as 0, this option uses the actual number of processors "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

16

Microsoft 70-450: Practice Exam installed in the system for parallel execution plans for queries and index operations. D: You can use the MAXDOP index option with SQL statements, such as CREATE INDEX, ALTER INDEX REBUILD, and DROP INDEX, used for clustered indexes, ALTER TABLE ADD (index) CONSTRAINT, and ALTER TABLE DROP CONSTRAINT, used for clustered index.

QUESTION NO: 18 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CERTKILLER-DB01 has four quad-core processors and regularly experiences CPU pressure. The users at CertKiller.com use the large mission critical database frequently, which resides on CERTKILLER-DB01. During the course of the day you receive an instruction from the CIO to make sure that the online index rebuilds does not utilize all thye CPU cycles that are available. What should you do?

Answer: A

QUESTION NO: 19 You work as a database administrator at CertKiller.com. Your duties include administrating a SQL Server 2008 instance. You are currently planning to deploy a new database named CK_Data to the 2008 instance. CK_Data will have multiple schemas as well as being subjected to regular inserts and updates. A large amount of read-only reference information will be hosted on one of the schemas. You have received instructions from the management to set up a physical database structure to optimize the backup performance. What should you do? "Pass Any Exam. Any Time." - www.actualtests.com 17

Ac

Explanation: Part 3: Design physical database and object placement. (15 Questions)

tua

lTe

A. You should consider having the max degree of parallelism option configured. B. You should consider running the Netsh utility. C. You should consider using the Hyper-V feature on the quad-core servers. D. You should consider configuring the Background Intelligent Transfer Service (BITS) server extensions.

sts

.co

Microsoft 70-450: Practice Exam A. This can be accomplished by using multiple filegroups and a single log file to set up the database. B. This can be accomplished by using caching on the multiple data files. C. This can be accomplished by using multiple downstream servers to create the database. D. This can be accomplished by using the Database Engine Tuning Advisor tool to create the database. Answer: A

QUESTION NO: 20 You are employed as the database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01. CERTKILLER-DB01 is configured with 1024 MB of RAM, 80 GB system drive with SQL Server installed as well as a single Core2 Duo 1.6 GHz processor. CERTKILLER-DB01 hosts a database named CK_DATA. CK_DATA contains: One primary data fileTwo secondary data filesOne transaction log file. During routine monitoring you discover that the hard drive has only 2 GB of free space available. You notice that the performance of CK_DATA has degraded. You have received instruction from the CIO to optimize the performance of CK_DATA. What should you do?

A. Your best option would be to increase the memory to 2048 MB. B. Your best option would be to add additional hard drives as well as moving the database files across the hard drives. C. Your best option would be to compress the hard drive in order to create more space. D. Your best option would be to add a new processor to CERTKILLER-DB01. Answer: B Explanation: It is highly recommended that for better disk I/O usage, you place the data files and log files on different hard drives dedicated to these files. If you place all of them in the same hard drive, there is going to be a performance bottleneck. As a recommended practice, you should separate the database files and transaction log files on different disks, preferably disks attached to different disk controllers. As stated in the scenario, you have 2 GB space left in the drive that contains data and log files. To meet the required goal, you would need to add more hard drives in the system and move the data files and transaction logs on separate new hard drives. "Pass Any Exam. Any Time." - www.actualtests.com 18

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam Incorrect Answers: D: Adding new processors or increasing memory will not help in this scenario. The problem is with the hard drive free space. Adding a new processor or more RAM to the server will not resolve the issue stated in the scenario.

QUESTION NO: 21 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 hosts a database named CK_DATA. You are in the process of adding additional tables to CK_DATA in order to support the new application. The additional tables will BLOBs that is greater than 1 MB. You need to maximize the read access. At present the application makes use of a middle tier for application logic. You need to determine the data type that needs to be configured for CK_DATA. What should you do?

Answer: D

Explanation: You should use FILESTREAM data when you are storing BLOBs that are on the average larger than 1MB. FILESTREAM data can take advantage of the NTFS file system and disk subsystem for the operating system to maximize read access. FILESTREAM should be used if the applications that you are implementing use a middle tier for application logic. FILESTREAM data must use a datatype of varbinary ( max). Incorrect Answers: A: You should not store BLOBS in the database if the objects are larger than 1 MB and fast read access is important. B: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage. C: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage.

QUESTION NO: 22

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. You should consider configuring the varbinary(max) data that is stored in CK_DATA. B. You should consider configuring the varchar(max) data using FILESTREAM storage on an NTFS partition. C. You should consider configuring the varchar(max) data stored in CK_DATA. D. You should consider configuring the varbinary(max) data using FILESTREAM storage on an NTFS partition.

sts

.co

19

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. You are responsible for a Microsoft SQL Server 2008 server named CERTKILLER-DB01. CERTKILLER-DB01 contains two hard drives named Drive B and Drive C. Both these drives have at least 50 GB of free space available. CERTKILLER-DB01 has one transaction log file and three data files that contain large indexes. You receive an instruction from the CIO to optimize performance of the database. The data files as well as the transaction files is stored in currently stored on Drive A. Drive A also contains the system drive where CERTKILLER-DB01 is installed. Due to budgetary constraints you are unable to add additional hard drives on CERTKILLER-DB01. What should you do? A. This can be accomplished by installing a new SQL Server instance on CERTKILLER-DB01. Thereafter the database should be moved to the new SQL Server instance. B. This can be accomplished by placing the transaction log file on Drive B and keeping the database files on the same location. C. This can be accomplished by moving the largest data file from Drive A to Drive B and leaving the remaining files in the same location. D. This can be accomplished by moving the files to Drive B. Answer: B

Explanation: When data is written on to a database, the transaction log file is the file that records this activity. In most SQL Server environments, the transaction log file is one of the most used files, as it keeps writing information based on the transactions that were either committed to the database or rolled back. As this file writes every change that occurs in the database, it needs more processing power than the data files. Therefore, Microsoft recommends you have the transaction log on a separate drive. Even the data files should be stored on separate drives. It is highly recommended that for better disk I/O usage, you should place data files and log files on different hard drives dedicated for these files. If you place all of them in the same hard drive, there is going to be a performance bottleneck. As a recommended practice, you should separate the database files and transaction log files on different disks, preferably disks attached to different disk controllers. As stated in the scenario, you have 2 GB space left in the drive that contains the data and log files. As a recommended practice, you should have data files and transaction log on separate drives to achieve better performance throughput of the database. Incorrect Answers: A: You should not install a new SQL Server instance on the computer and move the database to the new SQL Server instance. This change will not make any difference in the performance of the database in this scenario if the database files and the log files are not separated. Installing a second SQL Server instance will actually slow performance because you will have two instances of SQL Server competing for resources on the same computer. C: You should not move the biggest data file to Drive B and keep the remaining files in the same "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

20

Microsoft 70-450: Practice Exam location on Drive 0, or move all four files to Drive B. As a recommended practice, you should move the transaction log file to a separate hard drive. D: You should not move the biggest data file to Drive B and keep the remaining files in the same location on Drive 0, or move all four files to Drive B. As a recommended practice, you should move the transaction log file to a separate hard drive.

QUESTION NO: 23 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which is accessed frequently by network users updating the CK_SALES database records for online users. CertKiller.com wants you to monitor the transaction log activities being performed on CERTKILLER-DB01.

Answer: C

Explanation: The SQL Server: Databases object contains counters that help you monitor backup/restore throughput, transaction log activities, and bulk copy operations. There are a number of counters used for monitoring log-related activities. Some of these counters are Log Bytes Flushed/sec, Log Cache Hit Ratio, Log Cache Reads/sec, Log File(s) Size (KB), Log Growths, and Percent Log Used. You should not use the SQL Server: General Statistics object to monitor the transaction log activities. Using this object, you can capture information on number of current connections to the SQL Server. Incorrect Answers: A: You can also view the number of users who either connect or disconnect with the SQL Server instance. However, this object cannot be used for monitoring transaction log activities. You should not use the SQL Server: SQL Statistics object to monitor the transaction log activities. This object contains counters used for monitoring the compilation and recompilations of user queries sent to an instance of SQL Server. However, this object cannot be used for monitoring the transaction log activities. B: You should not use the SQL Server: Workload Group Stats object to monitor the transaction log activities. This object contains counters that monitor the performance of the Resource Governor Workload group. However, this object cannot be used for monitoring the transaction log activities. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

A. You should consider making use of the SQL Server: SQL Statistics object. B. You should consider making use of the SQL Server: Workload Group Stats object. C. You should consider making use of the SQL Server: Databases object. D. You should consider making use of the SQL Server: General Statistics object.

.co

What should you do?

21

Microsoft 70-450: Practice Exam D: You can also view the number of users who either connect or disconnect with the SQL Server instance. However, this object cannot be used for monitoring transaction log activities. You should not use the SQL Server: SQL Statistics object to monitor the transaction log activities. This object contains counters used for monitoring the compilation and recompilations of user queries sent to an instance of SQL Server. However, this object cannot be used for monitoring the transaction log activities.

QUESTION NO: 24 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which is used for an online application generating large volumes of transactions on a daily basis including update and insert operations. During the course of the day you receive instruction from CertKiller.com to make use of a number of indexes for update and insert operations whilst optimizing the indexing operations. CertKiller.com wants you to additionally locate the indexes which are most frequently used for performing the update and insert operations.

Answer: D

Explanation: The sys.dm_db_index_usage_stats dynamic management view allows you to track which index is most frequently used for update and insert operations. Using this view, you can track when an index was last used. This view also tracks the type of indexes used for update and insert operations. Every time an index is used for an operation such as an update, the counter of the index in the view is incremented by one. This view is also used for tracking unused indexes, which typically cause maintenance overhead. If you have a performance-related concern, you can use the Database Engine Tuning Advisor to recommend indexes for a single or multiple databases. The Database Engine Tuning Advisor can work with different types of indexes, such as clustered or nonclustered , and to resolve unused or potential index issues. Incorrect Answers: A: The sys.dm_db_index_physical_stats function is a replacement of the DBCC SHOWCONTIG statement from the previous version of SQL Server. This function returns the defragmentation of indexes and data. The indexes and data can be part of a specific view or a table. This function will "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. You should consider making use of the sys.dm_db_index_physical_stats view or function. B. You should consider making use of the sys.dm_db_index_operational_stats view or function. C. You should consider making use of the sys.dm_fts_index_population view or function. D. You should consider making use of the sys.dm_db_index_usage_stats view or function.

sts

What should you do?

.co

22

Microsoft 70-450: Practice Exam not be able to track indexes that are most frequently used for update and insert operations, and therefore should not be used. B: The sys.dm_db_index_operational_stats function can be used to obtain details of a partition of a table or about an index. This function will not be able to track indexes that are most frequently used for update and insert operations, and therefore should not be used. C: The sys.dm_fts_index_population view displays only the full-text indexes that are currently in use. Any full-text index that is not currently being used is not displayed in this view. This view will not be able to track indexes that are most frequently used for update and insert operations, and therefore should not be used.

QUESTION NO: 25 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you added four disk drives to CERTKILLER-DB01 which configuration are shown below: Disk Drive 1: 40 GB. System drive with SQL Server installed.Disk Drive 2: 40 GB. System drive with SQL Server installed.Disk Drive 3: 60 GB. Formatted and with 35 GB free.Disk Drive 4: 60 GB. Formatted with 38 GB free. CertKiller.com plans on creating an additional database named CK_PRODUCTS which will have a primary data file and secondary data file with one transaction log file which is expected to have high utilization in the production environment. CertKiller.com wants you to optimize the performance of the database. What should you do?

A. You should consider having the primary data files placed on Drive 1 and the transaction log file on Drive 2 with the secondary data file on Drive 3. B. You should consider having the primary data files placed on Drive 2 and the transaction log file on Drive 3 with the secondary data file on Drive 4. C. You should consider having the primary and secondary data files placed on Drive 2 and the transaction log file on Drive 3. D. You should consider having the primary and transaction log files placed on Drive 2 and the secondary data file on Drive 3. Answer: B Explanation: To meet the required goal, you should place the primary data files on Drive2, the transaction log file on Drive3, and the secondary data file on Drive4. It is highly recommended that for better disk "Pass Any Exam. Any Time." - www.actualtests.com 23

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam I/O usage, you place data files and log files on different hard drives dedicated to these files. If you place all of them on the same hard drive, there is going to be a performance bottleneck. As a recommended practice, you should separate database files and transaction log files on different disks, preferably disks attached to different disk controllers. As stated in the correct option, you are placing these files on different hard drives, which will provide the best performance throughput. You should avoid placing the data files and transaction log files on the same drive as the system drive. Disk operations for SQL Server, such as reads and writes, will be competing with reads and writes for the operating system. You should group similar I/O characteristics on common spindles. SQL Server performance depends heavily on the I/O subsystem. You should not have the Windows operating system and SQL Server overload a disk with I/O traffic. Incorrect Answers: A: You should not place the primary data files on Drive l, the transaction log file on Drive 2, and the secondary data file on Drive 3. Placing the primary data files on the drive that contains the Windows operating system (Drivel) will cause a performance bottleneck, and is not recommended by Microsoft. There will be high I/O usage of Drivel, which will degrade database performance. Also, in case of disk failure, both the Windows operating system and the primary data files can be at risk if appropriate backup solutions are not in place. C: You should not place the primary and secondary data files on Drive l and the transaction log file on Drive 2. As a recommended practice, if possible, all data files and transaction logs should be kept on separate drives for better I/O usage of the hard drive. You get better throughput of the hard drive when there are fewer I/O operations. D: You should not place primary and transaction log files on Drive l and the secondary data file on Drive 2. As a recommended practice, if possible, all data files and transaction logs should be kept on separate drives for better I/O usage of the hard drive. You get better throughput of the hard drive when there are fewer I/O operations.

QUESTION NO: 26

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you create a partitioned data fact table which is large requiring data to be stored across several disks. CertKiller.com is aware of the partitioning functions which horizontally split tables based on the value in a specific column. CertKiller.com wants you to implement a sliding window scenario switching partitions into and out of the table whilst archiving the oldest data to improve performance.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

24

Microsoft 70-450: Practice Exam What should you do? A. You should make use of the statement: ALTER PARTITION FUNCTION and MERGE RANGE. B. You should make use of the statement: ALTER TABLE and MERGE RANGE. C. You should make use of the statement: ALTER PARTITION FUNCTION and SPLIT RANGE. D. You should make use of the statement: ALTER TABLE and SPLIT PARTITION. Answer: A Explanation: The alter partition function statement can be used to merge or split a partition based on values. The following partition function creates partitions: CREATE PARTITION FUNCTION AutoPartsRangePFl ( int )AS RANGE LEFT FOR VALUES (1, 500, 1000);GO The following function can merge the partitions between boundary values 1 and 500 and between boundary values 500 and 1000 to create a single partition between boundary values 1 and 1000: ALTER PARTITION FUNCTION AutoPartsRangePF1 ( ) MERGE RANGE (500); Incorrect Answers: B: You cannot use the alter table statement with either split range or merge range, split range or merge range can only be used with the alter partition function statement. C: You should not use alter partition function and split range. This would split one partition of a partitioned table into two partitions. In this scenario, you want to combine two partitions of a partitioned table into one partition. D: You cannot use the alter table statement with either split range or merge range, split range or merge range can only be used with the alter partition function statement.

QUESTION NO: 27

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 used to test applications and packages and CERTKILLER-DB02 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to move the maintenance and backup jobs from CERTKILLER-DB01 running SQL Server 2008 Developer edition to CERTKILLER-DB02 running SQL Server 2008 Enterprise Edition. CertKiller.com is aware that the hardware of both servers is similar. What should you do? (Choose two) A. You should consider making use of the sp_add_jobserver stored procedure to move the two jobs from CERTKILLER-DB01 to CERTKILLER-DB02. B. You should consider making use of the sp_add_jobstep stored procedure to move the two jobs from CERTKILLER-DB01 to CERTKILLER-DB02. "Pass Any Exam. Any Time." - www.actualtests.com 25

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam C. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore the backup on CERTKILLER-DB02. D. You should consider making use of a Script Job on the two jobs on CERTKILLER-DB01and run the scripts on CERTKILLER-DB02. E. You should consider making use of the sp_add_job stored procedure to move the two jobs from CERTKILLER-DB01 to CERTKILLER-DB02. Answer: A,D Explanation: You should use Script Job as on the two jobs on CERTKILLER-DB01 and run the scripts on CERTKILLER-DB02. You can script a current job by using the SQL Server Management Studio (SSMS). You can highlight the job and choose Script Job as. You can script the job to a file or to the query window for editing. Once you have scripted the job, you can run the script to create the jobs on CERTKILLER-DB02. You can use sp_add jobserver to move the jobs from CERTKILLER-DB01 to CERTKILLERDB02. This stored procedure can be used to assign a job to run on a different server. The job must exist on a source server. You must have a target server registered to assign a multiserver job to it. In this scenario, CERTKILLER-DB01 has the two jobs. You must register CERTKILLER-DB02 as the target server. The following code assigns the multiserver job Backup Job Orders to CERTKILLER-DB02: USE msdb ; GO EXEC dbo.sp _add_jobserver@job_name = N' BackupJobOrders ',@ server_name = N'CERTKILLER-DB02; GO Incorrect Answers: B: You should not use sp_add Jobstep to move the two jobs from CERTKILLER-DB01to CERTKILLER-DB02. This stored procedure is used to add a step to a multistep job. This stored procedure cannot be used to move or copy a job to another server. C: You should not back up the msdb database on CERTKILLER-DB01and restore it on CERTKILLER-DB02. The msdb database stores jobs, operators, alerts, and backup history. If you backup the msdb database from one server and restore it on another server, you will overwrite any jobs, operators or alerts that currently exist on the destination server. In this scenario, you only wanted to copy two jobs to SQL1. You would not be able to restore the msdb database on CERTKILLER-DB02because CERTKILLER-DB01and CERTKILLER-DB02have different builds and different editions of SQL Server. You can only restore system databases on the same build and same edition of SQL Server. E: You should not use sp_addjob to move the two jobs from CERTKILLER-DB01to CERTKILLERDB02. This stored procedure is used to create a job. This stored procedure cannot be used to move or copy a job to another server. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

26

Microsoft 70-450: Practice Exam

QUESTION NO: 28 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to create a full-text index in the database containing multiple tables. CertKiller.com wants to know the amount of full-text indexes will be created in the database. What should you do? (Choose two) A. You would only be able to create multiple full-text indexes per table. B. You would only be able to create multiple full-text indexes per view created with the encryption option. C. You would only be able to create one full-text index per database. D. You would only be able to create one full-text index per view created with the encryption option. E. You would only be able to create multiple full-text indexes per view created with the schemabinding option. F. You would only be able to create one full-text index per table. G. You would only be able to create one full-text index per view created with the schemabinding option. Answer: F,G

Explanation: For a full-text index, you must have a catalog in the database to store the full-text index. Full-text indexes cannot be placed anywhere except in full-text catalogs. Therefore, full-text catalogs must exist. Only one full-text index can be created per table or indexed view. An indexed view can only be created if it the view is created with the schehabinding option. A full-text catalog can hold multiple full-text indexes. It is highly recommended that tables and full-text indexes refer to the same full-text catalog. There can be multiple full-text indexes per database because a database can have multiple tables, and each table can have maximum of one full-text index. Therefore, each database is capable of having as many full-text indexes as the number of tables it contains. Incorrect Answers: A: You cannot have multiple full-text indexes per view created with the encryption option. Only an indexed view can have a full-text index. You can create an indexed view by using the schehabinding option, not the encryption option. The encryption option hides the source code of the view from being seen. B: You cannot have multiple full-text indexes per view created with the encryption option. Only an indexed view can have a full-text index. You can create an indexed view by using the schehabinding option, not the encryption option. The encryption option hides the source code of "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

27

Microsoft 70-450: Practice Exam the view from being seen. C: There can be only one full-text index per table, one full-test index per indexed view, and multiple full-text indexes per database. D: There can be only one full-text index per table, one full-test index per indexed view, and multiple full-text indexes per database. E: You cannot have multiple full-text indexes per view created with the encryption option. Only an indexed view can have a full-text index. You can create an indexed view by using the schehabinding option, not the encryption option. The encryption option hides the source code of the view from being seen.

QUESTION NO: 29 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a number of databases. During the course of the day you receive instruction from CertKiller.com to increase the performance of the database containing several large tables. CertKiller.com wants you to make use of partitioning to improve the performance whilst also segregate old data from the existing queries to return faster results. CertKiller.com wants you to have the table split into multiple tables with fewer rows than parent table and equal number of columns spread across tables. What should you do?

Answer: C

Explanation: You should use the horizontal partitioning method to improve database performance. This method allows you to divide a single large table into multiple smaller tables with fewer rows and an equal number of columns. Horizontal partitioning allows you to reduce the table data depending on your requirements. For instance, if a table contains data from the last ten years, and you frequently access only the current year's data, you can horizontally partition the table into 12 tables. Each table in this method would represent data for a specific year. Database performance is enhanced because you are accessing only a specific year's data from an individual table when queries are executed. Therefore, it provides quicker response time and enhanced data performance because less data is scanned. Incorrect Answers:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. You should consider making use of hardware partitioning. B. You should consider making use of normalization partitioning. C. You should consider making use of horizontal partitioning. D. You should consider making use of vertical partitioning.

lTe

sts

.co

28

Microsoft 70-450: Practice Exam A: You should not use hardware partitioning. This method uses hardware architecture to improve database performance. This method does not split the database tables to improve performance. Two examples of hardware partitioning are multiprocessors, which execute multiple threads, and RAID devices, which stripe data across multiple disks that are part of the RAID array. B: You should not use normalization. This method is an example of vertical partitioning. Normalization is used to remove redundant columns from a table. The removed columns are moved to secondary tables. The secondary tables must be linked with the table from which you are removing redundant columns. D: You should not use vertical partitioning. In vertical partitioning, there are more rows and a reduced number of columns across tables. In this method, the number of columns is reduced across the tables when a table is split. This method also improves database performance, but as stated in the scenario, there should be fewer rows in the tables with an equal number of columns across tables. This method does not achieve this goal.

QUESTION NO: 30

What would the result be?

A. The current subscription would result in the table having fewer rows and the columns unchanged. B. The current subscription would result in the table having the columns and rows unchanged. C. The current subscription would result in the table having the rows unchanged and fewer columns. D. The current subscription would result in the table having fewer columns and rows. Answer: A Explanation: When you apply horizontal partitioning on a table that contains a large number of rows, you will be able to split the table into fewer rows and the same number of columns. With horizontal partitioning, the number of rows is split across multiple tables but the number of columns remains the same. You gain a performance benefit because you will have fewer rows to work with. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs. "Pass Any Exam. Any Time." - www.actualtests.com 29

Ac

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. The CK_SALES database currently has more than 11 million rows and twenty columns. During the course of the day you receive instruction from CertKiller.com to replicate the data to several subscribers. CertKiller.com wants you to have the data partitioned horizontally for a transformable subscription and know what the results will be when the subscription is received during replication.

sts

.co

Microsoft 70-450: Practice Exam As an example, you can split the table into four different tables where each table represents data for a specific quarter for the year. However, in this type of partitioning, the number of columns always remains the same across multiple tables. In vertical partitioning, you will have the same number of rows but fewer columns. In vertical partitioning, the columns are divided amongst multiple tables with the same number of rows. Vertical partitioning can be of two types: normalization and row splitting. In normalization, redundant columns are removed from the primary table and moved into secondary tables. The redundant columns are then linked with the primary table using primary or foreign key. In row splitting, fewer columns are retained, which means that each row contains a portion of the logical row in the partitioned table.

QUESTION NO: 31 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to fine tune CERTKILLER-DB01 by reducing the size of the backup logs and logs appended with every successful backup operation whilst avoiding entry in the error log when a successful backup is performed. What should you do?

Answer: A

Explanation: To meet the required goal in the scenario, you should set the trace flag 3226. When you add this flag, it has the following effects: Successful backup entries are not added to the SQL Server error logs. Entries are prohibited from being logged in the System event log. Only failed backup event entries are logged. No successful backup entries are logged. You should ensure that no script is dependent on any successful backup entries that are logged either in the error log or in the System event log. A trace flag can be either specific to a session or a global trace flag. A trace flag can be switched on or off by using the dbcc traceon and dbcc "Pass Any Exam. Any Time." - www.actualtests.com 30

Ac

A. You should consider making use of the 3226 flag. B. You should consider making use of the 3625 flag. C. You should consider making use of the 1204 flag. D. You should consider making use of the 1222 flag.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam traceoff commands. Incorrect Answers: B: You should not set the trace flag 3625. This trace flag reduces the amount of information that is returned in an error message. C: You should not set the 1204 or 1222 trace flags. The only difference between the two is that the 1222 trace flag returns the output in an XML format, but the 1204 does not. The XML generated by the 1222 trace flag contains the information on the resources and types of locks in a deadlock. Both trace flags also return the current command that is affected by the deadlock. D: You should not set the 1204 or 1222 trace flags. The only difference between the two is that the 1222 trace flag returns the output in an XML format, but the 1204 does not. The XML generated by the 1222 trace flag contains the information on the resources and types of locks in a deadlock. Both trace flags also return the current command that is affected by the deadlock.

What should you do?

A. The best option is to use the default.trc file for the database. B. The best option is to use the data collector for the database. C. The best option is to create numerous data files for the database. D. The best option is to use the Network Load Balancing for the database. Answer: C

QUESTION NO: 33 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a "Pass Any Exam. Any Time." - www.actualtests.com 31

Ac

tua

CertKiller.com wants you to implement a transactional database on CERTKILLER-DB01 which is expected to have high volumes of INSERT, UPDATE and DELETE activities. The CertKiller.com CIO wants you to enhance the performance of the database by maximizing bandwidth and reducing the connection in the storage allocation structure.

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance. CERTKILLER-DB01 is configured to host a database named CK_SALES. The hardware configuration of CERTKILLER-DB01 is shown below: CERTKILLER-DB01 has 64-GB of RAM.CERTKILLER-DB01 has four quad-core processors.CERTKILLER-DB01 has several independent raid volumes.

sts

.co

QUESTION NO: 32

Microsoft 70-450: Practice Exam database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a new database to CERTKILLER-DB01 which will regularly received inserts and updates. CertKiller.com is aware that the database will have numerous schemas however, with one schema having a huge amount of read-only reference data. CertKiller.com wants you to set up the database structure for best possible backup performance. What should you do? A. The best option is to use multiple filegroups and a single log file to create the database. B. The best option is to use the master database to create the database. C. The best option is to use resource database and a single log file to create the database. D. The best option is to use SQL Server registry hive and multiple filegroups to create the database. Answer: A

QUESTION NO: 34

You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance. At present the instance makes use of a 32-bit version on a Windows Server 2008 64-bit server. CertKiller.com has enabled the awe option. You expect the instance to get an increase in the query actions. You have received instructions from the CIO to use the best time to migrate the databases to a 64-bit SQL Server 2008 server without changing the hardware. To comply with the instructions, you need to the suitable data collector type that will supply you with the necessary data. What should you do? A. The best option is to use the Performance Counters collector. B. The best option is to use the default.trc file. C. The best option is to use the Merge Replication topology. D. The best option is to use the Hyper-V feature. Answer: A

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

Explanation: Part 4: Design a migration, consolidation, and upgrade strategy. (6 Questions)

32

Microsoft 70-450: Practice Exam QUESTION NO: 35 CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently makes use of a Microsoft SQL Server 2008 server named CERTKILLER-DB01 that contains a number of databases. During routine monitoring you discovered an increase in the amount of queries. You check and discover that the performance of CERTKILLER-DB01 has degraded. To ensure that a high level of productivity is maintained you decide to install an additional SQL Server 2008 server on the network. After the installation you will move a number of databases from CERTKILLER-DB01 to the new server. You should also ensure that compression is enabled in the new server. You need to determine the appropriate SQL version that should be installed on the new server. What should you do? (Choose all that apply.) A. You should consider installing SQL Server 2008 Standard edition. B. You should consider installing SQL Server 2008 Developer edition. C. You should consider installing SQL Server 2008 Enterprise edition. D. You should consider installing SQL Server 2008 Express edition. Answer: B,C

Explanation: SQL Server 2008 supports compression at row-level and page-level for both tables and indexes. You can use the create table and create index statements to create compressed tables and indexes. To modify the compression state of an existing table, index, or partition, you can use the alter table or alter index statements. However, configuring row and page compression can affect the performance of your sever. When you configure row and page compression, CPU utilization is increased, while I/O utilization and memory utilization are decreased. Incorrect Answers: A: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition because these editions of SQL Server 2008 do not support compression. D: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition because these editions of SQL Server 2008 do not support compression.

QUESTION NO: 36 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2005 (32-bit) Express for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to upgrade CERTKILLER-DB01 to Microsoft SQL Server 2008. "Pass Any Exam. Any Time." - www.actualtests.com 33

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam CertKiller.com wants to know which SQL Server 2008 edition CERTKILLER-DB01 can be upgraded to from SQL Server 2005 (32-bit) Express? A. You would be able to upgrade to SQL Server 2008 Enterprise B. You would be able to upgrade to SQL Server 2008 Standard C. You would be able to upgrade to SQL Server 2008 Workgroup D. You would be able to upgrade to SQL Server 2008 Express Advanced E. You would be able to upgrade to SQL Server 2008 Express Answer: C,D,E Explanation: These are the only editions of SQL Server on the supported upgrade path from SQL Server 2005 (32-bit) Express. You cannot upgrade SQL Server 2005 to SQL Server 2008 Standard, Enterprise , or Workgroup. If you want to use a version other than SQL Server 2008 Express or SQL Server 2008 Express Advanced, you will have to perform a clean installation, and not an upgrade. You can upgrade a server running SQL Server 2005 (32-bit) Standard Edition to SQL Server 2008 Standard Edition. You can upgrade a server running SQL Server 2005 (32-bit) Enterprise Edition to SQL Server 2008 Enterprise Edition.

QUESTION NO: 37

What should you do? A. You should AWE Enabled option set to 1 on CERTKILLER-DB01. B. You should consider recreating logins and user objects in the system databases. C. You should ensure that the databases are published in replication on SQL Server 2005. D. You should consider having the Show Advanced Options set to 1 on CERTKILLER-DB01. Answer: B Explanation: In this case, you will also need to recreate any existing logins in the three system databases: master, msdb , and model. To be able to migrate databases from a 32-bit version of SQL Server to "Pass Any Exam. Any Time." - www.actualtests.com 34

Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 64-bit for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to migrate a database from a 32-bit version of SQL Server 2005 to CERTKILLER-DB01 using SQL Server 2008 64-bit. You have successfully detached and reattached the databases from SQL Server 2005 to SQL Server 2008. CertKiller.com wants you to ensure that the database will be successfully migrated.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam a 64-bit version of SQL Server, you need to ensure that the databases are not published in the replication on SQL Server 2005, and you need to detach the databases from the 32-bit version. After they are detached, these databases must be attached to the 64-bit SQL Server. It is also mandatory to re-create the user logins and user objects in the system databases: master, msdb , and model. Incorrect Answers: A: You should not set the AWE Enabled option to 1. You cannot configure AWE support on a 64bit platform. AWE is designed for and supported only on 32bit versions of Windows 2000 Server and Windows Server 2003. With the help of AWE, you can allow SQL Server to access the physical memory above the limit that is configured on the virtual memory. AWE works differently both on Windows 2000 Server and Windows Server 2003. In Windows 2000 Server, AWE support can only be activated when there is more physical memory than virtual memory, after which it locks the amount of memory specified in max server memory. If max server memory limit is more than the physical memory, all memory except 128 MB is locked. In Windows Server 2003, SQL Server allows dynamic allocation of AWE mapped memory. AWE mapped memory can be taken or returned to the operating system as and when required by SQL Server C: You should not ensure that the databases were published in replication on SQL Server 2005. The databases from a 32-bit version of SQL Server cannot be restored to a 64-bit version of SQL Server 2008 if they are published in the replication. The databases first must be detached from the source SQL Server and then reattached to the 64-bit SQL Server. However, you must ensure that the databases are not published in replication. If they are published, you will not be able to migrate them to the 64-bit SQL Server. D: You should not set the Show Advanced Options to 1. This option would be used when you are enabling AWE support on a 32-bit system, but it should not be enabled on a64-bit system, which is the target of the migration in this scenario. You would also enable this option when using parallelism, which is not the case in this scenario.

QUESTION NO: 38

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2005 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to install SQL Server 2008 Standard Edition on a new server running Windows Server 2003 64-bit. CertKiller.com wants you to migrate the existing databases from CERTKILLER-DB01 to the new server. CertKiller.com wants to know which facts below are true about migrating databases to SQL Server 2008 on a 64-bit computer? A. The migration of this type will need to have Microsoft Windows Address Windowing Extensions (AWE) API support enabled on the 64-bit platform to take advantage of existing memory. "Pass Any Exam. Any Time." - www.actualtests.com 35

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam B. The migration of this type would require you to enable the /3gb parameter in the boot.ini file. C. The migration of this type would be done to the Windows on Windows (WOW64) 32-bit subsystem D. The migration of this type would have you being able to restore database to a 64-bit version of SQL Server 2008 if published in the replication. Answer: C Explanation: With WOW64, 32-bit processes run as if they are running on the 32-bit system, not a 64-bit system. The operating system holds a directory named SYSWOW64 under the Windows directory. This directory holds the 32-bit files that enable a 32-bit application to run on a 64-bit system. In this scenario, you will be able to successfully migrate 32-bit SQL Server databases to the 32-bit SQL Server on a 64-bit system because they will be installed to the WOW64 32-bit subsystem. Incorrect Answers: A: You cannot configure Microsoft Windows Address Windowing Extensions (AWE) API support on a 64-bit platform. AWE is supported only on the 32-bit versions of Windows 2000 Server and Windows Server 2003. With the help of AWE, you can allow SQL Server to access physical memory above the limit configured on the virtual memory. AWE works differently on Windows 2000 Server and Windows Server 2003. In Windows 2000 Server, AWE support can only be activated when there is more physical memory than virtual memory, after which it locks the amount of memory specified in max server memoiy. If the max server memory limit is more than the physical memory, then all memory except 128 MB is locked. In Windows Server 2003, SQL Server allows the dynamic allocation of AWE mapped memory. AWE mapped memory can be taken from or returned to the operating system as required by SQL Server. B: You will not need to enable the /3gb parameter in the boot.ini file. If you have 4 GB of memory in a system, then by default 2 GB each are split between the operating system and the installed applications. You can reduce the amount of memory assigned to the operating system and allocate more memory by using the /3gb parameter in the boot.ini file. However, this parameter does not affect the migration of databases. D: The databases from a 32-bit computer running SQL Server 2008 cannot be restored to a 64-bit computer running SQL Server 2008 if they are published in the replication. The databases first must be detached from the source SQL Server and then reattached to the 64-bit SQL Server. However, you must ensure that the databases are not published in replication. If they are published, you will not be able to migrate them to the 64-bit SQL Server. In this case, you will also need to recreate any existing logins in the system databases: master, msdb, and model.

QUESTION NO: 39 You work as a database administrator at CertKiller.com. CertKiller.com domain is named CertKiller.com and currently makes use of Microsoft SQL Server 2008 and Microsoft SQL Server 2005 for hosting databases. You are responsible for administering the company's database "Pass Any Exam. Any Time." - www.actualtests.com 36

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam servers. The SQL Server configuration for the database servers in the CertKiller.com domain are shown in the exhibit below:

CertKiller.com wants you to ensure that all weyland.com clients are able to make use of Kerberos authentication when accessing database servers in the CertKiller.com domain. What should you do?

Answer: C

Explanation: The weyland.com domain is in a separate forest from CertKiller.com. For Kerberos authentication to work between domains in separate forests, a trust must exist between the two domains. The use of Kerberos authentication with SQL Server requires a Service Principal Name (SPN) registered with Active Directory, and a client and server that are in the same domain or have a trust relationship between different domains. The SPN maps to the Windows account associated with the SQL Server instance. Incorrect Answers: A: You should not disable the named pipes protocol. Kerberos authentication in SQL Server 2008 can be used with TCP/IP, named pipes, or shared memory protocols, as long as the client and SQL Server have the TCP/IP network layer protocol bound to their respective network adapters. "Pass Any Exam. Any Time." - www.actualtests.com 37

Ac

A. You should consider having the named pipes protocol disabled on the database servers in the CertKiller.com domain. B. You should consider having the VIA protocol enabled on the database servers in the CertKiller.com domain. C. You should consider creating a trust relationship between the weyland.com domain and the CertKiller.com domain. D. You should consider having the Service Principal Name (SPN) deactivated for the database servers in the weyland.com domain.

tua

lTe

sts

.co

CertKiller.com recently partnered with Weyland Industries which has their own Active Directory domain named weyland.com. All servers at Weyland Industries are running Windows Server 2003. The weyland.com domain runs a mix of Microsoft SQL Server 2005 and Microsoft SQL Server 2008 database servers.

Microsoft 70-450: Practice Exam The client and SQL Server must have the TCP/IP network layer protocol bound to the network adapter card to use Kerberos authentication with a domain controller in an Active Directory domain. For the client to use Kerberos authentication with a SQL Server server in an Active Directory domain, the client must be using the same SQL Server Network Configuration protocol. A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/IP network if both the client and the server are using the same named pipes protocol. B: You should not enable the VIA protocol. The VIA protocol is used with a Virtual Interface Adapter. Enabling or disabling the VIA protocol will not allow a SQL Server to use the Kerberos authentication. You must have a trust relationship between the domains to use Kerberos authentication. D: You should not deactivate the Service Principal Name (SPN) for the database servers in the weyland.com domain. You should have the SPN registered with Active Directory to use Kerberos authentication.

QUESTION NO: 40

You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 Reporting Services (SSRS) instance. You have received instructions from the CIO to set up an authentication method that uses SQL Server data connections for SSRS reports, that has the following criteria: the SSRS reports should use the Kerberos authentication protocol for communication. What should you do?

A. This can be accomplished by accessing the Active Directory directory service and register a service principal name (SPN) the SSRS instance. B. This can be accomplished by configuring the Roaming user profiles to make use of a domain account. C. This can be accomplished by configuring the VPN solution to make use of the Integrated Security type. D. This can be accomplished by configuring Background Intelligent Transfer Service (BITS) settings to make use of the Secure Sockets Layer (SSL) protocol. Answer: A

QUESTION NO: 41 CertKiller.com has hired you as a database administrator for their network. The CertKiller.com network contains ten of Microsoft SQL servers that run either SQL Server 2008 or SQL Server 2005. "Pass Any Exam. Any Time." - www.actualtests.com 38

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam You receive an instruction from the CIO to configure a Central Management Server in order to administer other SQL servers on the network. You need to follow the guidelines for creating Central Management Server to accomplish this task. What should you do? (Choose all that apply.) A. You need to ensure that the Central Management Server is a member of the Registered Servers group that it maintains. B. You need to ensure that the server acting as the Central Management Server is configured to run SQL Server 2008. C. You need to ensure that the Central Management Server as well as the subordinate servers is registered using Windows Authentication. D. You need to ensure that the Central Management Server as well as the subordinate servers is registered using SQL Server Authentication. Answer: B,C

Explanation: You must ensure that the server that will act as the Central Management Server must be running SQL Server 2008. Also, the Central Management Server and subordinate servers must be registered by using Windows Authentication. You can use Central Management Servers to administer multiple servers simultaneously. The Central Management Server uses server groups to maintain connection information for one or more instances of SQL Server. You can use Transact-SQL statements or Policy-Based Management policies to administer servers in server groups. After you configure a Central Management Server, you can create a query to display the resource usage, such as CPU and memory, on the servers that are members of the server group. You can designate only SQL Server 2008 servers as Central Management Servers. Incorrect Answers: A: The option stating that the Central Management Server must be a member of the Registered Servers group that it maintains is incorrect. The Central Management Server cannot be a member of a group that it maintains. D: The option stating that the Central Management Server and subordinate servers must be registered by using SQL Server Authentication is incorrect because Central Management Servers only support Windows Authentication.

QUESTION NO: 42 You work as a database administrator at CertKiller.com. The CertKiller.com domain is an Active Directory domain. All SQL servers on the CertKiller.com network run SQL Servers 2008 and all domain controllers Windows Server 2008.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

39

Microsoft 70-450: Practice Exam You are responsible for administering the SQL servers for the organization. Due to company growth, CertKiller.com acquires a rival company named Courseware Publishers. The newly acquired company does not have an Active Directory domain. However, it contains a workgroup with a SQL Server 2008 server named CERTKILLER-DB01 as well as numerous Windows XP clients. CERTKILLER-DB01 is configured as shown in the exhibit:

What should you do? A. You should consider enabling the TCP/IP protocol. B. You should consider enabling the VIA protocol. C. You should consider having a Service Principal Name (SPN) registered with Active Directory. D. You should consider disabling the named pipes protocol. Answer: C Explanation: You must have a Service Principal Name (SPN) registered with Active Directory for the clients of the CertKiller.com domain to use Kerberos authentication with the SQL Server from the "Pass Any Exam. Any Time." - www.actualtests.com 40

Ac

You receive an instruction from the CIO to incorporate computers from the Courseware Publishers workgroup into the CertKiller.com domain. You need to ensure that CertKiller.com users make use of Kerberos authentication in order to communicate with the SQL Server from the Courseware Publishers workgroup.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam Courseware Publishers workgroup. In the scenario, the SQL Server from Courseware Publishers will become part of the CertKiller.com domain. The client and SQL Server must be a part of the same domain or in a trusted domain to use Kerberos authentication. Once a SPN is registered, Active Directory acts as the Key Distribution Center (KDC) in a Windows domain, and the SPN will map to the Windows account that started the SQL Server instance. If the SPN registration fails or is not completed, Kerberos authentication will not be used because the Windows security layer cannot determine if a Windows account is associated with a particular SQL Server instance. Incorrect Answers: A: You do not have to enable the TCP/IP protocol. Kerberos authentication in SQL Server 2008 can be used with TCP/IP, named pipes, or shared memory protocols, as long as the client and SQL Server have the TCP/IP network layer protocol bound to their respective network adapters. The client and SQL Server must have the TCP/IP network layer protocol bound to the network adapter card to use Kerberos authentication with a domain controller in an Active Directory domain. For the client to use Kerberos authentication with a SQL Server server in an Active Directory domain, the client must be using the same SQL Server Network Configuration protocol. A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/ IP network if both the client and the server are using the same named pipes protocol. B: You should not enable the VIA protocol. The VIA protocol is used with a Virtual Interface Adapter. Enabling or disabling the VIA protocol will not allow a SQL server to use the Kerberos authentication. In this scenario, you must have a Service Principal Name (SPN) registered with Active Directory. D: You should not disable the named pipes protocol. Kerberos authentication can be used with TCP/IP, named pipes, or shared memory protocols.

QUESTION NO: 43 DRAG DROP

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to ensure that all client connections to CERTKILLER-DB01 make use of SSL if the clients support SSL encryption. CertKiller.com additionally wants clients not supporting SSL encryption to be denied access. What should you do? (Choose the correct options from the left and drag them to the right)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

41

Microsoft 70-450: Practice Exam

Answer:

QUESTION NO: 44

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to implement an application that will use the Service Broker service and allows workers to send sales orders to the CK_SALES database. CertKiller.com wants the application to guarantee the sender of the sales order will have the CK_SALES databse as the intended target since the database is not granted special privileges by the Service Broker service. CertKiller.com wants the requirements set below met: The application should have the initiating service protected from sending messages to the CK_SALES database.The application should have the target service protected from receiving messages from the CK_SALES database.The application should have the Service Broker encrypt messages transmitted over the network. What should you do? "Pass Any Exam. Any Time." - www.actualtests.com 42

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam A. You should consider making use of Full security. B. You should consider making use of Anonymous security. C. You should consider making use of Windows authentication. D. You should consider making use of Mixed Mode authentication. Answer: B Explanation: Anonymous security secures the initiating service when it sends messages to an untrusted database. Anonymous security would not protect the target service from receiving messages from the Orders database. In this scenario, the application uses the Server Broker service to send messages to the Orders database. Any messages sent from the application over the network to the Orders database will be encrypted when the conversation uses Anonymous security. In this scenario, the initiating service needs to identify the recipient of the work order, but the target service does not need to verify the identity of the initiating service. Therefore, the initiating service should run as a member of the fixed database role public in the Orders database. Incorrect Answers: A: You should not use full security for the Service Broker service. Full security would protect the initiating service from sending messages to the Orders database and help protect the target service from receiving messages from the Orders database. In this scenario, it is not necessary to protect the target service from receiving messages from the Orders database. C: You cannot set Windows authentication or Mixed Mode authentication on the Service Broker service. Windows authentication or Mixed Mode authentication can be set on the SQL Server. Windows authentication allows a Windows user account from a computer or domain to log on to a SQL server. D: Mixed Mode authentication allows both a SQL server login and a Windows user account from a computer or domain to be authenticated to SQL Anonymous and full security can work with either Windows authentication or Mixed Mode authentication.

QUESTION NO: 45 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure CERTKILLER-DB01 to additionally run SQL Server Report Services (SSRS) which will be used by client applications and Web browsers connecting to CERTKILLER-DB01. CertKiller.com is aware that the clients make use of Kerberos authentication and all use third-party Web browsers. CertKiller.com wants you to increase the security on the network so client applications and Web browsers only use Kerberos authentication to connect to CERTKILLER-DB01.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

43

Microsoft 70-450: Practice Exam What should you do? A. You should consider having the AuthenticationTypes set to RSWindowsNegotiate in the RSWebApplication.config file B. You should consider having the AuthenticationTypes set to RSWindowsKerberos in the RSWebApplication.config file C. You should consider having the AuthenticationTypes set to SWindowsNTLM in the RSReportServer.config file D. You should consider having the AuthenticationTypes set to RSWindowsKerberos in the RSReportServer.config file. Answer: D Explanation: You should configure the AuthenticationTypes setting to RSWindowsKerberos in the RSReportServer.config file to ensure that all client applications and third-party Web browsers use Kerberos authentication. In the RSReportServer.config file, you have the option to set the following AuthenticationTypes settings: RSWindowsNegotiate -Allows both Kerberos and NTLM authentication. RSWindowsKerberos - Used if you have applications that only use Kerberos authentication. RSWindowsNTLM - Used if you have applications cannot use Kerberos authentication. Incorrect Answers: A: If you choose RSWindowsNegotiate, an error can occur if an application is configured to use Kerberos only, the Report Server service is configured to run under a domain user account, and the Service Principal Name (SPN) is not registered. In this scenario, you should have AuthenticationTypes set to RSWindowsKerberos to avoid this error.The RSWebApplication.config file is also no longer used in SQL Server 2008. The configuration settings in the RSWebApplication.config file that were used in previous versions of SQL Server have been moved to the RSReportServer.config file. B: You should not make any changes in the RSWebApplication.config file. The RSWebApplication.config file is no longer used in SQL Server 2008. The configuration settings in the RSWebApplication.config file that were used in previous versions of SQL Server have been moved to the RSReportServer.config file. C: RSWindowsNTLM is used if you have applications cannot use Kerberos authentication.

QUESTION NO: 46 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to administer the newly installed instance of SQL Server 2008 Reporting Services (SSRS). CertKiller.com wants "Pass Any Exam. Any Time." - www.actualtests.com 44

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam you to plan and design an authentication method for SSRS reports which make use of SQL Server data connections. CertKiller.com wants you to ensure that all SSRS reports communicate to the new instance by using the Kerberos authentication protocol. What should you do? A. You should consider having the default Web site on the new instance configured to use the Secure Sockets Layer (SSL) protocol. B. You should consider having a service principal name (SPN) registered in the Active Directory directory service for the new SSRS instance. C. You should consider having the default Web site on the new instance configured to use the Integrated Security type. D. You should consider having the application pool configured used by the default Web site to use a domain account. Answer: B

QUESTION NO: 47

What should you do?

A. You should consider making use of Windows Authentication Mode with named pipes network library. B. You should consider making use of Windows Authentication Mode with NWLink network library. C. You should consider making use of Windows Authentication Mode with TCP/IP network library. D. You should consider making use of Mixed mode authentication. Answer: D Explanation: Users who have accounts in the Windows domain or Active Directory can be authenticated with Kerberos authentication or NTLM authentication with Windows Authentication. Users who have accounts created only on the SQL server, called SQL logins, can also be authenticated. Mixed Mode is used to provide backward compatibility for legacy clients. In this scenario, Novell NetWare clients will be authenticating to the SQL server, not Windows clients. Novell Netware, Linux, UNIX, and other operating system clients can connect to SQL Server 2008 by creating a "Pass Any Exam. Any Time." - www.actualtests.com 45

Ac

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure CERTKILLER-DB01 to allow legacy clients to connect to CERTKILLER-DB01. The CertKiller.com network currently has Novell NetWare clients which require access to CERTKILLER-DB01.

sts

.co

Microsoft 70-450: Practice Exam SQL login for the users that need to connect. The SQL login is native only to the SQL server on which it is created, and cannot be used in Active Directory domains. If the client has the same network layer protocol bound to its network adapter as the SQL server and is running the same network library or SQL Server Network Configuration protocol, the client can connect with a valid SQL Server login account. For example, a NetWare client that has TCP/IP bound to its network adapter and is running the shared protocol network library or SQL Server Network Configuration protocol can connect to a SQL server that has TCP/IP bound to its network adapter and is running the shared protocol network library or SQL Server Network Configuration protocol. Incorrect Answers: A: You should not configure Windows Authentication Mode on the SQL Server 2008 server. Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server 2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not matter whether the NetWare client and the SQL Server attempt to use Windows Authentication with the same network library or SQL Server Network Configuration protocol, such as shared protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security configurations (12 Questions) B: You should not configure Windows Authentication Mode on the SQL Server 2008 server. Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server 2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not matter whether the NetWare client and the SQL Server attempt to use Windows Authentication with the same network library or SQL Server Network Configuration protocol, such as shared protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security configurations (12 Questions) C: You should not configure Windows Authentication Mode on the SQL Server 2008 server. Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server 2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not matter whether the NetWare client and the SQL Server attempt to use Windows Authentication with the same network library or SQL Server Network Configuration protocol, such as shared protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

46

Microsoft 70-450: Practice Exam library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security configurations (12 Questions)

QUESTION NO: 48 You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 infrastructure. You receive an instruction from management to implement a solution to obtain hardware configurations regarding the amount of processors on a workstation as well as the type of processors on the SQL Server 2008 servers. However, the CIO wants the implementation to have the following criteria: A central system should do the implementation and it should verify hardware configurations for numerous servers. Furthermore the CIO wants it to done with the least amount of effort. What should you do?

Answer: A

You are the newly appointed database administrator at CertKiller.com. You are in the process of installing a SQL Server 2008 server in a testing environment. You have received instruction from the CIO to create an assembly that needs access to the file system as well as the registry. During routine monitoring you discover that the certificate server has failed in the test environment. You decide to register the assembly in a database named CK_RESEARCH with the subsequent code: CREATE ASSEMBLY CKAssembly FROM 'C:\CKApp\CKAssembly.dll'WITH PERMISSION_SET = EXTERNAL_ACCESS Which should you do?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

QUESTION NO: 49

tua

lTe

A. You should make use of the ExecuteWQL function in order to define policies based on conditions. B. You should make use of the Delegation of Control Wizard. C. You should make use of the Group Policy Management Console. D. You should make use of the Windows System Resource Manager (WSRM) feature.

sts

.co

47

Microsoft 70-450: Practice Exam A. You should consider using the ALTER DATABASE CK_RESEARCH SET TRUSTWORTHY OFF statement. B. You should consider using the ALTER DATABASE CK_RESEARCH SET COMPATIBILITY_LEVEL = 90 statement. C. You should consider using the ALTER DATABASE CK_RESEARCH SET TRUSTWORTHY ON statement. D. You should consider using the ALTER DATABASE CK_RESEARCH SET COMPATIBILITY_LEVEL = 80 statement. Answer: C Explanation: To create an assembly with either external_access or unsafe permissions, you should have the assembly strong name signed or Authenticode signed with a certificate, or you should have the database configured with the set trustworthy on statement. In this scenario, the certificate server has failed, which may prevent the assembly from being signed by a certificate. You can use the alter database Sales set trustworthy on statement to ensure the success of the with PERMISSION_SET = EXTERNAL_ACCESS Statement.

QUESTION NO: 50

What should you do?

A. This can be accomplished by excluding the finalizer methods from the classes in the assembly. B. This can be accomplished by using the SQL Server Configuration Manager in order to register the assembly in CERTKILLER-DB01. C. This can be accomplished by ensuring that static data members are marked as read-write in the classes of the assembly. D. This can be accomplished by ensuring that the assembly code is not type-safe. Answer: A Explanation: The classes in the assembly cannot contain finalizer methods. A finalizer method is a method that runs when an object of a class is removed from memory. Classes within an assembly associated "Pass Any Exam. Any Time." - www.actualtests.com 48

Ac

tua

You are in the process of adding an assembly to CERTKILLER-DB01. You receive an instruction from the CIO to ensure that the assembly is created with safe permissions. You should also ensure that information is accessed from the local SQL Server databases. You thus need to determine the best way to configure the assembly.

lTe

CertKiller.com has hired you as a database administrator for their network. Your duties include administrating a SQL Server 2008 database server named CERTKILLER-DB01.

sts

.co

Microsoft 70-450: Practice Exam with SQL Server 2008 do not need finalizer methods, because the SQL Server runtime handles finalization. Incorrect Answers: B: You should not use the SQL Server Configuration Manager to register the assembly in SQL Server. You should use the regasm.exe to register the assembly in SQL Server. C: The assembly should only contain static data members in its classes if they are marked as read-only, not if they are marked as read-write. The assembly in this scenario is created with safe permissions, but even if the assembly was created with external_access permissions, the assembly can only contain static data members in its classes if they are marked as read-only. D: The assembly code should be type-safe. When the common language runtime verifier is run against the assembly, the assembly code is considered type-safe. A type-safe assembly can only access classes at specifically defined entry points, and it can only access memory buffers that are owned by the code.

QUESTION NO: 51

You have received instruction from the CIO to ensure that the assembly is able to access environmental variables as well as the registry. You thus need to configure the appropriate permission set should will accomplish this. What should you do?

A. You should consider configuring the UNSAFE permission set. B. You should consider configuring the SAFE permission set. C. You should consider configuring the EXTERNAL_ACCESS permission set. D. You should consider configuring the DEFAULT permission set. Answer: C Explanation: The EXTERNAL_ access permission set allows the assembly to access the registry and environmental variables, along with external system resources such as the file system, the external network, and Web services.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

You are in the process of adding an assembly to CERTKILLER-DB01. The assembly includes the subsequent features:The classes should not contain finalizer methods.The code should be type safe.The static data members are marked as read-only.

sts

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are assigned a database server named CERTKILLER-DB01.

.co

49

Microsoft 70-450: Practice Exam Incorrect Answers: A: You should not set the permission set on the assembly to unsafe. An assembly that has unsafe as the permission set is considered type -unsafe. Assemblies considered type-unsafe can potentially access memory buffers in the SQL Server that are not owned by the code of the assembly. In the scenario, the assembly code should be type-safe. B: You should not set the permission set on the assembly to safe. This is the default permission set for an assembly. The assembly cannot access external resources such as the registry and environment variables if the safe permission set is configured on the assembly. D: You should not set the permission set on the assembly to DEFAULT. There is no permission set for an assembly called default

QUESTION NO: 52

What should you use?

Answer: A

Explanation: You should use the SQL Server Configuration Manager to change the startup account. Using SQL Server Configuration Manger is the most appropriate method of changing the startup account. The startup account is used for running the SQL Server services. If you change the startup account, the services must be restarted. Without restarting, the older startup account remains tied to the SQL Server services. After you restart the services, the new account becomes active to run the SQL Server services. You can invoke the SQL Server Configuration Manager form Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL Server Configuration Manager. SQL Server Configuration Manager is used for configuring services, network protocols, and network configuration on SQL Server 2008. You can also use the Services snap-in to change the SQL Server startup account.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. Your best option would be to make use of the SQL Server Configuration Manager utility. B. Your best option would be to make use of the Add or Remove Programs utility. C. Your best option would be to make use of the Service Control Manager utility. D. Your best option would be to make use of the SQL Server Installation Center utility.

lTe

sts

You receive an instruction from the CIO to change the startup account for SQL Server. You have to make sure that the configuration of the SQL Server will remain intact when changes are made to the startup account. You thus need to determine the utility that you need to use to accomplish this.

.co

You work as a database administrator at CertKiller.com. You are responsible for a administering a SQL Server 2008 failover cluster.

50

Microsoft 70-450: Practice Exam Incorrect Answers: B: You should not use Add or Remove Programs to change the startup account for SQL Server. Add or Remove Programs is used to install software, not to configure them. D: You should not use the SQL Server Installation Center. This snap-in is used to view the hardware and software requirements for SQL Server 2008, view the security documentation, and add features.

QUESTION NO: 53 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 that is a member of the CertKiller.com domain. A number of CertKiller.com clients connect to CERTKILLER-DB01 using the SQLUser account. A new CertKiller.com policy states that login attempts to CERTKILLER-DB01 to be denied You want to deny login attempts to CERTKILLER-DB01 using the SQLUser account if four user sessions created by that login are currently running.

Answer: B

Explanation: Logon triggers are used to audit and control server sessions. You can track login activity and restrict logins to SQL Server. Incorrect Answers: A: You cannot configure the SQLUser account properties on the CertKiller.com domain to allow no more than four simultaneous logins You can limit which computers a domain account can log on to, but not how many times a user account can be authenticated in the domain. C: You should not set the Max Degree of Parallelism to 3 on CERTKILLER-DB01 for the SQLUser account. The Max Degree of Parallelism setting restricts the number of processors to use in parallel plan execution. The Max Degree of Parallelism will not restrict a user account's simultaneous logins. "Pass Any Exam. Any Time." - www.actualtests.com 51

Ac

A. You should consider limiting the SQLUser account properties in order to permit a maximum of four simultaneous logins on the CertKiller.com domain. B. You should consider creating a logon trigger that will limit the SQLUser account to four simultaneous logins. C. You should consider setting the Max Degree of Parallelism to 3 for the SQLUser account on CERTKILLER-DB01. D. You should consider limiting the SQLUser account properties in order to only permit four simultaneous logins on CERTKILLER-DB01.

tua

lTe

sts

What should you do?

.co

Microsoft 70-450: Practice Exam D: You cannot configure the SQLUser account properties on CERTKILLER-DB01 to allow no more than four simultaneous logins. There is no option to limit the number of account sessions on a SQL Server login account.

QUESTION NO: 54 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008. You are responsible for administering a database server named CERTKILLER-DB01 hosts a database named CK_PRODUCTS. You detach CK_PRODUCTS for maintenance purposes. You then decide to attach CK_PRODUCTS and grant the database the necessary permission to access resources beyond the scope of the database. You need to find a way to accomplish this. What should you do?

Answer: D

Explanation: When a database is attached to a SQL Server, the database is not initially trusted and cannot access resources beyond the scope of the database. If you explicitly mark the database trustworthy, then you can access resources beyond the scope of the database. Incorrect Answers: A: You should not run either the alter database Sales set recovery full, page_verify checksum statement or the ALTER DATABASE Sales SET RECOVERY FULL, PAGE_VERIFY TORN_PAGE_DETECTION Statement to configure the Sales database. The recovery full option provides full recovery after a media failure with transaction log backups. You cannot use this option to have the database to access resources beyond the scope of the database. The page_verify option is used to discover damaged database pages. You can set this option to checksum or torn_page_detection. checksum calculates a checksum and compares the checksum when the data is written to the disk. torn_page_detection is used to detect pages that have incomplete writes of the page. Neither checksum nor torn_page_detection can be used by a database to access resources beyond the scope of the database once it has been reattached to a "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY FULL, PAGE_VERIFY CHECKSUM command. B. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY OFF command. C. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY FULL, PAGE VERIFY TORN PAGE DETECTION command. D. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY ON command.

sts

.co

52

Microsoft 70-450: Practice Exam SQL Server. B: You should not run alter database CK_PRODUCTS set trustworthy off to configure the Sales database. This statement marks the database as untrustworthy. This is the default setting for a database. If you attached a database to a SQL Server, it would be marked untrustworthy. In this scenario, you must have the database marked trustworthy to access resources beyond the scope of the database. C: You should not run either the alter database Sales set recovery full, page_verify checksum statement or the ALTER DATABASE Sales SET RECOVERY FULL, PAGE_VERIFY TORN_PAGE_DETECTION Statement to configure the Sales database. The recovery full option provides full recovery after a media failure with transaction log backups. You cannot use this option to have the database to access resources beyond the scope of the database. The page_verify option is used to discover damaged database pages. You can set this option to checksum or torn_page_detection. checksum calculates a checksum and compares the checksum when the data is written to the disk. torn_page_detection is used to detect pages that have incomplete writes of the page. Neither checksum nor torn_page_detection can be used by a database to access resources beyond the scope of the database once it has been reattached to a SQL Server.

QUESTION NO: 55

What should you do?

A. You should consider making use of the Setupadmin fixed server role. B. You should consider making use of the DBCreator fixed server role. C. You should consider making use of the Sysadmin fixed server role. D. You should consider making use of the Serveradmin fixed server role. Answer: A Explanation: A user with the Setupadmin role will be able to add or remove linked servers. Without having this role assigned, a user will not be able to add or remove linked servers. A user who is part of this role can also execute stored procedures that relate to the linked servers. Some of the stored procedures are sp_addlinkedserver , sp_addlirikedsrvlogin , and sp_droplinkedsrvlogin . If a user "Pass Any Exam. Any Time." - www.actualtests.com 53

Ac

tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. The CertKiller.com network users make use of login accounts created in Active Directory. During the course of the day you receive instruction from CertKiller.com to assign a use named Rory Allen to add or remote linked servers. CertKiller.com wants you to ensure that Rory Allen is part of a fixed server role which allows him to accomplish the task.

lTe

sts

.co

Microsoft 70-450: Practice Exam is part of the role that has higher privileges than the Setupadmin role, the user will still be able to add or remove linked servers. Incorrect Answers: B: You should not add Rory Allen to the Dbcreator role because a user with Dbcreator role can perform database related tasks on the server, such as creating or restoring a database on the SQL Server. This role does not allow a user to add or remove a linked server. C: You should not add Rory Allen to the Sysadmin role because even though he will be able to add or remove linked servers, he will have higher privileges than required for this scenario. A user with the Sysadmin role assigned can perform any task on the server. The Sysadmin role has complete authority on the SQL Server. D: You should not add Rory Allen to the Serveradmin role because a user with Serveradmin role can perform server configuration related tasks on the server. This role also allows a user to gain the privilege of shutting down the server.

QUESTION NO: 56

What should you do?

Answer: D Explanation: You can use this security catalog view to audit every permission or column-exception permission in the Sales database. You should not use sys.server_permissions . This security catalog view can be used to view server-level permissions. In this scenario, you need to view database level permissions. Incorrect Answers: B: You should not use sp_table_privileges. This stored procedure returns a list of table permissions for a particular table. While you can use this stored procedure to find what permissions are given to a table, you will not be able to use this stored procedure to find what "Pass Any Exam. Any Time." - www.actualtests.com 54

Ac

A. You should consider making use of the sys.server_permissions stored procedure. B. You should consider making use of the sp_table_privileges stored procedure. C. You should consider making use of the sp_helprotect stored procedure. D. You should consider making use of the sys.database_permissions stored procedure.

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com has several developers who have created different objects in the CK_SALES database. You are currently unsure of the permissions which were granted to different users and roles. CertKiller.com wants you to retrieve the information for every permission or column-exception permission in the CK_SALES database.

sts

.co

Microsoft 70-450: Practice Exam permissions are given to other objects, such as stored procedures and user-defined functions. C: You should not use sp_helprotect. This stored procedure will return information on user permissions for an object in a database. However, this stored procedure will not return information about objects that were introduced in SQL Server 2005. Microsoft recommends that you use sys.database_permissions and fn_builtin_permissions instead of using sp_helprotect.

QUESTION NO: 57 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com has recently begun suffering resource problems in the CK_SALES database. CertKiller.com wants you to track the client login time, user name and the status of the session for a specific user.

Answer: A

Explanation: You should use the sys.dm_exec_sessions view to track the client login time, login name, and the status of the session for a specific user. This view allows you to track user connections with such detailed information as the host name, host process ID, the protocol used by the client to connect to the SQL, Windows security ID, login user name, and the status of the session. The sys.dm_exec_sessions , sys.dm_exec_requests and sys.dm_os_waiting_tasks can be used together to detect deadlocks and performance bottlenecks. All three views are part of the Server Activity collection set. Incorrect Answers: B: You should not use the sys.dm_exec_re quests view to track the client login time, login user name, and the status of the session for a specific user. This view details out information related to requests, such as the session ID to which the request is related, the start time of the request, and the status of the request. C: You should not use the sys.dm_os_waiting_tasks view to track the client login time, login user name, and the status of the session for a specific user. This view is used to track the tasks held in the queue. The tasks held in the queue are typically waiting for resources to be allocated. D: You should not use the sys.dm_os_schedulers view to track the client login time, login user name, and the status of the session for a specific user. This view is mainly used to view the status "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

A. You should consider making use of the sys.dm_exec_sessions dynamic management view. B. You should consider making use of the sys.dm_exec_requests dynamic management view. C. You should consider making use of the sys.dm_os_waiting_tasks dynamic management view. D. You should consider making use of the sys.dm_os_schedulers dynamic management view.

.co

What should you do?

55

Microsoft 70-450: Practice Exam of a scheduler and to track runaway tasks, if any.

QUESTION NO: 58 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to add an assembly to CERTKILLER-DB01 which has the characteristics listed below: The added assembly contains static data members which are marked as read-only.The added assembly should have the classed not containing finalizer methods.The added assembly code should be type safe CertKiller.com is aware that the assembly needs access to data from the local CERTKILLERDB01 databases and no other external resources.CertKiller.com wants you to configure the permission set on the assembly. What should you do?

Answer: C

Explanation: This is the default permission set for an assembly. The assembly cannot access external resources, such as the registry and environment variables, if the safe permission set is configured on the assembly. The safe permission set does allow the assembly to access data from the local SQL Server database. Incorrect Answers: A: You should not set the permission set on the assembly to unsafe. An assembly that has unsafe as the permission set is considered to be type-unsafe. Assemblies considered to be type-unsafe can potentially access memory buffers in the SQL Server that are not owned by the code of the assembly. In the scenario, the assembly code should be type-safe. B: You should not set the permission set on the assembly to default. There is no permission set for an assembly called default D: You should not set the permission set on the assembly to external_access. The external_access permission set allows the assembly to access the registry and environmental variables, along with external system resources such as the file system, the external network, and Web services. In this scenario, the assembly should not access any external resources. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. You should consider having the UNSAFE permission set. B. You should consider having the DEFAULT permission set. C. You should consider having the SAFE permission set. D. You should consider having the EXTERNAL_ACCESS permission set.

sts

.co

56

Microsoft 70-450: Practice Exam

QUESTION NO: 59 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you decide to have the permission for several roles updated in the database in CERTKILLER-DB01. CertKiller.com wants you to create a query which will document the privileged associated with a database role. What should you do? A. You should consider making use of the following T-SQL statement: sp_helprotect null, null, "enabled" B. You should consider making use of the following T-SQL statement: SELECT pri.name, per.permission_name FROM sys.database_permissions per INNER JOIN sys.database_principals pri ON per.grantee principal id = pri.principal id. C. You should consider making use of the following T-SQL statement: SELECT pri.name, per.permission_name FROM sys.sysprotects per INNER JOIN sys.sysprotects pri ON per.grantee_principal_id = pri.principal_id. D. You should consider making use of the following T-SQL statement: EXEC sp_table_privileges '%. Answer: B

Explanation: The sys.database_permissions security catalog view can be queried to audit every permission or column-exception permission in a database. The above query documents the privileges associated with a database role in a database. Incorrect Answers: A: The sp_helprotectstored procedure will return information on user permissions for an object in a database. However, this stored procedure will not return information about objects that were introduced in SQL Server 2005. Microsoft recommends that you use sys.databasepermissions and fn_builtin_permissions instead of sp_helprotect D: The sp_table_privileges stored procedure returns a list of table permissions for a particular table. While you can use this stored procedure to find what permissions are given to a table, you will not be able to use this stored procedure to find what permissions are given to other objects, such as stored procedures and user-defined functions. Part 3: Design database, schema, and "Pass Any Exam. Any Time." - www.actualtests.com 57

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam object security parameters (3 Questions)

QUESTION NO: 60 You are employed as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance named CERTKILLER-DB03. You are in the process of planning the deployment of a third party database application to CERTKILLER-DB03. The application will make use of stored procedures that is developed using SQL CLR integration. You have to make sure that the application is configured to allow the EXTERNAL_ACCESS code access security setting. To ensure productivity you need to make sure that the application id deployed without the loss of functionality. What should you do?

Answer: A

QUESTION NO: 61

CertKiller.com has hired you as a database administrator for their network. Your duties include administrating a SQL Server 2008 instance named CERTKILLER-DB01. You are currently designing the security requirements for a new database application named TestAPP1. TestAPP1 makes use of a code segment. The components below are contained in the code segment:The method that is used to access the file system on a network file serverA manner in which to access the registry on the SQL serverThe class definition that will make use of the public static fields SQL CLR integration is used by the code segment. It is implemented as a single assembly. You receive an instruction from the CIO to make sure that the application is installed to CERTKILLERDB01. What should you do? "Pass Any Exam. Any Time." - www.actualtests.com 58

Ac

tua

lTe

A. Your first step should be to make use of the peverify.exe PEVerify utility in order to confirm whether the code meets the type-safety requirements. B. Your first step should be to replace the read write non-static fields in the code with static fields. C. Your first step should be to make use of the regasm.exe assembly registration utility in order to register the assembly on CERTKILLER-DB03 prior to deployment. D. Your first step should be to replace the read-only static fields in the code with read write static fields.

sts

.co

Microsoft 70-450: Practice Exam A. Your best option would be to replace the File Server Resource Manager (FSRM). B. Your best option would be to replace the Distributed File System (DFS) role service. C. Your best option would be to make use of the Database Engine Tuning Advisor tool for the assembly. D. Your best option would be to use public static read-only fields instead of public static fields. Thereafter the EXTERNAL_ACCESS code should be used to access security for the assembly. Answer: D

QUESTION NO: 62 You work as a database administrator at CertKiller.com. You are responsible for managing two Microsoft SQL Server 2008 named CERTKILLER-DB01 and CERTKILLER-DB02. CertKiller.com users all use login accounts that were created in the Active Directory. A CertKiller.com employee named Kara Lang works in the Research and Development department. You have received instruction from the CIO to track the server login of Kara Lang as part of the securityadmin role on CERTKILLER-DB01. You need to determine the appropriate way to accomplish this. What should you do?

Answer: A

Explanation: You should use Is_srvrolemember to determine whether the securityadmin role contains Kara Lang's server login. To do this, you would use the following syntax: IS_SRVROLEMEMBER ('role'[,'login']) In this syntax, you need to first list the role that you want to check for the user name. Then, you should add the login account to be checked. As a result, one of the three values will be returned: 0 ,1 , or NULL. The value 0 signifies that user is not part of the role. The value 1 signifies that the user is part of the role. The value NULL signifies that the either the role or the login is not valid. In this scenario, one of the three values will be returned as a result. Incorrect Answers: B: The option sys.server_roIe_members should not be used in this scenario. This view displays a row for each of the member that is part of a specific role. However, this view does not return the SQL Server login that is part of a specific role, as desired in the scenario. C: The option sp_helpsrvrolemember should not be used in this scenario. This stored procedure "Pass Any Exam. Any Time." - www.actualtests.com 59

Ac

tua

A. You should consider using IS_SRVROLEMEMBER. B. You should consider using sys.server_role_members. C. You should consider using sp_helpsrvrolemember. D. You should consider using sp_helpsrvrole.

lTe

sts

.co

Microsoft 70-450: Practice Exam returns the members of a SQL Server fixed server role that you specify in the syntax. However, this stored procedure does not return the SQL Server login that is part of a specific role, as desired in the scenario. D: The option sp_helpsrvrole should not be used in this scenario. This stored procedure returns the server fixed roles on a server but does not return the SQL Server login that is part of a specific role, as desired in the scenario. Part 4: Design a security policy and an audit plan (10 Questions)

QUESTION NO: 63 You are the newly appointed database administrator at CertKiller.com. Your job function encompasses administering a SQL Server 2008 instance. You are in the process of implementing the security requirements for a database. The database will be installed on an SQL Server 2008 instance. The code segment below displays the table that was created in the database: CREATE TABLE CK_Staff ( StaffID INT NOT NULL IDENTITY(1,1), JobLevel INT NOT NULL, Salary MONEY NOT NULL, Bonus MONEY NULL )

The table contains a column named Bonus. You have received instructions from the CIO to make sure that Bonus has the most secure method of protection from unauthorized access

A. This can be accomplished by ensuring that the Job Activity Monitor tool is utilized on all columns in the database. B. This can be accomplished by ensuring that the NTFS file system security is utilized and access of the database files is limited to the SQL Server 2008 Service account. C. This can be accomplished by ensuring that the appropriate trace flags are utilized for the database. D. This can be accomplished by ensuring that the SQL Profiler trace is utilized. Answer: B

QUESTION NO: 64

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

What should you do?

tua

lTe

sts

.co

60

Microsoft 70-450: Practice Exam You are employed as the database administrator at CertKiller.com. Your job function encompasses administering a SQL Server 2008 instance that hosts a database named CK_SALES. CK_SALES is used by a Web based application that processes approximately 14,000 transactions per minute. There is a column named CKDATA in a table in CK_SALES that is only used by the application. CKDATA stores classified information. You receive an instruction from the CIO to make sure that the classified information is stored is a secure manner and that the usage of memory space as well as processor time is minimized. What should you do? A. You should consider making use of Database snapshot. B. You should consider making use of the Internet Information Services. C. You should consider making use of symmetric key encryption. D. You should consider making use of Key Management Service (KMS). Answer: C

QUESTION NO: 65

What should you do?

A. You should consider enabling transparent data encryption for the Publisher, Distribution as well as the Subscriber databases. B. You should consider enabling RAID 5 for the Publisher, Distribution as well as the Subscriber databases. C. You should consider enabling a VPN solution on the two instances. D. You should consider enabling an ADM file between the instances. Answer: A

QUESTION NO: 66 "Pass Any Exam. Any Time." - www.actualtests.com 61

Ac

tua

CERTKILLER-DB02 hosts a database application named CK_App. You are in the process of implementing a data security strategy for CK_App. In order to replicate the information to another SQL server 2008 instance you need to make use of Snapshot replication. Management wants you to make sure that the stored information is encrypted with the minimum of administrative effort.

lTe

You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance named CERTKILLER-DB02.

sts

.co

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. Your job function encompasses administering a SQL Server 2008 instance that hosts a database named CK_DATA. CK_DATA contains confidential information of the organization. You receive an instruction from management to develop a database backup strategy for CK_DATA. It is vital that you make sure that all backups of CK_DATA are encrypted and that unauthorized access is prevented. What should you do? A. You should consider using NTFS quotas and Event Viewer tasks. B. You should consider using NTFS quotas and Performance Monitor alerts. C. You should consider using the Transparent database encryption. D. You should consider using the Background Intelligent Transfer Service (BITS). Answer: C

QUESTION NO: 67

You work as a database administrator at CertKiller.com. You are responsible for administering a database solution. The database solution of CertKiller.com is log-shipped for high availability purposes. The E-drive of the database hosts the data files and the F-drive the transaction log files. You receive an instruction from management to implement a recovery test plan for the log-shipping solution with the following criteria: Data loss should be nominal.Data should be reliable.The secondary database should be brought online as soon as possible. You need to determine the first step that should be performed in the test plan in the event that the E-drive fails. What should you do? A. Your first step should be to run the folder redirection against the database. B. Your first step should be to set up offline files. C. Your first step should be to set up the Job Activity Monitor tool on the database. D. Your first step should be to execute the tail-log backup of the primary database. Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

62

Microsoft 70-450: Practice Exam QUESTION NO: 68 CertKiller.com has employed you as a database administrator. You are responsible for administering a SQL Server 2008 instance. You are in the process of installing a new SQL Server 2008 Integration Services (SSIS) packages. This package was created using the SQL Server Import and Export Wizard. The users at CertKiller.com will use their user names as well as passwords to the external data sources. You receive an instruction from the CIO to prevent unauthorized users access by ensuring that the user names and passwords are protected. What should you do? A. The best option is to use the Windows System Monitoring tool in the SQL Server 2008 server. B. The best option is to store the packages and manage the security in the SQL Server 2008 server. C. The best option is to use the Network Service account when the packages are saved. D. The best option is to implement Internet Protocol security (IPsec). Answer: B

You work as a database administrator at CertKiller.com. All servers on the CertKiller.com network run Windows Server2008 and all client computers run Windows Vista. A new CertKiller.com policy states that the Social Security numbers (SSNs) of all CertKiller.com users needs to be tracked. You receive an instruction from the CIO to encrypt the SSN column in the CKStaff table to stop unauthorized users from accessing the information. What should you configure? (Click and drag the options on the left to the column on the right, and place them in the correct order.)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

QUESTION NO: 69 DRAG DROP

sts

.co

63

Microsoft 70-450: Practice Exam

Answer:

QUESTION NO: 70

You work as a database administrator at CertKiller.com. CertKiller.com has itsheadquarters in London and branch offices in Paris, Berlin, Milan, Madrid and Stockholm. You are responsible for managing the SQL Server 2008 servers at every office. A large number of data replication is occurring on the main SQL Server at the London office. To ensure productivity continues management wants you to make sure that information is encrypted during replication without affecting the performance of the server. What should you do? A. You should consider using asymmetric encryption. B. You should consider using symmetric encryption. "Pass Any Exam. Any Time." - www.actualtests.com 64

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam C. You should consider applying Transparent Data Encryption (TDE). D. You should consider using symmetric encryption and then compress the data encryption. Answer: B Explanation: In this scenario, you should use symmetric encryption for encrypting the data during replication. Symmetric encryption is typically used for large volumes of data. There is only one key used for encrypting and decrypting the data. Compared to asymmetric encryption, symmetric encryption is less resource-intensive and does not affect server performance. You typically use symmetric encryption during replication when you have large volumes of data. Incorrect Answers: A: You should not use asymmetric encryption for replication. This type of encryption is resourceintensive. It uses two different keys for encrypting and decrypting information, a private key and a public key. However, compared to the symmetric encryption, this encryption provides a higher level of security. C: You should not use TDE encryption. TDE encryption encrypts data and log files using a database encryption key (DEK) stored in the master database. This type of encryption provides real-time encryption and decryption of data and log files. You should not use TDE encryption for data during replication. The TDE encryption is used for static data, such as data and the log files of the database. TDE encryption will not work during replication of data. D: You should not use symmetric encryption and then compress the data encryption because encrypted data cannot be compressed. Therefore, this solution will not be applicable in this situation.

QUESTION NO: 71

You have received instruction from the CIO to encrypt a number of columns in various tables in CK_SALES without modifying the applications that is used to access the tables. You decide to make use of Transparent Data Encryption (TDE) on the CK_SALES and execute the subsequent steps:You create a master key.You create a certificate named SalesCert that is protected by the master key.You create a database encryption key and protect it with the SalesCert certificate You need to complete the encryption of CK_SALES. What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES.

tua

lTe

sts

.co

65

Microsoft 70-450: Practice Exam A. You should run the CIPHER /E /S:C:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\DATA /F CK_SALES.mdf command. B. You should run the ATTRIB +S C:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\DATA \CK_SALES.mdf command. C. You should run the EXEC sp_dboption 'CK_SALES', 'encrypted', 'TRUE' command. D. You should run the ALTER DATABASE CK_SALES SET ENCRYPTION ON command. Answer: D Explanation: In order to use Transparent Data Encryption (TDE) on CK_SALES you must ensure each of the following actions is performed: Create a master key in the master database. Create a certificate called SalesCert , which is protected by the master key. Create a database encryption key (DEK) and protect it with the SalesCert certificate. Set the database to use encryption with the alter database statement. Incorrect Answers: A: You cannot use the sp_dboption stored procedure to set the database to use encryption. You can use the sp_dboption to set many other database options, such as automatically creating statistics, updating statistics, setting the database as read only, or setting the database to use torn page detection. B: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers database. The ATTRIB command is used to set attributes on a file. You cannot use the ATTRIB command to set an encryption attribute. The CIPHER command can be used to encrypt a file that is stored on an NTFS volume using EFS encryption. However, if you use the CIPHER command to encrypt the Customers.mdf file, this file can only be viewed by the person who encrypted it. The file will not be readable to SQL Server, thus making the Customers database unusable. C: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers database. The ATTRIB command is used to set attributes on a file. You cannot use the ATTRIB command to set an encryption attribute. The CIPHER command can be used to encrypt a file that is stored on an NTFS volume using EFS encryption. However, if you use the CIPHER command to encrypt the Customers.mdf file, this file can only be viewed by the person who encrypted it. The file will not be readable to SQL Server, thus making the Customers database unusable.

QUESTION NO: 72 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_STAFF. During the course of the day you receive instruction from CertKiller.com to prevent the backup file of the CK_STAFF database being compromised using the script below to secure the data: "Pass Any Exam. Any Time." - www.actualtests.com 66

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam BACKUP DATABASE [CK_STAFF] TO DISK = N'D:\Backup\CK_Staff.bak',[CK_StaffBackup] WITH FORMAT, MEDIANAME = 'CK_StaffBackup', MEDIADESCRIPTION = 'media set for CK_STAFF database', MEDIAPASSWORD = 'T3$T<1N8$T@FF' CertKiller.com wants it so that only the backup operators know the media password to restore the media but your concerns is with rogue users using password crackers finding the password and restoring the data to another server. CertKiller.com wants you to secure the information. What should you do? A. You should consider making use of Transparent Data Encryption (TDE) to encrypt the CK_STAFF database. B. You should consider having the TCP/IP network library loaded on CERTKILLER-DB01 and enable the Force Encryption option. C. You should consider making use of Encrypted File Service (EFS) to encrypt the CK_Staff.bak file. D. You should consider making use of cipher.exe to encrypt the CK_Staff.bak file. Answer: A

Explanation: With TDE, you do not have to modify existing applications to take advantage of the encryption. The encryption is transparent to the application, so a backup application can access the data and store it on the backup media. You are not limited in copying or moving the backup file of the database. However, you will not be able to open the database without the database encryption key. With TDE, a rogue user may be able to steal the backup file, but will not be able to access the encrypted backup content without the key. You can use the mediapassword keyword to secure a backup. When you set a password using the mediapassword keyword, you must supply the password when restoring data from the backup media. With any password secured system, the system is only as good as the password. If several people share the password, then security can be compromised easily. The mediapassword keyword will not be available in future versions of SQL Server. Incorrect Answers: B: You should not load the TCP/IP network library on CERTKILLER-DB01 and enable the Force Encryption option. You can use this option with TCP/IP, shared memory, and named pipes network libraries. You can use the Force Encryption option to secure communications from a client to the SQL server, but you cannot use this option to encrypt a database. C: You should not use EFS or cipher.exe to encrypt the CK_Staff.bak file. You can use Windows Explorer or cipher.exe to encrypt a file with EFS. Only the user who encrypts the file or an encrypted recovery agent can access the file. If you encrypted the file with EFS, then the file would "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

67

Microsoft 70-450: Practice Exam not be available to SQL Server and could not be used as a backup file. Part 5: Design an encryption strategy (12 Questions) D: You should not use EFS or cipher.exe to encrypt the CK_Staff.bak file. You can use Windows Explorer or cipher.exe to encrypt a file with EFS. Only the user who encrypts the file or an encrypted recovery agent can access the file. If you encrypted the file with EFS, then the file would not be available to SQL Server and could not be used as a backup file. Part 5: Design an encryption strategy (12 Questions)

QUESTION NO: 73 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure all the data in the CK_SALES database whilst ensuring the requirements below are met: CertKiller.com wants to have all the data in the CK_SALES database encrypted.CertKiller.com wants to have the application which accesses the data not to be reconfigured.CertKiller.com wants to ensure that there is no performance concern. What should you do?

Answer: C

Explanation: With TDE. You do not have to modify existing applications to take advantage of the encryption. The encryption is transparent to the application. In this scenario, applications that access the data must not be reconfigured. TDE does not hurt performance as much as cell-level encryption, and it does not affect the use of indexes and other optimization tools used by the query engine. You should not use cell-level encryption. Cell-level encryption should be used if you need to encrypt only a small amount of data in the database. If you need to encrypt the entire database, you should use TDE. The granular level of encryption that cell-level encryption provides ensures that data is not decrypted until it is used. Cell-level encryption can be configured so that users can have individual keys for their own data. Cell-level is highly configurable, so that applications that access data can be modified to take advantage of it. Incorrect Answers: A: Cell-level encryption will also slow down performance. Columns that will be encrypted must be altered to use the varbinary data type. With encryption, the original value of the data will have a "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. You should consider making use of Cell-level encryption. B. You should consider making use of EFS encryption. C. You should consider making use of Transparent Data Encryption (TDE). D. You should consider making use of BitLocker encryption.

lTe

sts

.co

68

Microsoft 70-450: Practice Exam different value after encryption. Any referential constraints such as primary keys, foreign keys, and unique keys will be affected by the encrypted values. Any indexes on the encrypted columns will no longer use index scans, but table scans, thus affecting performance. In this scenario, performance is a concern. Cell-level encryption may require that applications be modified to take advantage of the encryption. With TDE, the applications do not need to be reconfigured. B: You should not use EFS encryption. This type of encryption is used to encrypt individual files and directories on an NTFS volume. EFS encryption can be used in conjunction with BitLocker encryption to secure volumes, directories, and files on a Window Server 2008 server. D: You should not use BitLocker encryption. This type of encryption is used to encrypt an entire NTFS volume. BitLocker encryption can be used to protect a volume from being viewed after it is stolen from a server. This type of encryption cannot be used to encrypt data in a database unless the data is stored outside the SQL server such as FILESTREAM storage.

What should you do?

Answer: D

QUESTION NO: 75 You are employed as the database administrator at CertKiller.com. Your job function encompasses administering a SQL Server 2008 instance that hosts a database named CK_SALES. CK_SALES is used by a Web based application that processes approximately 18,000 transactions per minute. There is a column in a table in CK_SALES that is only used by the application. The "Pass Any Exam. Any Time." - www.actualtests.com 69

Ac

A. You should consider having the facet to Database Options set. B. You should consider having the MSSQL Server service restarted. C. You should consider having the Expression for the condition set to @Name=CK_ORDERS. D. You should consider having Encrypt View policy enabled.

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to create a policy prohibiting enabling Database Mail and SQL Mail on CERTKILLER-DB01. CertKiller.com additionally wants the policy which requires all new views to enable Database Mail on a newly added server whilst being able to create views in the CK_ORDERS database which are not encrypted.

sts

.co

QUESTION NO: 74

Microsoft 70-450: Practice Exam column stores classified information. You receive an instruction from the CIO to make sure that the classified information is stored is a secure manner and that the usage of memory space as well as processor time is minimized. What should you do? A. You should consider making use of Point-to-Point Tunneling Protocol (PPTP). B. You should consider making use of Layer Two Tunneling Protocol (L2TP). C. You should consider making use of Secure Socket Tunneling Protocol (SSTP). D. You should consider making use of symmetric key encryption. Answer: D

QUESTION NO: 76 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to apply real-time encryption to the CK_ORDERS database and log files whilst being able to encrypt the backup copy of the database. What should you do?

Answer: B

Explanation: TDE encryption encrypts data and log files using a database encryption key (DEK) stored in the master database. This type of encryption provides real-time encryption and decryption of data and log files. Incorrect Answers: A: You should not use EFS encryption. This type of encryption is used to encrypt files on an NTFS partition. If a file is encrypted, only the user who encrypted the file or the recovery agent can decrypt the file. If you encrypt the backup file, then the SQL Server 2008 server will not be able to access the database file, since the account that the SQL Server runs under did not encrypt the backup file. C: You should not use asymmetric encryption. This type of encryption is resource-intensive. It uses two different keys: a private key and a public key for encrypting and decrypting information. "Pass Any Exam. Any Time." - www.actualtests.com 70

Ac

tua

A. You should consider making use of the Encrypting File System (EFS). B. You should consider making use of Transparent Data Encryption (TDE). C. You should consider making use of asymmetric encryption. D. You should consider making use of symmetric encryption.

lTe

sts

.co

Microsoft 70-450: Practice Exam However, compared to the symmetric replication, this encryption provides a higher level of security. Asymmetric encryption will not provide real-time encryption and decryption of data and log files. D: You should not use symmetric encryption. Symmetric encryption is typically used for large volumes of data. There is only one key used for encrypting and decrypting the data. Compared to asymmetric encryption, symmetric encryption is less resource-intensive and does not affect the server performance. You typically use symmetric encryption during replication when you have large volumes of data. Symmetric encryption will not provide real-time encryption and decryption of data and log files.

QUESTION NO: 77 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to add a column to the CK_PRODUCTS table in the CK_SALES database which will keep a PDF diagram of the products. CertKiller.com is aware that some PDF files are larger than 2 GB. CertKiller.com wants you to ensure that the requirements set below are met: CertKiller.com wants to have the PDF files stored in the files system outside the SQL server.CertKiller.com wants to have the disk drive containing the PDF files protected from theft.CertKiller.com wants to have FILESTREAM storage sued with the column. What should you do? (Choose two)

A. You should consider making use of Transparent Data Encryption. B. You should consider making use of BitLocker encryption. C. You should consider having the CK_PRODUCTS table altered to include a new column as an ntext data type. D. You should consider having the CK_PRODUCTS table altered to include a new column as a varbinary(max) data type. E. You should consider having the CK_PRODUCTS table altered to include a new column as an image data type. Answer: B,D Explanation: FILESTREAM storage uses the varbinary ( max) data type on a column for Binary Large Objects (BLOB)s stored in the file system for example, the large PDF files that are stored outside SQL Server. When BLOBs are stored in the file system, the standard varbinary ( max) data type limitation of 2 GB does not apply. You can support PDF files even if they are over 2 GB in size.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

71

Microsoft 70-450: Practice Exam Incorrect Answers: A: You should not use Transparent Data Encryption (TDE). TDE is used to encrypt a database, but TDE cannot encrypt FILESTREAM data. The new column of the MaintenanceRecords table uses a FILESTREAM data type. FILESTREAM data is stored outside the database and cannot be encrypted with TDE. C: You should use BitLocker encryption to protect the volume that contains the PDF files. BitLocker encryption provides full volume encryption for Windows Vista and Windows Server 2008 and protection against the physical theft of a hard drive. BitLocker encrypts all user and system files in the operating system volume. Once you have encrypted the volume that contains the operating system with BitLocker, you can use BitLocker to encrypt the other volumes. BitLocker can use the security capabilities of computers that have a Trusted Platform Module (TPM) version 1.2 to ensure that data is accessible only if the encrypted disk is located in the original computer and the computer's boot components have not been altered. E: You should not alter the MaintenanceRecords table to include a new column as an ntext data type or as an image data type. An image data type can support storage of up to 2 GB and an ntext data type can support storage of up to 1 GB. To support FILESTREAM storage, you must use a varbinary (max) data type on the column for the PDF files.You cannot use an ntext data type or an image data type for FILESTREAM storage.FILESTREAM data in a table is secured with permissions that are granted at the table or column levels inside the SQL server database. Although the data is stored outside SQL server on a NTFS volume, the account under which the SQL Server service account runs is the only account that is granted NTFS permissions to the FILESTREAM data. SQL Server restricts access to the volumes and files that make up the FILESTREAM data containers. T-SQL transactions and OpenSqIFilestream APIs are allowed to access the FILESTREAM data.

QUESTION NO: 78

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure the data in the CK_SALES database whilst ensuring the conditions below are met: When securing the data only a small percent of data in the CK_SALES database requires encryption.When securing the data no data will be stored outside the SQL Server database.CertKiller.com has the application custom designed to access the data.When securing the data performance is of no concern but security of the data is. What should you do? A. You should consider making use of Call-level encryption. B. You should consider making use of EFS encryption. "Pass Any Exam. Any Time." - www.actualtests.com 72

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam C. You should consider making use of Transparent Data Encryption (TDE). D. You should consider making use of BitLocker encryption. Answer: A Explanation: Cell-level encryption should be used if you need to encrypt only a small amount of data in the database. The granular level of encryption that cell-level encryption provides ensures that data is not decrypted until it is used. Cell-level encryption can be configured so that users can have individual keys for their own data. Cell-level encryption is highly configurable, so that applications that access data can be modified to best take advantage of it. Cell-level encryption will slow down performance. Columns that will be encrypted must be altered to use the varbinary data type. With encryption, the original value of the data will have a different value after encryption. Any referential constraints such as primary keys, foreign keys, and unique keys will be affected by the encrypted values. Any indexes on the encrypted columns will no longer use index scans, but table scans, thus affecting performance. Incorrect Answers: B: You should not use EFS encryption. This type of encryption is used to encrypt individual files and directories on an NTFS volume. EFS encryption can be used in conjunction with BitLocker encryption to secure volumes, directories, and files on a Window Server 2008 server. C: You should not use Transparent Data Encryption (TDE). If you need to encrypt the entire database, you should use Transparent Data Encryption (TDE). In this scenario, you were required to encrypt a small percentage of the data, and not the entire database. TDE offers advantages over cell-level encryption. You do not have to modify an application to take advantage of TDE. The encryption is transparent to the application. In this scenario, the application was customized to access the data so cell-level encryption could be used. TDE does not hurt performance as much as cell-level encryption. TDE does not affect the use of indexes and other optimization tools used by the query engine. In this scenario, performance is not a concern, so cell-encryption could be used. D: You should not use BitLocker encryption. This type of encryption is used to encrypt an entire NTFS volume. BitLocker encryption can be used to protect a volume from being viewed after it is stolen from a server. This type of encryption cannot be used to encrypt data in a database unless the data is stored outside the SQL server such as FILESTREAM storage.

QUESTION NO: 79 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to plan the implementation of Transparent Data Encryption (TDE) for the CK_SALES database using the script below: "Pass Any Exam. Any Time." - www.actualtests.com 73

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam USE master; GO CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'T35T1K1N8'; GO CREATE CERTIFICATE CERTKILLER-DB01Cert WITH SUBJECT = 'CERTKILLER-DB01 Certificate' GO USE CK_SALES GO CREATE DATABASE ENCRYPTION KEY UITH ALGORITHM = AES_128 ENCRYPTION BY SERVER CERTIFICATE CERTKILLERDB01Cert GO ALTER DATABASE CK_SALES SET ENCRYPTION ON GO CertKiller.com has additionally configured the CK_SALES database to use the full recovery model. CertKiller.com wants you to ensure that you are able to restore the CK_SALES database after a media failure by selecting what would be required to restore the database. What additional information would be required? (Choose two) A. To restore the database you would require backups of the msdb database and the CK_SALES database. B. To restore the database you would require backups of the EFS recovery certificate for CERTKILLER-DB01. C. To restore the database you would require backups of the tempdb database and the CK_SALES database. D. To restore the database you would require backups of the master database and the CK_SALES database. E. To restore the database you would require a backup of the CERTKILLER-DB01Cert certificate. Answer: D,E Explanation: For a database that has TDE enabled, the database is encrypted by using the database encryption key. You should have a backup of the database, a backup of the certificate, and a backup of the private key associated with the certificate. In this scenario, you must have a backup of the CK_SALES database, a backup of the master database, and a backup of the CERTKILLER_DB011Cert certificate. The CK_SALES database has Transparent Data Encryption (TDE) enabled. You must have a backup of the certificate that protects the database encryption "Pass Any Exam. Any Time." - www.actualtests.com 74

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam key, which in this case is the CERTKILLER-DB01Cert certificate. You must have a backup of the CK_SALES database to restore the objects and data in case of a failure. The master database contains the certificate that is created with the database master key (DMK). Incorrect Answers: A: You do not have to restore the tempdb or msdb database. The tempdb system database is used to store temporary objects. The msdb database is used to store jobs and alerts. Neither of these two databases is used to store certificates or private keys for any databases. The master database contains the certificate that is created with the DMK. You should back up the master database instead of the tempdb or msdb databases. B: You do not have to have a backup of the EFS recovery certificate for CERTKILLER-DB01. The EFS recovery certificate is used to recover files and directories that are encrypted on a NTFS partition. The EFS recovery certificate is not used to create a service master key (SMK) or a DMK and does not need to be recovered. You must have backups of both the certificate and the private key or the database cannot be opened. C: You do not have to restore the tempdb or msdb database. The tempdb system database is used to store temporary objects. The msdb database is used to store jobs and alerts. Neither of these two databases is used to store certificates or private keys for any databases. The master database contains the certificate that is created with the DMK. You should back up the master database instead of the tempdb or msdb databases.

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to encrypt the inventory information of the Products table in the CK_SALES database by performing the action below: You decided to create a master key for the database.You additionally created a certificate for encryption using the statement below: CREATE CERTIFICATE CERTKILLER-DB02 WITH SUBJECT = Inventory Level'You have later created a symmetric key from the certificate using the statement below: CREATE SYMMETRIC KEY SalesInventory_Key1 WITH ALGORITHM = AES_256 ENCRYPTION BY CERTIFICATE CERTKILLER-DB02; You have finally altered the Employees table to add a column named Inventory_Encrypted to store the encrypted data by writing the script below to encrypt the value in the column Inventory and save the results in the table in the Inventory_Encrypted: "Pass Any Exam. Any Time." - www.actualtests.com 75

Ac

tua

lTe

QUESTION NO: 80

sts

.co

Microsoft 70-450: Practice Exam UPDATE CK_SALES.Products SET Inventory_Encrypted = EncryptByKey(Key_GUID('SalesInventory_Key1'), Inventory, 1, HashBytes ('SHA1', CONVERT( varbinary. Inventory))); GO CertKiller.com wants you to determine what should be done before running the update statement on the table. What should you do? A. You should consider having the CERTKILLER-DB02 certificate used to open the table. B. You should consider having the symmetric key opened that will be used to decrypt the data. C. You should consider having the master key opened on the database. D. You should consider having the CERTKILLER-DB02 certificate used to create a session key with the table.

Explanation: You must open the symmetric key with which to decrypt the data before running the update statement on the table. The command syntax is: OPEN SYMMETRIC KEY SalesInventory_Key1 DECRYPTION BY CERTIFICATE CERTKILLERDB02 The symmetric must be opened with the CERTKILLER-DB02 certificate before you encrypt the value in the column Salary and save the results in the column Inventory_Encrypted . Incorrect Answers: A: You do not need to use the CERTKILLER-DB02 certificate to open the table. The CERTKILLER-DB02 certificate is used to create the symmetric key. The CERTKILLER-DB02 certificate is not used for identity purposes with the table. The certificate is not related to the table. C: You do not need to open the master key on the database. In this scenario, you are encrypting a column. You must use the symmetric key to encrypt a column, not the master key on the database. D: You do not need to use CERTKILLER-DB02 certificate to create a session key with the table. The symmetric key is used to encrypt a column in the table. A session key can be used when creating a secure session between connections such as Web browser and a Web site. You are trying to encrypt a column in a table, not establish a secure connection between a client and a database server.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

Answer: B

.co

76

Microsoft 70-450: Practice Exam QUESTION NO: 81 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to add a table for the CK_SALES database using the statement below: CREATE TABLE Discontinued ( [Id] [uniqueidentifier] ROWGUIDCOL NOT NULL UNIQUE, [SerialNo] INTEGER UNIQUE, [Design] VARBINARY(MAX) FILESTREAM NULL ) CertKiller.com wants you to ensure that the data in the Design column in the Discontinued table is secure whilst ensuring that the disk containing the CK_SALES database is protected from theft. What should you do?

Answer: D

Explanation: BitLocker encryption provides full volume encryption for Windows Vista and Windows Server 2008. BitLocker provides protection against theft of a hard drive. BitLocker encrypts all user and system files in the operating system volume. Once you have encrypted the volume that contains the operating system with BitLocker , you can use BitLocker to encrypt the other volumes. BitLocker can use the security capabilities of computers that have a Trusted Platform Module (TPM) version 1.2 to ensure that data is accessible only if the encrypted disk is located in the original computer and the computer's boot components have not been altered. Incorrect Answers: A: You should not use the EFS encryption. EFS encryption can encrypt files on an NTFS volume. You can use Windows Explorer or the CIPHER command to encrypt a file that is stored on an NTFS volume. If you use the CIPHER command or Windows Explorer to encrypt the files that make up the Intelligence database file, this files will be only viewed by the person that encrypted them. These files will not be readable by SQL Server, thus making the Intelligence database unusable. Encrypting files via EFS encryption does not necessarily protect them against theft if a user is able to export the certificate of Encrypted Recovery Agent to decrypt the files. You should use BitLocker encryption to protect the volume against theft. "Pass Any Exam. Any Time." - www.actualtests.com 77

Ac

tua

lTe

A. You should make use of EFS encryption. B. You should make use of IPSec encryption. C. You should make use of Transparent Data Encryption. D. You should make use of BitLocker Encryption.

sts

.co

Microsoft 70-450: Practice Exam B: You should not use IPSec encryption. This type of encryption is used to encrypt communications between sessions. IPSec encryption will not encrypt information on a NTFS drive or within a SQL server database. C: You should not use Transparent Data Encryption (TDE). TDE is used to encrypt a database, but TDE cannot encrypt FILESTREAM data. The Chart column of the Records table uses a FILESTREAM data type. FILESTREAM data is stored outside the database and cannot be encrypted with TDE. FILESTREAM data in a table is secured with permissions that are granted at the table or column levels inside the SQL server database. Although the data is stored outside SQL server on a NTFS volume, the SQL Server service account is the only account that is granted NTFS permissions to the FILESTREAM data. SQL Server restricts access to the volumes and files that make up the FILESTREAM data containers. T-SQL transactions and OpenSqIFilestream APIs are allowed to access the FILESTREAM data.

CertKiller.com has additionally planned to have the CK_SALES database altered to have an encrypted column created to store the encrypted column. CertKiller.com wants to know which data type should be used for the encrypted column. What should you do? A. You should make use of the xml data type. B. You should make use of the int data type. C. You should make use of the varchar data type. D. You should make use of the varbinary data type. Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'T3$t1<lN8' CREATE CERTIFICATE DiscountRate WITH SUBJECT = 'Sales Discount'; CREATE SYMMETRIC KEY DiscountRate_0l WITH ALGORITHM = AES_256 ENCRYPTION BY CERTIFICATE DiscountRate

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure the information which is submitted by the customers. CertKiller.com wants to have the credit card numbers used by customers to be encrypted whilst other customer information remains unencrypted by making use of the script below:

sts

.co

QUESTION NO: 82

78

Microsoft 70-450: Practice Exam Explanation: Encryption of a column in SQL Server 2008 is only supported when the column's data type is set to varbinary . The schema of the table must be changed to allow for encryption. You can either add a column with the varbinary data type, or you can alter the column's data type to varbinary . Incorrect Answers: A: You should not set the data type of the column to int. An int data type is used to store exact numbers. An int data type is can be used to store numbers from -2,147,483,648 to 2,147,483,648 and cannot be used to store encrypted data for a column. B: You should not set the data type of the column to varchar. A varchar data type can support nunUnicode data can support a storage size of 2^31 --1 bytes and cannot be used to store encrypted data for a column. C: You should not set the data type of the column to xml. An xml data type is used to store XML data and cannot be used to store encrypted data for a column.

QUESTION NO: 83

CertKiller.com wants you to determine if the new CreditCardNo column contains the correct data before removing the Credit Card column by making use of a query to compare the data in the Credit Card column with the CreditCardNo column. What should you do? A. You should consider using the query: SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card', CONVERT(nvarchar, DecryptByKey (CreditCardNo))AS 'Decrypted Credit Card' FROM CK_SALES.Orders. B. You should consider using the query: SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card', CONVERT(nvarchar, DecryptByText (CreditCardNo)) AS 'Decrypted Credit Card' FROM CK_SALES.Orders. "Pass Any Exam. Any Time." - www.actualtests.com 79

Ac

tua

You created a master key in the database with a certificate for encryption. You created a symmetric key for the certificate and altered the Orders table to add a column called CreditCardNo to store the encrypted Credit Card Number. You additionally encrypted the value in the CreditCardNo column with a symmetric key.

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to have the Credit Card Numbers encrypted for the CertKiller.com customers in the Orders table. You then perform the actions listed below:

sts

.co

Microsoft 70-450: Practice Exam C. You should consider using the query: SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card', CreditCardNo AS 'Decrypted Credit Card' FROM CK_SALES.Orders. D. You should consider using the query: SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card', CONVERT(nvarchar, CreditCardNo) AS 'Decrypted Credit Card' FROM CK_SALES.Orders. Answer: A Explanation: The encrypted column must have a varbinaiy data type. To display the information in varbinaiy column, you must convert the column to another readable data type, such as a varchar data type. You must also include the DecryptByKey function. This function decrypts the data in the CreditCardNo column by using the symmetric key. Incorrect Answers: B: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card', CONVERT(nvarchar, DecryptByText (CreditCardNo)) AS 'Decrypted Credit Card' FROM CK_SALES.OrdersThis query uses an incorrect function called DecryptByText. This function is not a standard T-SQL function. C: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card', CreditCardNo AS 'Decrypted Credit Card' FROM CK_SALES.Orders.This query does not use the DecryptByKey function to decrypt the data in the CreditCardNo column by using the symmetric key. D: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card', CONVERT(nvarchar, CreditCardNo) AS 'Decrypted Credit Card' FROM CK_SALES.Orders.This query does not use the DecryptByKey function to decrypt the data in the CreditCardNo column by using the symmetric key.

QUESTION NO: 84 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to implement the security requirements for a new database application which will be deployed to CERTKILLER-DB01. You make use of the code segment below to create a table in the new database: CREATE TABLE CK_Discounts "Pass Any Exam. Any Time." - www.actualtests.com 80

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam ( ProductID INT NOT NULL IDENTITY(1,1), SalePrice MONEY NOT NULL, Discount VARBINARY(MAX) FILESTREAM ) CertKiller.com wants you to ensure that the Discount column is protected from unauthorized access using the most secure method. What should you do? (Choose all that apply.) A. The best option is to Event Subscriptions on all columns in the database. B. The best option is to limit the access of the database files to the SQL Server 2008 Service account. C. The best option is to set up offline files to use encryption. D. The best option is to use IPsec domain isolation. E. The best option is to use NTFS file system security. Answer: B,E

QUESTION NO: 85

CertKiller.com has hired you as a database administrator for their network. Your duties encompass administering a SQL Server 2008 infrastructure. The instance hosts a business critical database named CERTKILLER-DB06. A CertKiller.com policy states that CERTKILLER-DB06 should always be available to its users without any loss of information. Filestream data is also included in CERTKILLER-DB06. You thus decide to make use of a high-availability solution. What should you do?

A. You should consider making use of a RAID 5 array. B. You should consider making use of multiple downstream servers. C. You should consider making use of failover clustering. D. You should consider making use of the Job Activity Monitor tool. Answer: C

QUESTION NO: 86

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

81

Microsoft 70-450: Practice Exam CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com include administering four SQL Server 2008 instances. All the instances host a single database application. You are currently implementing the migration of the instances to a new SQL Server failover cluster. The four instances are configured as follows:CERTKILLER-DB01 is configured with 8 processors that have 16 GB of RAM.CERTKILLER-DB02 is configured with 4 processors that have 8 GB of RAM.CERTKILLERDB03 is configured with 2 processors that have 16 GB of RAM.CERTKILLER-DB04 is configured with 4 processors that have 8 GB of RAM. At present the instances are all optimized and contain no additional CPU cycles or memory. However, a single virtual cluster IP address will be used for the new SQL Server failover cluster will host the four databases. The CertKiller.com CIO wants the cluster to handle the workload of the database applications without using too may hardware. What should you do?

Answer: B

QUESTION NO: 87

You work as a database administrator at CertKiller.com. You are responsible for administering multiple servers that run SQL Server 2008 Enterprise Edition. You are assigned a SQL Server 2008 Enterprise Edition server named CERTKILLER-DB01 that hosts multiple databases. You receive an instruction from the CIO to:Ensure the highest availability.Keep the downtime of these databases together with the system databases to a minimum.The databases are available on one server for client access. You need to determine the best solution to recommend to the CIO. What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. This can be achieved by having a two-node active/active cluster configured where every node will contain a 10 processors and 15 GB of memory. B. This can be achieved by having a two-node active/passive cluster configured where every node will contain 18 processors and 50 GB of memory. C. This can be achieved by having a four-node active/active/active/passive cluster configured where every node will contain 9 processors and a 50 GB of memory. D. This can be achieved by having a four-node active/active/active/active cluster configured where every node will contain a 6 processors and a 11 GB of memory.

sts

.co

82

Microsoft 70-450: Practice Exam A. You should recommend Log shipping. B. You should recommend Database mirroring. C. You should recommend Replication. D. You should recommend Failover clustering. Answer: D Explanation: Failover clustering requires one or more servers that contain two or more shared disks. When you create a SQL Server failover cluster, the entire cluster instance appears as a single computer on the network. However, there are multiple functional servers on the back end. When a failure happens, the failover cluster allows a new node, which was not the current node, to become the current node. When this new current node fails, another node in the cluster is given the responsibility of owning the resource group. In this solution, both the user databases and system databases are provided the highest availability when a failure occurs. Incorrect Answers: A: The log shipping option is incorrect. Log shipping enables transactional log backup from the primary server to the secondary server. The logs of the primary database on the primary server are backed up for the secondary database hosted on a secondary server. The transaction logs are used for synchronizing both primary and secondary databases. Limited reporting functionality is available when the secondary databases are restored. This solution will not work in the scenario because in case of a failure, the system databases will not be available. Log shipping, unlike clustering, does not provide failover detection or automatic failover. B: You should not implement database mirroring as a solution to meet the requirement stated in the scenario. In database mirroring, databases are mirrored from one server to another server to provide the highest availability and uptime. The database that is the primary copy is known as the principal database. The secondary copy or the standby copy is known as the mirror database. The mirror database is created with no recovery. This solution will not work in the scenario because in case of a failure, the system databases will not be available. C: You should not use replication. In SQL Server replication, a publish-subscribe model is used that allows the primary server to replicate information to the secondary servers. You can use different types of replication, such as snapshot, merge, or transactional. Replication can be used to replicate tables and objects from a database, but should not be used for data availability of that database. Replication is generally used to replicate some of the objects of a database, and not the entire database. You cannot use replication to system databases.

QUESTION NO: 88 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

83

Microsoft 70-450: Practice Exam All CertKiller.com users make use of the instance daily. You receive an instruction from the CIO to execute a software upgrade on the instance. You need to accomplish this without affecting the availability of the SQL server. What should you do? A. You should consider configuring automatic failover with synchronous database mirroring. B. You should consider configuring automatic failover with asynchronous database mirroring. C. You should consider configuring manual failover with synchronous database mirroring. D. You should consider configuring manual failover with asynchronous database mirroring. Answer: C Explanation: Manual failover can be used to upgrade hardware or software without sacrificing availability. Manual failover is only supported by synchronous or high-safety mode. Incorrect Answers: A: You should not configure automatic failover with synchronous database mirroring because automatic failover cannot be used for upgrading hardware or software. Automatic failover is a feature of database mirroring that is primarily used to prevent data loss during failover. B: You should not configure automatic failover with asynchronous database mirroring because automatic failover is supported only in database mirroring sessions running with a witness in synchronous or high-safety mode. Also, automatic failover cannot be used for upgrading hardware or software without affecting availability. D: You should not configure manual failover with asynchronous database mirroring because manual failover is supported only with synchronous database mirroring.

QUESTION NO: 89

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure a failover clustering solution for SQL Server 2008 by configuring the pre-requirements so the clustering solution is successfully implemented. CertKiller.com wants to know which pre-requirements should be met? A. The failover clustering solution should have the account capable of running the Microsoft Cluster Service (MSCS) assigned public rights on the SQL Server. B. The failover clustering solution would require the Microsoft Cluster Service (MSCS) and the SQL Server to use the same service account. "Pass Any Exam. Any Time." - www.actualtests.com 84

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam C. The failover clustering solution would require Microsoft Cluster Service (MSCS) to be able to verify the failover cluster instance using the LooksAlive check. D. The failover clustering solution would require Microsoft Cluster Server or the Microsoft Cluster Service (MSCS) service to be configured on all nodes in the cluster. Answer: A Explanation: MSCS needs to verify the failover cluster instance availability. MSCS uses the IsAlive check to verify the failover cluster instance availability by polling the SQL Server every 60 seconds. The account that runs the MSCS service is also used to run the IsAlive check. Therefore, MSCS must have public rights on the SQL Server to run the IsAlive check for its availability. Incorrect Answers: B: You must not use the same service account for the MSCS and the SQL Server. As a recommended practice, you should use different service accounts for both the MSCS and the SQL Server. If the same accounts are used, you will not be able to change the password for the MSCS service at a later date. C: The MSCS does not verify failover cluster instance availability using the LooksAlive check. Instead, the IsAlive check is performed to check the availability of the failover cluster instance. LooksAlive is a simple check performed every five seconds using the Windows NT Service Control Manager. IsAlive is performed every 60 seconds by connecting to the SQL Server. D: The option stating that the Microsoft Cluster Server or the MSCS service must be configured on all nodes in the cluster is incorrect. You need to have the MSCS service running on at least one of the nodes in your cluster, not all nodes of the cluster. A clustering solution can be implemented with SQL Server Standard version, with only two nodes, and SQL Server Enterprise version can be implemented with eight nodes. The MSCS service must be running on at least one node in the cluster for each version. Part 2: Design database mirroring (6 Questions)

QUESTION NO: 90

You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance. A database configured using a high-safety mirroring operation mode along with a witness server is hosted by the instance at CertKiller.com. During routine monitoring you discover that the witness server is experiencing memory failure. The witness server will thus be offline for a few hours. The CertKiller.com management wants you to make sure that database unavailability is kept to a minimum. You thus decide to reconfigure the mirroring strategy. What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

85

Microsoft 70-450: Practice Exam A. Your best option would be to make sure that the mirroring session is not used on the witness server. B. Your best option would be to make sure that the resource database is not used. C. Your best option would be to make sure that the SQL Profiler trace is removed. D. Your best option would be to make sure that Transaction Logs is removed. Answer: A

QUESTION NO: 91 You are employed as the database administrator at CertKiller.com. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_MARKETING. CK_MARKETING contains the backup strategy below:Weekly a full database backup is executed.Daily a differential backup is executed.Hourly a transaction log backup is executed. You are in the process of implementing an end-of-year batch process. This process will take three hours to complete and will modify 10 % percent of information within CK_MARKETING. You receive an instruction from the CIO to make sure that the batch operation is able to be rolled back. You need to accomplish this in the least amount of time. What should you do?

Answer: C

QUESTION NO: 92 You work as a database administrator at CertKiller.com. You are responsible for administering two SQL Server 2008 servers. You have received instruction from the CIO to configure synchronous database mirroring in highsafety mode. You discover that the primary server failed. You decide to force the mirror server to become the primary server. You need to determine role the primary server have with the mirror database when it comes back online. What will happen? "Pass Any Exam. Any Time." - www.actualtests.com 86

Ac

tua

A. Your best option would be to use a Transaction log backup. B. Your best option would be to use the Windows System Resource Manager (WSRM). C. Your best option would be to use a database snapshot. D. Your best option would be to use Microsoft Multipath.

lTe

sts

.co

Microsoft 70-450: Practice Exam A. It will result in the original primary server not being recognized as part of the mirror. B. It will result in the original principal server being recognized as primary server again. C. It will result in no mirror and the secondary server will be identified as a standalone server. D. It will result in the secondary server staying the primary server in the mirror. Answer: D Explanation: When you have a synchronous database mirroring in high-safety mode and the principal server goes down, the secondary server becomes the principal server hosting the working copy of the mirrored database. If a principal server goes down or disconnects from the mirror, the secondary server continues to act as a secondary server until a secondary server forces the secondary server to become the principal server. When the secondary server becomes the principal server, it may not have the latest logs for the database. Therefore, there may be some data loss depending upon what was written from the principal server's log to the secondary server log. After the secondary server becomes the principal server and the original principal server comes back online, it cannot demote the new principal server back to being a secondary server. The original principal server in this case will become the secondary server and roll back its logs to synchronize with the new principal server's logs. Incorrect Answers: A: All the other options are incorrect because the secondary server will be the principal server in the mirror in this scenario. When the original principal server comes online, the mirror will not be broken. The original principal server will be recognized as part of the mirror, but will be the secondary server. B: All the other options are incorrect because the secondary server will be the principal server in the mirror in this scenario. When the original principal server comes online, the mirror will not be broken. The original principal server will be recognized as part of the mirror, but will be the secondary server. C: All the other options are incorrect because the secondary server will be the principal server in the mirror in this scenario. When the original principal server comes online, the mirror will not be broken. The original principal server will be recognized as part of the mirror, but will be the secondary server.

QUESTION NO: 93 You are employed as a database administrator at CertKiller.com. CertKiller.com has its headquarters in Chicago and a branch office in Miami. You are responsible for administering multiple Microsoft SQL Server 2008 servers. CERTKILLER-DB01 and CERTKILLER-DB02 is located at the Chicago office and CERTKILLERDB03 at the Miami office. CERTKILLER-DB01 hosts a database named CK_PRODUCTS. To ensure productivity you need to make sure that the client applications in the Miami and Chicago "Pass Any Exam. Any Time." - www.actualtests.com 87

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam offices is able to make use of CK_PRODUCTS in the event of CERTKILLER-DB01 failing. What should you do? A. This can be accomplished by ensuring that database mirroring is enabled with CERTKILLERDB03. B. This can be accomplished by ensuring that replication is enabled with the CERTKILLER-DB03. C. This can be accomplished by ensuring that clustering is enabled with the CERTKILLER-DB03. D. This can be accomplished by ensuring that log shipping is enabled with the CERTKILLERDB03. Answer: A Explanation: Database mirroring allows failover detection of user databases. With database mirroring, you can configure a mirror set to automatically fail over to a secondary server when the primary server fails if a witness server is configured. You can configure the Sales database to be mirrored on the CERTKILLER-DB03 server and configure CERTKILLER-DB02 to be a witness server. You can program client applications to automatically connect to the new primary servers when database mirroring is enabled. In this scenario, you can have the client applications connect to the mirrored copy of the Sales database on another SQL server in the branch office. Incorrect Answers: B: You should not enable clustering with CERTKILLER-DB03. Clustering does provide failover detection and automatic failover for both system databases and user databases. You cannot enable clustering for the SQL servers in the different offices. C: You should not enable log shipping or replication with CERTKILLER-DB03. Replication and log shipping can be used to make a copy of a user database, but neither replication nor log shipping provides failure detection or automatic failover. You cannot have applications automatically fail over to a copy database with either log shipping or replication. D: You should not enable clustering with CERTKILLER-DB03. Clustering does provide failover detection and automatic failover for both system databases and user databases. You cannot enable clustering for the SQL servers in the different offices.

QUESTION NO: 94 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008. These servers are used to manage the database. You receive an instruction from the CIO to implement a high-availability solution in the network. This high-availability solution should include database mirroring as well as log shipping. You need to determine what benefit it will result in.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

88

Microsoft 70-450: Practice Exam What should you identify? A. It will result in you only requiring the principal server to be configured as primary server. B. It will result in only one secondary server in log shipping when configured with database mirroring. C. It will result in the principal database in mirroring to be configured as a primary database in log shipping. D. It will result in the mirrored database in mirroring to be configured as a secondary database in log shipping. Answer: C Explanation: You can configure a principal database in mirroring to be the primary database in log shipping. In most cases, you will configure mirroring before configuring log shipping. In mirroring, you would typically have a principal server, a secondary server, and if you need automatic failover to the secondary server, then a witness server as well. If configuring principal server to be the primary server, which is principal/primary database combination, you must also configure the mirror database to be the primary database, which will be the mirror/primary database, for log shipping. Incorrect Answers: A: The option stating that when log shipping is configured with mirroring, it requires only the principal server to be configured as a primary server, is incorrect. You need to configure the principal server as the primary server. Along with configuring the principal server, you must also configure the mirror server as the primary server for log shipping. In mirroring, a principal and a secondary server contain replicas of the databases on which mirroring has been configured. For mirroring to work appropriately, you must also configure the mirror server as the log shipping primary server if the principal server has been configured as the primary server. B: The option stating that there can be only one secondary server configured with mirroring in log shipping is incorrect. In log shipping, you can have more than one secondary server configured. It is not mandatory that you can have only one secondary server in log shipping D: The option stating that the mirrored database in mirroring must also be configured as a secondary database in log shipping is incorrect. The mirrored database must also be configured as a primary database if the principal database is configured as a primary database.

QUESTION NO: 95 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure synchronous database mirroring using high-safety mode. CertKiller.com has discovered that the CERTKILLER-DB01 went down forcing the mirror to become the principal server. You later "Pass Any Exam. Any Time." - www.actualtests.com 89

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam promoted the secondary server to be the primary server. What should you do next? (Choose two) A. You should consider having user logins created from the CERTKILLER-DB01 to the promoted principal server B. You should consider having the jobs created on the newly promoted principal server. C. You should consider having CERTKILLER-DB01 brought back online. D. You should consider having the master database of CERTKILLER-DB01 copied to the newly promoted server. E. You should consider having the log files from CERTKILLER-DB01 copied to the newly promoted server. Answer: A,B Explanation: If a principal server goes down or disconnects from the mirror, the secondary server continues to act as a secondary server until a secondary server forces itself to become the principal server. When the secondary server becomes the principal server, it may not have the latest logs for the database, and therefore there may be some data loss, depending upon what was written from the principal server's log to the secondary server log. After the secondary server becomes the principal server and the original principal server comes back online, it cannot demote the new principal server back to being a secondary server. The original principal server in this case will become the secondary server and roll back its logs to synchronize with the new principal server logs. The master database is not automatically mirrored from the original principal server to the secondary server. When the secondary server becomes the principal server, the master database is not part of the database mirror. You will have to recreate any jobs that were running on the original principal server on the newly promoted principal server. Since the master database is not mirrored with the secondary database, and the master database maintains user logins, you will also have to manually create the user logins on the newly promoted principal server. Otherwise, the users will not be able to access newly promoted principal server. Incorrect Answers: C: When the original principal server comes online, it will be demoted to secondary server. Part 3: Design a high-availability solution that is based on replication (2 Questions) D: You do not have to copy the master database or the logs from the secondary server to the newly promoted principal server. You would need to perform the required steps to ensure that the newly promoted principal server is accessible. E: You do not have to copy the master database or the logs from the secondary server to the newly promoted principal server. You would need to perform the required steps to ensure that the newly promoted principal server is accessible.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

90

Microsoft 70-450: Practice Exam

QUESTION NO: 96 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to install a new database application to the instance. The new database will use SQL CLR integration to develop stored procedures. CertKiller.com wants you to ensure that the application is configured to enable EXTERNAL_ACCESS code access security settings whilst ensuring the application is deployed with no loss of functionality. What should you do?

Answer: A

QUESTION NO: 97

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you add a user named Rory Allen as a member of the db_owner role in the newly created CK_PRODUCTS database. Rory Allen has later created a user named Mia Hamm who is a user in the CK_SALES database in the CK_PRODUCTS database. Rory Allen has additionally created a stored procedure object in the CK_PRODUCTS database named GetProductSales which call a stored procedure in the CK_SALES database named SalePrice, both objects are owned by Miam Hamm. The database configuration is shown in the exhibit below:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. You should consider having the peverify.exe utility used to confirm if the code meets the typesafety requirements. B. You should consider registering the VPN solution for the installation. C. You should consider using the File Server Resource Manager (FSRM) with static fields. D. You should consider using the Windows System Resource Manager (WSRM) with read write static fields.

sts

.co

91

Microsoft 70-450: Practice Exam

What should you do?

QUESTION NO: 98

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to perform a manual role change on CERTKILLER-DB01 from a primary server to a secondary server. You later backup the transaction logs using with norecovety clause from the primary server to the secondary server. What should you do? (Choose two)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

Explanation: Part 4: Design a high-availability solution that is based on log shipping (2 Questions)

tua

Answer: B

lTe

A. You should consider changing the authentication mode from Mixed Mode authentication to Windows security authentication. B. You should consider having cross-database ownership chaining disabled. C. You should consider having Mia Hamm added to the db_owner database role in the CK_SALES database. D. You should consider having all of Rory Allen's permissions revoked on SalePrice.

sts

.co

CertKiller.com wants you to ensure that Rory Allen has the permissions checked on the SalePrice object.

92

Microsoft 70-450: Practice Exam A. You should consider having the primary server shut down. B. You should consider having log shipping disabled on the secondary server. C. You should consider having a new primary server configured as the primary server for other secondary servers. D. You should consider having the log shipping backup job disabled on the primary server. E. You should consider having the jobs from the primary server copied and restored to the secondary server. Answer: D,E Explanation: You should perform the following two steps: Disable the log shipping backup job on the primary server. You will later enable the log shipping backup job on the secondary server. Copy and restore the jobs from the primary to the secondary server. To be able to run the same jobs on the secondary server, which will be the new primary server, you need to ensure that the jobs are copied and restored on the secondary server from the primary server. Incorrect Answers: A: You should not shut down the primary server. If you shut down the primary server, you will not be able to complete the role change process. B: You should not disable log shipping on the secondary server. Log shipping on the secondary server should be enabled, not disabled. C: You do not need to configure a new primary server as the primary server for other secondary servers in this scenario. Even though you can configure the new primary server as the primary server for the other secondary servers, this is an optional step.

QUESTION NO: 99

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES and CERTKILLER-DB02 as a database mirror configured with a full quorum. In the current configuration CERTKILLER-DB01 is the principal server and CERTKILLER-DB02 is the mirror server. During the course of the day you add an additional server CERTKILLER-DB03 which is configured as the witness server. CertKiller.com has later reported that CERTKILLER-DB01 went offline and the mirror CERTKILLER-DB02 10 minutes later also goes offline. CERTKILLER-DB02 became online before CERTKILLER-DB01. CertKiller.com wants to know that the result would be when CERTKILLER-DB01 becomes online. What would the result be? "Pass Any Exam. Any Time." - www.actualtests.com 93

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam A. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have mirrored database remaining offline. B. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB03 as the principal server. C. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB01 remaining the principal server. D. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB02 as the principal server. Answer: D Explanation: Part 5: Select high-availability technologies based on business requirements (7 Questions)

QUESTION NO: 100

You work as a database administrator at CertKiller.com. You are responsible for administering SQL Server 2008 servers on a single site. CertKiller.com contains two instances on the site which is as follows: There is an Enterprise Edition server instance on a server that contains a redundant array of independent disks (RAID) 10 disk system as well as a Standard Edition server instance on a server that contains a RAID 5 disk system. The instances all host a single application. You receive a directive from management to devise a high availability solution for the site that will meet the subsequent requirements:You need to use the implementation on the current systems.The database should be available with least amount of downtime.The loss of information should be little.The solution should have least effect on the current system. What should you do? (Choose all that apply.) A. This can be accomplished using the LUN Management settings. B. This can be accomplished using log shipping. C. This can be accomplished using replication. D. This can be accomplished using downstream servers. Answer: B,C

QUESTION NO: 101

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

94

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. CertKiller.com has its headquarters in London and branch offices in Paris, Stockholm and Athens. You are responsible for administering the SQL Server 2008 instances at the four sites. The four sites all share a mission critical database named CERTKILLER-DB09. A new directive from management states that all users must be able to:Access and change information with the least amount of latency of all the sites.Reduce the loss of information when server failure occurs. You thus need to determine a high-availability solution that will accomplish this. What should you do? A. This can be accomplished by implementing a two-node failover cluster. B. This can be accomplished by implementing the Activity Monitor tool. C. This can be accomplished by implementing Asynchronous database mirroring. D. This can be accomplished by implementing peer-to-peer replication. Answer: D

QUESTION NO: 102

What should you do? (Choose all that apply.) A. You should make use the Synchronous database mirroring with a witness server. B. You should make sure that the user workstations are redirected to the secondary instance. C. You should make sure that the transaction log not applied should be backed up in sequence to every secondary database with the WITH RECOVERY option on the last log. D. You should use the WITH NORECOVERY option to make sure that the tail of the transaction log of primary databases is backed up. E. You should make sure that the stored procedures are copied to the secondary instance. Answer: B,C,D "Pass Any Exam. Any Time." - www.actualtests.com 95

Ac

The logs of the three SQL instances are shipped to a fourth SQL instance. You then decide to implement a manual failover. You have received instruction from the CIO to make sure that the secondary server is used by the database applications in the event of a failover. To ensure productivity you need to make sure that the latest information is available to CertKiller.com users to access.

tua

lTe

You work as a database administrator at CertKiller.com. Your duties include administrating a SQL Server 2008 infrastructure. You are in the process of implementing log shipping on three SQL Server instances for numerous databases.

sts

.co

Microsoft 70-450: Practice Exam

QUESTION NO: 103 You are the newly appointed database administrator at CertKiller.com. You are responsible for administering the Microsoft SQL Server 2008 server. You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02 and CERTKILLER-DB03. CERTKILLER-DB02 is configured as the primary server and CERTKILLER-DB03 as the secondary server. You decide to apply certain maintenance patches on CERTKILLER-DB02. To achieve this you need to take the server offline. To ensure that productivity continues you need to make sure that CERTKILLER-DB03 performs the role of the primary server. In order to start the [process you copy the database backup files from the network share to CERTKILLER-DB03. What is your next step?

Answer: B

Explanation: You need to perform the following steps to bring a secondary server online as a primary server: Copy onto the secondary server any backup files that are not already there. These backup files might be stored in the network share. The transaction logs must be restored on the secondary server. You need to back up the transaction logs from the primary to the secondary server using the with norecovery clause. When you back up transaction logs from the primary server using the with norecovery clause, the database in the primary server goes into the restoring state. In this state, the database is not available to users. On the secondary server, you need apply to the transaction logs to roll the database forward. After you roll the database forward on the secondary server, the secondary database server is synchronized with the primary server and is updated with the latest information. After CERTKILLER-DB03 is configured as the primary server, You can now redirect the SQL clients to CERTKILLER-DB03. CERTKILLER-DB03 can be configured as the primary server for various other secondary servers. Incorrect Answers: A: You only need to roll forward the secondary server database once you have restored the transaction logs on the secondary server. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

A. Your next step should be to roll the database forward on CERTKILLER-DB03. B. Your next step should be to restore the transaction logs on CERTKILLER-DB03. C. Your next step should be to disable all backup jobs on the CERTKILLER-DB02. D. Your next step should be to configure the CERTKILLER-DB03 as the primary server for other secondary servers if they exist.

.co

96

Microsoft 70-450: Practice Exam C: You do not need to disable all backup jobs on the primary server. You only need to disable log shipping backup jobs when you are performing a role change between the primary and the secondary server. D: You do not need to configure the CERTKILLER-DB03 as the primary server for any other secondary servers. This step is not required while you are bringing the secondary server online.

QUESTION NO: 104 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering multiple database servers located in Miami and branch office at Toronto. The Toronto network users often come to Miami and use data from the Toronto office servers. CertKiller.com wants you to configure data replication between the Miami servers and Toronto servers whilst ensuring the replication type used has the ability to resolve conflicts occurring during replication.

Answer: D

You must replicate information to mobile users who are not always connected to the SQL Server. There is a requirement of data filtering. In data filtering, you can filter different updates to different Subscribers at different locations. You require the ability to resolve conflicts that occur during replication. Incorrect Answers: A: You should not use peer-to-peer replication. This type of replication is typically used when you need high availability and scalability. This type of replication does not have the ability to resolve conflicts that may occur during replication updates. B: You should not use transactional replication. In this type of replication, fewer Subscribers keep the read-only copy of replicated data. This type of replication does not have the ability to resolve conflicts that occur during replication updates. C: You should not use snapshot replication. This type of replication is used when you need to replicate a large volume of information. This type of replication does not have the ability to resolve "Pass Any Exam. Any Time." - www.actualtests.com 97

Ac

tua

Explanation: Merge replication has the ability to resolve conflicts that may occur during the replication. You typically use merge replication when:

lTe

sts

A. You should consider making use of snapshot replication. B. You should consider making use of peer-to-peer replication. C. You should consider making use of transactional replication. D. You should consider making use of Merge replication.

.co

What should you do?

Microsoft 70-450: Practice Exam conflicts that may occur during replication updates.

QUESTION NO: 105 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to add a column to the SaleData table which has a varbinary(max) column containing the FILESTREAM data files on the CK_SALES database. CertKiller.com wants you to configure a high availability solution for the database. What should you do? (Choose all that apply) A. You should consider making use of replication. B. You should consider making use of database snapshots. C. You should consider making use of failover clustering. D. You should consider making use of log shipping. E. You should consider making use of database mirroring. Answer: A,C,D

Explanation: You can configure the following high availability solutions for a database that contains a varbinary ( max) column: Log shipping: This high availability solution works with the databases that have FILESTREAM data in the vat binary (max) column. You must enable FILESTREAM in both the primary and the secondary servers. Each server must be running SQL Server 2008 with FILESTREAM enabled. If any of the required prerequisites are not met, the solution will not work. Failover clustering: This high availability solution requires FILESTREAM data to be hosted on a shared disk so that it can be accessible by all nodes in the cluster. Each node in the cluster must have FILESTREAM enabled for it to work successfully in a clustered environment. Replication: In merge replication, a uniqueidentifier data type column is automatically added to tables that do not contain this data type. A UNIQUE constraint must also be defined for the column along with ROWGUIDCOL property set. Incorrect Answers: B: You cannot configure database snapshots for the database that contains FILESTREAM data in a varbinary (max) column. When you attempt to create a database snapshot of the database that contains FILESTREAM data, you will be prompted with an error. E: You cannot configure database mirroring for the database that contains FILESTREAM data in a varbinary (max) column. FILESTREAM filegroups are not supported on the principal server in a mirroring configuration. If mirroring does not support a database with the FILESTREAM data, the "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

98

Microsoft 70-450: Practice Exam secondary server will also not be able to support it. Therefore, database mirroring cannot be configured with a database that has FILESTREAM data and filegroups, and this solution will not work when you have FILESTREAM data.

QUESTION NO: 106 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to add an additional server named CERTKILLER-DB02 and configure a database mirror which uses the full quorum. CertKiller.com has configured CERTKILLER-DB01 as the principal server and CERTKILLER-DB02 as the mirror server. CertKiller.com additionally configured a server named CERTKILLER-DB03 as the witness server. CertKiller.com wants to know what would occur if CERTKILLER-DB03 went offline. What would your reply be?

Answer: B

Explanation: When a witness server goes offline, the full quorum is no longer used. Both the principal, which is CERTKILLER-DB01, and mirror, which is CERTKILLER-DB02, will move into a partner-to-partner quorum. Without the witness server, automatic failover will not be supported. A database administrator will have to perform manual failover if the principal server becomes unavailable. Only when the witness server is back online will the automatic failover be possible. Incorrect Answers: A: CERTKILLER-DB02 is the mirror server and will not become the principal server. The mirror server resumes the role of a principal server only when the principal server is no longer available. If this occurs, the witness server will assign the role of the principal server to the mirror server. If there is no witness server and there is partner-to-partner quorum, the mirror server must be assigned the role of principal server by the administrator using the manual failover process. C: The database will not go offline. If both principal and mirror lose the quorum, the database will be offline and the witness server will not be available. However, in the scenario, only the witness "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. CERTKILLER-DB03 going offline would result in CERTKILLER-DB02 becoming the principal server. B. CERTKILLER-DB03 going offline would result in CERTKILLER-DB01 and CERTKILLER-DB02 moving into partner-to-partner quorum. C. CERTKILLER-DB03 going offline would result in the database going offline. D. CERTKILLER-DB03 going offline would result in CERTKILLER-DB01 having the only copy of the database.

lTe

sts

.co

99

Microsoft 70-450: Practice Exam server goes offline. A partner-to-partner quorum exists between CERTKILLER-DB01 and CERTKILLER-DB02, and therefore the database does not go offline. D: The principal server will not have the only copy of the database. Both the mirrored server and the principal server will have a copy of the database. If you have a full quorum and witness server goes down, you will then have a partner-to-partner quorum. For a copy of the database to exist only on the principal server, you must remove the witness from the quorum so that if the mirror server goes down, the database is available on the principal server.

QUESTION NO: 107 You are the newly appointed a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance that hosts a database named CK_SALES. CK_SALES contains the subsequent backup strategy:The execution of full database backups on a weekly basis.The execution of differential database backups every day.The execution of transactional log backups on an hourly basis.The recovery plan necessitates that you execute an unscheduled full backup.

What should you do?

Answer: A

QUESTION NO: 108 CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_PRODUCT that stored highly confidential data. You have received instruction from the CIO to ensure that data restored as soon as possible in the event that an error occur. There are two tape devices from different manufacturers in CERTKILLER-DB01. However, the tape devices make use of the same media and have the same capacity. You thus need to confirm that the information on the backup of CK_PRODUCT can be "Pass Any Exam. Any Time." - www.actualtests.com 100

Ac

tua

A. Your best choice would be to make use of the COPY_ONLY backup option. B. Your best choice would be to make use of the database snapshot. C. Your best choice would be to make use of the Transaction log backup. D. Your best choice would be to make use of the Hyper-V feature.

lTe

sts

You receive an instruction from the CIO to execute a full database backup. You need to accomplish this tasks without the scheduled backup strategy being disrupted.

.co

Microsoft 70-450: Practice Exam restored as well as ensuring that the information is not corrupted. What should you do? A. You should consider configuring a mirrored backup media sets. Then the stop_on_error keyword can be used during the backup. B. You should consider configuring a mirrored backup media sets. Then checksum keyword can be used during the backup. C. You should consider creating a media set. Then the stop_on_error keyword can be used during the backup. D. You should consider creating a media set. Then the checksum keyword can be used during the backup. Answer: D Explanation: The checksum keyword verifies each page for checksum and torn page errors and will generate a checksum for the entire backup. The backup will be flagged as containing backup checksums in the backupset table in the MSDB database. To verify the backup, you should use restore verifyonly . This command is used to determine if the following conditions are met: The backup set is complete. Checksum is present on the media. Volumes are all readable. The destination drive has sufficient space to restore. The restore verifyonly statement does not guarantee that the data can be recovered. This command can be used to determine database integrity problems that could compromise the backup set. Incorrect Answers: A: You cannot create a mirrored backup media sets using the checksum keyword or the stop_on_error keyword during the backup. A mirroring backup media set can increase the reliability of the backup by reducing the possibility of a backup-device malfunction. If a malfunction occurs in one device, the other device can still proceed with the backup. A mirrored backup set can only be created if the tape devices are from the same manufacturer and have the same serial number. The tape devices used on CERTKILLER-DB01 are similar, but not the same model. The stop_on_error keyword is used to stop a backup if a checksum does not verify. This is the default behavior and does not need to be specified. B: You cannot create a mirrored backup media sets using the checksum keyword or the stop_on_error keyword during the backup. A mirroring backup media set can increase the reliability of the backup by reducing the possibility of a backup-device malfunction. If a malfunction occurs in one device, the other device can still proceed with the backup. A mirrored backup set can only be created if the tape devices are from the same manufacturer and have the same serial number. The tape devices used on CERTKILLER-DB01 are similar, but not the same model. You "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

101

Microsoft 70-450: Practice Exam should add the checksum keyword in the backup statement to ensure that checksums are performed. no_checksum is the default. You also cannot create a mirrored backup media sets using the checksum keyword during the backup. C: You should not create a media set and use the stop_on_error keyword during the backup. This is the default behavior and does not need to be specified.

QUESTION NO: 109 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to set up database mirroring with a witness server whilst ensuring that automatic failover to the mirror server is available when CERTKILLER-DB01 goes down.

Answer: A

Explanation: In this scenario, either full quorum or witness-to-partner quorum would meet the requirement. You can set either of the two quorums for the automatic failover to the mirror server if principal server is out of quorum. Three types of quorums can be configured: Full quorum: In full quorum, there are three servers involved: a witness server, a principal server, and a mirror server. All three servers interact with each other in a full quorum. If the principal server fails, the mirror server takes over the role of the principal server. There is automatic failover initiated by the witness server and the mirror server will be designated as the principal server. When the principal server comes online in the quorum, it becomes the mirror server. On the other hand, if the mirror server fails, the principal server suspends mirroring, and then resynchronizes its copy of the database when the mirror server returns. Witness-to-partner quorum: In this quorum, there is either a principal or a mirror server and one witness server. If the mirror server is out of quorum, the principal server continues with the witness server. However, the principal server keeps the database in an exposed state, meaning the database is currently not being mirrored with its mirrored copy. In another condition where the principal server fails, the witness server initiates the automatic failover and the mirror server is assigned the role of principal server.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

A. You should consider making use of the full quorum of the witness-to-partner quorum. B. You should consider making use of the partner-to-partner quorum only. C. You should consider making use of the witness-to-partner quorum only. D. You should consider making use of the full quorum only.

.co

What should you do?

102

Microsoft 70-450: Practice Exam Incorrect Answers: B: Partner-to-partner quorum: In this quorum, there is no witness server. Without the witness server, automatic failover will not be supported. A database administrator will have to perform manual failover if the principal server becomes unavailable. Only when the witness server is back online will automatic failover be possible. C: For an automatic failover to be applicable in a quorum, a witness server must be present. Partner-to-partner quorum does not have a witness server, and therefore does not have the capability for automatic failover. D: For an automatic failover to be applicable in a quorum, a witness server must be present. Partner-to-partner quorum does not have a witness server, and therefore does not have the capability for automatic failover.

QUESTION NO: 110 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure high availability for the CK_SALES database by using database mirroring. CertKiller.com has additionally requested that you configure automatic failover database mirroring sessions whilst improving reliability of the automatic failover. What should you do? (Choose all that apply)

A. You should consider having the database mirroring session configured with a witness server. B. You should consider having the database mirroring session configured to run in synchronous mode. C. You should consider having the database mirroring session configured to run in asynchronous mode D. You should consider having the database mirroring sessions stored on different computers. E. You should consider having the database mirroring sessions stored on a single computers. Answer: A,B,D Explanation: Failover clusters provide high availability for an entire instance of SQL server, whereas database mirroring provides high availability for a single database. When you want to use database mirroring with failover clusters, both the principal server and mirror server should reside on different clusters. However, a mirroring session can also be established when one partner resides on the failover clustered instance of a cluster and the other partner resides on a separate, unclustered computer. When you use database mirroring with failover clusters, the database mirroring sessions can be configured for automatic failover. To support automatic failover, the "Pass Any Exam. Any Time." - www.actualtests.com 103

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam database mirroring session must be running with a witness in synchronous or high-safety mode. In synchronous or high-safety mode, a transaction is committed on both servers, which ensures that the mirror database is in synchronization with the principal database. To improve the reliability of automatic failover, the principal database and the mirror database must reside on different computers. SQL Server 2008 also allows you to configure manual failover. Manual failover can be used to perform a rolling upgrade to the server operating system or SQL Server instances. To achieve this, you must ensure that you upgrade the mirror server first before initializing mirroring. Manual failover is only supported by synchronous or high-safety mode. Incorrect Answers: C: The option stating that the database mirroring session must be running in asynchronous mode is incorrect. To support automatic failover, the database mirroring session must be running with a witness in synchronous or high-safety mode. In asynchronous or high-performance mode, the transactions commit without waiting for the mirror server to write the log to disk. This will not guarantee that the mirror database is updated with all the transactions committed on the principal database. E: The option stating that the principal database and the mirror database must be stored on a single computer is incorrect because this will not improve the reliability of automatic failover. When both the principal and mirror databases are stored on a single computer, both the databases will become unavailable if the computer fails. In this case, automatic failover will not occur.

QUESTION NO: 111

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to move all the operators and alerts from CERTKILLER-DB01 in the testing environment to a server named CERTKILLER-DB02 in the production environment. CertKiller.com is aware that both servers are running the same build and edition of SQL Server 2008 with different hardware. What should you do? A. You should consider having the master database on CERTKILLER-DB01 backed up and restore the master database on CERTKILLER-DB02 to move the operators and alerts. B. You should consider having the sysjobs, sysnotifications, and sysalerts tables for CERTKILLER-DB01 copied to the appropriate database on CERTKILLER-DB02 to move the operators and alerts. C. You should consider having the model database on CERTKILLER-DB01 backed up and restore the master database on CERTKILLER-DB02 to move the operators and alerts. D. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore the msdb database on CERTKILLER-DB02 to move the operators and alerts. "Pass Any Exam. Any Time." - www.actualtests.com 104

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam Answer: D

QUESTION NO: 112 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts several databases containing mission critical data. During the course of the day you receive instruction from CertKiller.com to have the flexibility to revert the source database back to a specific point if there is any error in the database whilst ensuring you are capable of retrieving historical data and use the data for reporting and the backup should also be used for reporting purposes. What should you do? A. You should consider having the database mirrored using a full quorum. B. You should consider configuring log shipping. C. You should consider creating a full backup. D. You should consider creating a database snapshot. Answer: D

Explanation: To meet the required goal in the scenario, you should create a database snapshot. Snapshots provide a read-only image of the database that has a full working image of the database from the time when the snapshot was created. Only committed transactions are part of the snapshot. If there is any open and uncommitted transaction on the database, it will not be a part of the snapshot. If you have a snapshot readily available and there is any issue with the database, you can bring the snapshot online but ensure that it is on the same SQL Server instance from where the snapshot was created. Snapshots are typically used for reporting purposes. Incorrect Answers: A: You should not mirror the database with a full quorum. In a full quorum, there are three servers involved: a witness server, a principal server, and a mirror server. All three servers interact with each other. If the principal server fails, the mirror server takes over the role of the principal server and automatic failover is initiated by the witness server. The mirror server, in this case, will be designated as the principal server. If there is an error in the database or erroneous data in a table, this data can be mirrored from the principal server to the mirrored server. If the mirror server fails, the principal server suspends mirroring, and then resynchronizes its copy of the database when the mirror server returns. This solution will not meet the requirement stated in the scenario. B: You should not use log shipping. Log shipping will not help you revert to the database from the point where you had taken the backup of the source database. Log shipping is used for backing up transaction logs from the primary to the secondary server. You could also have a monitor server, which will be the third server, to track transaction log updates from the primary to the secondary "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

105

Microsoft 70-450: Practice Exam server. If there is an error in the database or erroneous data in a table, this data can be mirrored from the primary server to a secondary server. This solution will not meet the requirement stated in the scenario. C: You should not create a full back backup of the database. Even though backup will be used if the database or the entire server goes down, you typically do not use a backup for reporting purposes. You can use report snapshots to maintain historical reports.

QUESTION NO: 113 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_PRODUCT. CK_PRODUCT is spanned across multiple disks. You receive an instruction from the CIO to add a read-only filegroup to the CK_PRODUCT that will enclose historical data. You configure the backup schedule for CK_PRODUCT as follows:A full backup will run on Mondays, Wednesdays and Fridays at 02:00 am.A Transaction Log backup will run every day at 08:00 am.A Transaction Log backup will run every day at 14:00 pm.A differential backup will run on Tuesdays, Thursdays and Saturdays at 01:00 am. In the event of a failure you need to be able to restore CK_PRODUCT up till the point of failure. You need to determine a way to achieve this. What should you do?

Answer: A

Explanation: Not only should you have the transaction log on a different drive than the data files for performance reasons, you should have them on different drives for recovery purposes. If the transaction log file is on a different drive than the database files and the drive that contains the database files fails, you can still make a backup of the transaction log, referred to as a tail-log backup. If the transaction log is on the same drive as the database files and the drive fails, you cannot recover the database up to the point of failure. To perform a complete restore up to the point of failure, you should do the following: Restore the latest full backup by typing RESTORE DATABASE CK_PRODUCT FROM full database backup WITH NORECOVERY; "Pass Any Exam. Any Time." - www.actualtests.com 106

Ac

A. You should consider moving the transaction log to another drive than that of the data files. B. You should consider increasing the frequency of the transaction log backups. C. You should consider increasing the frequency of the differential backups. D. You should consider adding a filegroup backup of the read-only database.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam Restore the latest differential backup since the last full backup by typing restore database CK_PRODUCT from full_differential_backup WITH NORECOVERY; Restore the transaction logs from the last differential in order by typing restore log CK_PRODUCT from log_backup with NORECOVERY; Repeat this restore-log step for each additional log backup since the last differential backup Restore the tail-log backup that you created after the database failure by typing restore log CK_PRODUCT from taillog_ backup WITH NORECOVERY; Recover the database by typing restore database CK_PRODUCT with recovery; Incorrect Answers: B: You should not Increase the frequency of transaction log backups or increase the frequency of differential backups. Increasing the frequency of the transaction log backups and differential backups will help to recover data. However, unless you can create a tail-log backup as well, you will not restore the database back to the point of failure. C: You should not Increase the frequency of transaction log backups or increase the frequency of differential backups. Increasing the frequency of the transaction log backups and differential backups will help to recover data. However, unless you can create a tail-log backup as well, you will not restore the database back to the point of failure. D: You should not add a filegroup backup. A filegroup backup may not allow the database to recover to the point of failure. You will need a tail-log backup to get the database back to the point of failure.

QUESTION NO: 114

At present CK_ORDERS is configured to run a full backup daily and transaction log backups hourly. The checksun keyword is included in all backup statements. There are two tape devices from different manufacturers in CERTKILLER-DB01. However, the tape devices make use of the same media and have the same capacity. The hard drives in CERTKILLER-DB01 are the same model and have the same capacity. Management wants you to increase the reliability of the backups, decrease the chances of data loss as well as reduce the impact of backup-device malfunctions. You decide to implement mirrored backup media sets to accomplish this. How can this be accomplished? A. BACKUP DATABASE CK_ORDERS TO DISK ='E:\SQL2008\CK_Orders.bakl'MIRROR TO DISK = 'F:\SQL2008\CK_Orders.bak2'WITH MEDIANAME = 'CK_OrdersSetl'; "Pass Any Exam. Any Time." - www.actualtests.com 107

Ac

tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for a database server named CERTKILLER-DB01 that hosts a database named CK_ORDERS.

lTe

sts

.co

Microsoft 70-450: Practice Exam B. BACKUP DATABASE CK_ORDERS TO TAPE = '\\.\tape0'MIRROR TO TAPE = '\\.\tapel'WITH MEDIANAME = 'CK_OrdersSetl'; C. sp_addbackupdevice media= 'CK_OrdersSetl", device='\\.\tape0', device='\\.\tape1', MIRROR DEVICE D. BACKUP DATABASE CK_ORDERS TO DISK = 'E:\SQL2008\CK_Orders.bakl'MIRROR TO DISK = 'E:\SQL2008\CK_Orders.bak2'WITH MEDIANAME = 'CK_OrdersSetl'; Answer: A Explanation: You should use the backup database statement to specify that you will back up the Sales database. You must also specify the Mirror TO clause. You can mirror to disk or tape; however, the backup devices must have the same model number and be from the same manufacturer. In this scenario, CERTKILLER-DB01 has two tape drives from different manufacturers, but multiple hard drives that are from the same manufacturer and are the same model. Incorrect Answers: B: You can create a mirrored media set with the hard drives in CERTKILLER-DB01, not with the tape drives. Therefore, you should not use the following statement:BACKUP DATABASE CK_ORDERS TO TAPE = '\\.\tape0'MIRROR TO TAPE = '\\.\tape1'WITH MEDIANAME = 'CK_OrdersSet1'; C: You should not use either statement that uses the sp_addbackupdevice statement. This stored procedure was deprecated in SQL Server 2000. You cannot use this stored procedure in SQL Server 2008. D: You should not use the following statement because backup devices are being created on the same drive:BACKUP DATABASE CK_ORDERS TO DISK = 'E:\SQL2008\CK_Orders.bak1'MIRROR TO DISK = 'E:\SQL2008\CK_Orders.bak2'WITH MEDIANAME = 'CK_ORdersSet1'. You can mirror backup devices on the same drive. However, if there is an error with the drive, then both of your backup devices will be affected. You should have the backup devices on separate drives.

QUESTION NO: 115 You work as a database administrator at CertKiller.com. You are responsible for administering the Microsoft SQL Server 2008 servers. CertKiller.com has its headquarters in London and a branch office in Paris. Due to company growth the company opens another branch office in Athens. The Athens office is allocated a new SQL server. You receive an instruction from the CIO to ensure that a full backup of CK_DATA is shipped from the Athens office to the London office weekly. You need to make sure that the shipped backup does not have any effect on the scheduled backups for CK_DATA. You need to determine the statement the server operator should enter at the Athens office in order "Pass Any Exam. Any Time." - www.actualtests.com 108

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam to execute the backup. What should you identify? A. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak', [FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA Full Database Backup', SKIP, NOREUIND, NOUNLOAD, DIFFERENTIAL B. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak', [FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA Full Database Backup', SKIP, NOREWIND, NOUNLOAD C. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak', [FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA Full Database Backup', SKIP, NOREWIND, NOUNLOAD, COPY_ONLY D. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak', [FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA Full Database Backup', SKIP, NOREWIND, NOUNLOAD, DIFFERENTIAL, COPY_ONLY Answer: C

Explanation: In this scenario, the SQL server operator should create a copy-only backup. This type of backup is independent of the sequence of any current backups. Copy-only backups are useful for making a backup to transport to another location because they will not affect the current sequence of regular backups. Incorrect Answers: A: If the differential parameter and copy only parameter are used together, the copy only parameter is ignored. B: This statement will perform a full backup that could disrupt the regular sequence of backups that are performed in the Atlanta office. The SQL server operator should include the copy_only parameter to perform a copy-only backup that will not interrupt the sequence of backups. D: This statement will perform a differential backup. In this scenario, you need a full backup not a backup of everything that has changed since the last backup.

QUESTION NO: 116 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. During the course of the day you receive instruction from CertKiller.com to create a script to make a backup of the changed data only since the last full backup of the CK_DATA database. CertKiller.com wants the backup to be part of the regular backup routine whilst "Pass Any Exam. Any Time." - www.actualtests.com 109

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam continuing to append the backup to the media. What should you do? A. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak' [Fullback] WITH INIT, NAME = N'CK_DATA-Full Database Backup', SKIP, NOREWIND, NOUNLOAD, DIFFERENTIAL B. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak', [Fullback] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA-Full Database Backup', SKIP, NOREWIND, NOUNLOAD C. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak', [Fullback] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA-Full Backup', SKIP, NOREUIND, NOUNLOAD, COPY_ONLY D. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak', [Fullback] WITH NOFORMAT, NOINIT, NAME = D'CK_DATA-Full Database Backup', SKIP, NOREHIND, NOUNLOAD, DIFFERENTIAL, COPY_ONLY. Answer: D

Explanation: This statement will perform a differential backup that will back up the changes made in the database since the last full backup. This statement also includes the differential parameter and the copy_only parameter. If both of these parameters are in the statement, the copy_only parameter is ignored and the differential parameter is used. When you perform a full backup, it resets the base backup. A differential backup takes all data that has changed since the last full backup. If you were to perform another full backup in between the current backup sequence of Full, Differential and Transaction log backups, you would disrupt the regular backup schedule. Copy-only backups are useful for making a backup to transport to another location because it will not affect the current sequence of regular backups. You can use the backup database command to back up a database. The following are options with the backup database command: copy_only -allows a copy-only backup. differential -backs up only the portions of the database or file that have changed since the last full backup. If the DIFFERENTIAL parameter and COPY_ONLY parameter are used together, the COPY_ONLY parameter is ignored. disk -specifies the destination of the backup. noformat -does not format the media. init -initializes the media and does not allow backups to be appended to media. noinit -does not initialize the media and allows backups to be appended to media. name -specifies name of the backup. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

110

Microsoft 70-450: Practice Exam skip -Ignores the backup set expiration. norewind -does not rewind media. NOUNLOAD -does not unload media after the backup operations is complete. Incorrect Answers: A: This statement will not perform a differential backup, but will perform a full backup instead. The scenario required you to make a differential backup. This statement also contains the INIT parameter, which will not append backups. In this scenario, you were required to append backups. B: This statement will not perform a differential backup, but will perform a full backup instead. The scenario required you to make a differential backup. C: This statement will perform a differential backup, but this statement also contains the INIT parameter, which will not append backups. In this scenario, you were required to append backups. Part 2: Design a recovery strategy (27 Questions)

What should you do?

A. Your best option would be to make use of Microsoft Multipath in conjunction with differential backups. B. Your best option would be to make use of Storage Reports Management snapshots. C. Your best option would be to make use of the full-recovery model in conjunction with transaction log backups. D. Your best option would be to configure caching on the shared folder. Answer: C

QUESTION NO: 118 You are employed as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

Data modifications are executed via stored procedures that make use of the INSERT, UPDATE or DELETE statements. You are in the process of implementing a backup strategy. Management wants you to make sure that the subsequent requirements are met:Point-in-time recovery in the event of failure should be supported at any time.A minimum amount of disk space should be used by the transaction log.

sts

.co

You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 database solution.

QUESTION NO: 117

111

Microsoft 70-450: Practice Exam The table below displays the backup strategy used CK_DATA:

You decide to run a batch process on Saturday from 20:00 pm to 22:00 pm. It has come to your attention that the batch process is invalidated. This occurred when a client modified data on Saturday at 20:10 pm. Management wants you to restore CK_DATA to the state prior to the start of the batch process. You need to accomplish this task in the least amount time. What should you do?

Answer: B

QUESTION NO: 119

CertKiller.com has hired you as a database administrator for their network. Your duties include administering the SQL Server 2008 infrastructure. You are in the process of implementing a corporate backup and recovery strategy. This strategy needs to be validated. Management wants you to guarantee the successful recovery of a single database from a disastrous failure without needing a backup data center in another location. You need to determine the tasks that need to be included. What should you do? (Choose all that apply.) A. You should consider using the cluster group. B. You should consider scripting the SQL login accounts as well as the credentials. "Pass Any Exam. Any Time." - www.actualtests.com 112

Ac

tua

lTe

A. This can be accomplished by using the Windows System Resource Manager (WSRM). Thereafter the entire database should be restored. B. This can be accomplished by restoring the full database backup that was executed on Thursday. Then restore the differential backup that was executed on Friday. Thereafter the transaction logs should be restored from the time of the differential backup on Friday and stop at 20:00 pm on Saturday. C. This can be accomplished by installing a failover cluster that contains one node. D. This can be accomplished by use a two-node failover cluster.

sts

.co

Microsoft 70-450: Practice Exam C. You should consider using the SQL Server registry hive. D. You should consider documenting the administrative processes as well as the application access requirements. E. You should consider storing the backup media offsite. Answer: B,D,E

QUESTION NO: 120 You are employed as a database administrator at CertKiller.com. You are responsible for administering the SQL Server 2008 servers for the organizations. You are assigned a database server named CERTKILLER-DB01 with an instance named CK_SALES. During routine monitoring you discover that the disk containing the FILESTREAM filegroup has failed. You ordered a replacement disk but will only be available in seven days. You do not anticipate new information to be added to the database the following seven days. You attempt to execute a partial restore on CK_SALES. You are able to restore the filegroups excluding for the FILESTREAM filegroup. You then decide to execute a point-in-time restore, however, it fails. You need to determine a way to successfully restore the filegroup.

A. In order to make the make the point-in-time restore succeed you need to specify the continue_after_error option in conjunction with stopat, stopatmark, or stopbeforemark. B. In order to make the make the point-in-time restore succeed you need to specify the checksum option in conjunction with stopat, stopatmark, or stopbeforemark. C. In order to make the make the point-in-time restore succeed you need to specify the checksum option in conjunction with the standby option. D. In order to make the make the point-in-time restore succeed you need to specify the continue_after_error option in conjunction with the standby option. Answer: A Explanation: When performing a partial restore that requires a point-in-time restore you must include one of the stopat , stopatmark , or stopbeforemark options. If a FILESTREAM filegroup is excluded from a point-in-time restore, the point-in-time restore will fail. For the point-in-time restore to continue, you can specify the continue_after_error option together with the stopat , stopatmark , or stopbeforemark . This will allow the restore to continue, but the FILESTREAM filegroup will become unrecoverable. In this scenario, the database on the CERTKILLER-DB01 instance will be able to operate until the new disk arrives, after which you can begin a full restore. Any data that has been added to the database after the partial restore was performed would have to be "Pass Any Exam. Any Time." - www.actualtests.com 113

Ac

tua

lTe

What should you do?

sts

.co

Microsoft 70-450: Practice Exam recreated. Incorrect Answers: B: You should not specify the checksuh option together with the stopat, stopatmark, or stopbeforemark options. The checksum option checks each page for checksum verification and torn page corruption and will generate a checksum for the entire backup. The backup will be flagged as containing backup checksums in the backupset table in the msdb database. This option will not help a point-in-time restore succeed if a FILESTREAM filegroup is not available for restore.C; D: You should not specify checksum option or the continue_after_error option together with the standby option. The standby option backs up the tail of the log, but leaves the database in read-only state. This option requires a standby file that holds the standby data of rollback changes. In this scenario, the STANDBYoption will not help a point-in-time restore succeed if a FILESTREAM filegroup is not available for restore.

Management wants you to make sure that you are able to restore CK_SALES in the event of a disaster. You thus need to determine the appropriate changes that have to be made to the script to accomplish this. What should you do? A. This can be achieved by using a mirrored media set for backup. B. This can be achieved by using an extra drive to mirror drive Z. C. This can be achieved by removing the continue_after_error keyword from the backup database statement. D. This can be achieved by adding the compression keyword in the backup database statement. Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

BACKUP DATABASE CK_SALES TO DISK=' Z:\CK_Backups\CK_SALES1.bak', CONTINUE_AFTER_ERROR GO

lTe

CERTKILLER-DB01 contains a number of identical drives from the same manufacturer. CK_SALES contains the FILESTREAM data and makes use of the full recovery model. The script below is used to backup CK_SALES:

sts

.co

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES.

QUESTION NO: 121

114

Microsoft 70-450: Practice Exam Explanation: The continue_after_error keyword is used to allow a backup to finish if an error is encountered. If you have FILESTREAM data in the backup, the FILESTREAM data many not recover all data if an error is encountered during the backup. The default setting of the backup database statement is stop_on_error . Incorrect Answers: A: You should not use a mirrored media set for backup. A mirrored media set for backup can be used to have fault tolerance with your backup devices. The devices should have the same manufacturer and be the same model. If there is an error with a page or object in the database, a mirrored media set will not prevent the error from being written to both backup devices. B: You should not create a mirror drive for drive Z. A mirrored drive will provide fault tolerance in case one drive fails. However, if your backup device is on a mirrored drive and the backup encounters errors with a page or object in the database, the mirrored drive will not prevent the errors from being written to the backup device. D: You should not add the compression keyword in the backup database statement. This keyword can be used to get more data on a backup device, but does not prevent errors from being written to the device.

QUESTION NO: 122

You receive an instruction from the CIO to restore a backup of the CK_ORDERS onto a second SQL Server 2008 server in a test environment. However, your attempt to restore the backup fails. You thus need to determine what needs to be restored in order to rectify the error. What should you do? A. You should consider restoring the database master key. B. You should consider restoring the SSL session key. C. You should consider restoring the service master key. D. You should consider restoring the SSL certificate. Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

You enable Transparent Data Encryption (TDE) on CK_ORDERS. You decide to test a new application that will be responsible for updating records in CK_ORDERS. The new application will require:The TCP/IP network library.SSL encryption established on the server to guarantee a secure connection.

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for a database server named CERTKILLER-DB01 hosts a database named CK_ORDERS.

sts

.co

115

Microsoft 70-450: Practice Exam Explanation: You must restore the service master key onto the second SQL Server 2008 server. The restore operation failed in this scenario because the correct server certificate cannot be found and the encrypted data is inaccessible. Although TDE encryption is completely transparent to client applications, the data is encrypted and backup cannot be restored to other servers without the server master key. When the service master key is restored, SQL Server can decrypt all keys that been encrypted with the current service master key, including the database master key. Incorrect Answers: A: You should not restore the database master key. The entire user database is secured by the database master key. However, you will need to restore the service master key to decrypt the database master key. Restoring the service master key allows SQL Server to decrypt all keys that have been encrypted with the service master key. B: You do not need to restore the SSL session key or the SSL certificate. In the scenario, the application requires a secure SSL connection to the SQL Server. Enabling a secure connection between the application and the SQL Server will not cause an error in restoring a database. The error is caused because the data is encrypted and the backup cannot be restored to other servers without the server master key. If you need to force encryption between a client and a SQL Server, you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL Server instance. D: You do not need to restore the SSL session key or the SSL certificate. In the scenario, the application requires a secure SSL connection to the SQL Server. Enabling a secure connection between the application and the SQL Server will not cause an error in restoring a database. The error is caused because the data is encrypted and the backup cannot be restored to other servers without the server master key. If you need to force encryption between a client and a SQL Server, you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL Server instance.

QUESTION NO: 123 DRAG DROP

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a SQL server named CERTKILLER-DB01. You are in the process of performing daily full backups to all the databases on CERTKILLERDB01. You notice that errors occur when the server reboots after a power failure. You check and discover that CERTKILLER-DB01 has to be rebuilt. You continue to restore the other databases and discover numerous errors. You check and discover that there are orphaned users in the Accounts database. You need to determine a way to discover and resolve the orphaned users.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

116

Microsoft 70-450: Practice Exam What should you do? (Click the steps on the left and place them in the correct order on the right to detect orphaned users, and relink the logins to the users. It may not be necessary to use all the steps provided.)

Answer:

QUESTION NO: 124

You are the newly appointed database administrator at CertKiller.com. You are responsible for administering the Microsoft SQL Server 2008 server. You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02 and CERTKILLER-DB03. CERTKILLER-DB02 is configured as the primary server and CERTKILLER-DB03 as the secondary server. You discover during routine maintenance that a disk failed on CERTKILLER-DB02. This disk contains the user database that is configured for log shipping. To ensure productivity you need to bring CERTKILLER-DB03 online with the latest CERTKILLER-DB02 database state. What should you do? "Pass Any Exam. Any Time." - www.actualtests.com 117

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam Which step do you need to perform to bring the secondary server online? A. This can be accomplished by disabling the backup jobs on CERTKILLER-DB02. B. This can be accomplished by backing up the transaction logs from CERTKILLER-DB02 to CERTKILLER-DB03 using the with norecovery clause. C. You do not need to execute any steps since CERTKILLER-DB03 will have the synchronized copy of the database and it will automatically come up. D. This can be accomplished by deleting the transaction logs as well as the database data files from CERTKILLER-DB02. Thereafter the files can be restored on CERTKILLER-DB03 from a shared location. Answer: B Explanation: Backup files which are not already on CERTKILLER-DB03 need to be copied onto the CERTKILLER-DB03. These backup files might be stored in the network shares where you store your backups for the SQL Server. The transaction logs must be restored on the CERTKILLERDB03. You need to back up the transaction logs from the CERTKILLER-DB02 to the CERTKILLER-DB03 using the with norecovery clause. When you back up transaction logs from the CERTKILLER-DB02 using the with norecovery clause, the database in the CERTKILLERDB02 goes into the restoring state. In this state, the database is not available to users. On CERTKILLER-DB03 you need to apply the transaction logs to roll the database forward. After you roll the database forward on CERTKILLER-DB03, the CERTKILLER-DB03 is synchronized with the CERTKILLER-DB02 and is updated with the latest information. After CERTKILLER-DB03 is configured as the primary server, You can now redirect the SQL clients to CERTKILLER-DB03. CERTKILLER-DB03 can be configured as the CERTKILLER-DB02 for various other secondary servers. Incorrect Answers: A: You should not disable all backup jobs on CERTKILLER-DB02. You do not disable all backup jobs on CERTKILLER-DB02. You only disable log shipping backup job when you are performing a role change between CERTKILLER-DB02 and CERTKILLER-DB03. C: The option stating that you do not need to perform any steps is incorrect. Database Mirroring and Clustering provide automatic failover. Log shipping does not. To bring CERTKILLER-DB03 online, you need to perform manual failover from CERTKILLER-DB02 to the CERTKILLER-DB03. The manual failover process requires you to back up the transaction logs from CERTKILLERDB02 and then restore them on the CERTKILLER-DB03 and so on. D: You should not delete the transaction logs and the database data files from the CERTKILLERDB02 and restore the files on CERTKILLER-DB03 from a shared location. You do not delete files from CERTKILLER-DB02. You can restore the latest database backup files from a network share or any other storage location.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

118

Microsoft 70-450: Practice Exam QUESTION NO: 125 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to have FILESTREAM enabled in CK_SALES so that you are able to store MS Word documents in the CK_SALES database. CertKiller.com wants you to determine the first step of the operation. What should you do? A. You should consider having T-SQL and local file system access enabled. B. You should consider having FILESTREAM enabled using the sp_filestream_configure stored procedure. C. You should consider having a filegroup created. D. You should consider having a table created with Binary Large Object (BLOB) column.

Explanation: To enable FILESTREAM in a database instance, you first need to enable FILESTREAM using the stored procedure named sp_fiIestream_configure . This is the first step in enabling FILESTREAM for a database instance. For instance, you can execute the stored procedure with @ enable_level and @ share_name parameters: EXEC sp _filestream_configure@enable_level = 2, @ share_name = N ' WordDocumentsShare '; In this case, FILESTREAM will be enabled for the database instance. The parameter enablejevel allows you to configure T- SQL, local file system access, or remote file system access depending on which value is assigned. The value 2 allows only T- SQL and local file system access. The share_name parameter creates a file share that is used for accessing BLOB. If you do not want to use the stored procedure for enabling FILESTREAM, you can also use SQL Server Management Studio (SSMS). Creating a filegroup is the second step in enabling FILESTREAM for a database instance. This step must be performed after enabling FILESTREAM. You need to use the CONTAINS FILESTREAM attribute to create a filegroup . The data in FILESTREAM is actually stored on the file system, which provides a number of benefits. For instance, you will be able to compress data with the NTFS compression capabilities. A Word document that is stored on the file system will be compressed with the NTFS compression capabilities. When the data is stored, it is in compressed form, and when the data is retrieved, it is decompressed.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

Answer: B

119

Microsoft 70-450: Practice Exam QUESTION NO: 126 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you make full backups once a day of the CK_SALES database. You have later discovered that there are errors when CERTKILLER-DB01 reboots after a power failure. CertKiller.com wants you to have CERTKILLER-DB01 rebuild. The operating system starts fine but the SQL Server service will not start. CertKiller.com wants to know what should be done to rebuild CERTKILLER-DB01. What should you do? (Choose all that apply) A. You should consider having a tail-log backup created of the msdb database. B. You should consider making use of a tail-log backup of the tempdb database C. You should consider having the tempdb database restored. D. You should consider making use of the msdb database restored. E. You should consider making use of the rebuildm.exe utility to rebuild the master database. F. You should consider making use of the setup.exe utility from the SQL Server 2008 media with the rebuilddatabase keyword to rebuild the master database.

You should make a tail-log backup of the msdb database and restore the msdb database. The msdb database contains job information and any scheduled jobs. You should restore any database backups for the msdb database and any log backups since the last full backup. You should restore the tail-log backup to ensure that you can get the msdb database back up to the point of failure. Incorrect Answers: B: You do not have to make a tail-log backup of the tempdb database or restore the tempdb database. The tempdb database contains temporary objects. The tempdb database is recreated when the SQL server service restarts. C: You do not have to make a tail-log backup of the tempdb database or restore the tempdb database. The tempdb database contains temporary objects. The tempdb database is recreated when the SQL server service restarts. E: You should not use the rebuildme.exe utility to rebuild the master database. This program was "Pass Any Exam. Any Time." - www.actualtests.com 120

Ac

tua

Explanation: You will have to restore the master database to rebuild an SQL server instance. If you cannot get the SQL server service to start, you will have to rebuild the master database before you can restore it. After rebuilding the master database, you will have to restore not only the master database, but also the model and msdb databases.

lTe

Answer: A,D,F

sts

.co

Microsoft 70-450: Practice Exam used to rebuild the master database in SQL Server 2000, but the program was discontinued in SQL Server 2005.

QUESTION NO: 127 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES configured to use the Full Recovery model by default. During the course of the day you are instructed by CertKiller.com to develop a new backup strategy which keeps downtime to a minimum. CertKiller.com wants the backup strategy configured to have the database restored as quickly as possible if a database failure occurs whilst ensuring that database can be restored as close as possible to the point of failure. What should you do?

Answer: A

Explanation: You should do the following: You should perform a full database backup each Friday night. You should perform differential database backups each Monday, Tuesday, Wednesday, and Thursday night. You should perform transaction log backups every hour during business hours. By implementing a disaster recovery strategy that uses full database backups, differential database backups, and transaction log backups, you can reduce the amount of time that is involved in restoring the database to the moment of failure. Full database backups should be performed regularly because a full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state. "Pass Any Exam. Any Time." - www.actualtests.com 121

Ac

tua

A. You should consider having a full database backup performed each Friday night whilst having differential backups performed each Monday, Thursday, Wednesday and Thursday night. You should then have the transaction log back up every hour during business hours. B. You should consider having a differential backup performed every other Friday night whilst performing transaction log backups each Monday, Wednesday and Saturday nights. C. You should consider having a full database backup performed monthly whilst having the transaction log backups performed each Friday D. You should consider having a differential backup performed each Friday night whilst performing transaction log backups each Monday, Wednesday and Saturday nights.

lTe

sts

.co

Microsoft 70-450: Practice Exam Differential database backups are cumulative; each differential database backup includes all changes made to the database since the last full database backup. Therefore, each subsequent differential database backup includes all of the information from the previous differential backup. Thus, more time is usually required to perform a differential backup than a series of transaction log backups that cover the same time period. However, differential backups minimize restore time. After restoring the latest full database backup, you do not need to restore all subsequent differential database backups. You need to restore only the latest differential backup. Transaction log backups, which do not contain redundant data, are necessary when a database must be restored to a specific time. You must consecutively restore each of the transaction log backups that have been made since the last full or differential database backup. Incorrect Answers: B: You should not perform your full database backups every other Friday night, differential database backups every Monday, and filegroup backups at the end of each business day. A filegroup backup is functionally equivalent to backing up all files in the filegroup. Generally, filegroup backups are performed when a database is so large that a full backup becomes unmanageable or when certain files change more frequently than others. However, if possible, you should avoid performing filegroup backups because they increase administrative overhead. Additionally, filegroup backups do not include any information from a transaction log, whereas full database backups and differential database backups do. When a filegroup backup is performed, you must also perform transaction log backups, because you must restore them to recover the database after you have restored the filegroup backup. C: You should not limit your full database backups to a monthly schedule, or limit transaction log backups to each Friday. Transaction logs should be made often enough to reflect changes in the database. Generally, you should perform a transaction log backup on a daily or hourly basis. Performing a full backup once a month and transaction backups every week will not be sufficient to restore a database up to the point of failure. D: You should not perform a differential database backup each Friday night and perform transaction log backups each Monday, Wednesday, and Saturday nights. This solution does not contain a full backup. A full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state.

QUESTION NO: 128 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES spanned across multiple disks. CertKiller.com has additionally located the transaction logs on a separate disk subsystem for performance purposes. The backups listed below have been scheduled for the CK_SALES database: FullBackup1 - Full database backup performed from 08/20/2009 01:00TransactionBackup1 Transaction Log backup performed fromTransactionBackup2 - Transaction Log backup performed "Pass Any Exam. Any Time." - www.actualtests.com 122

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam from 08/21/2009 13:00DifferentialBackup1 - Differential Backup performed from 08/21/2009 01:00TransactionBackup3 - Transaction Log backup performed from 08/22/2009 07:00TransactionBackup4 - Transaction Log backup performed from 08/22/2009 13:00FullBackup2 - Full database backup performed from 08/23/2009 01:00TransactionBackup5 Transaction Log backup performed from 08/23/2009 07:00TransactionBackup6 - Transaction Log backup performed from 08/23/2009 13:00DifferentialBackup2 - Differential Backup performed from 08/24/2009 01:00TransactionBackup7 - Transaction Log backup performed from 08/24/2009 07:00TransactionBackup8 - Transaction Log backup performed from 08/24/2009 13:00 During the course of the day on 08/24/2009 you receive reports from employees all stating that errors are present in the CK_SALES database. You decided to check the log and notice the error occurred at 05:42. CertKiller.com wants you to have the CK_SALES database restored to the point of failure by selecting the order of the backup sets to restore.

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES configured to use the Full Recovery model by default. During the course of the day you are instructed by CertKiller.com to develop a new backup strategy which keeps downtime to a minimum. CertKiller.com wants the backup strategy configured to have the database restored as quickly as possible if a database failure occurs whilst ensuring that database can be restored as close as possible to the point of failure. What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

QUESTION NO: 129

tua

Answer: D

lTe

A. You should consider creating a tail-log backup and restore FullBackup2, TransactionBackup5, TransactionBackup6 and DifferentialBackup2. You should then have the tail-log backup restored. B. You should consider restoring FullBackup2, TransactionBackup5, TransactionBackup6 and finally restore DifferentialBackup2. C. You should consider having FullBackup2 restored and then restore DifferentialBackup2. D. You should consider creating a tail-log backup and restore FullBackup2. You should then restore DifferentialBackup2 and restore the tail-log backup.

sts

.co

What should you do?

123

Microsoft 70-450: Practice Exam A. You should consider having a full database backup performed monthly whilst having the transaction log backups performed each Friday. B. You should consider having a differential backup performed each Friday night whilst performing transaction log backups each Monday, Wednesday and Saturday nights. C. You should consider having a full database backup performed every other Friday night whilst having differential backups performed every Monday. You should then have a filegroup backup performed at the end of each business day. D. You should consider having a full database backup performed each Friday night whilst having differential backups performed each Monday, Thursday, Wednesday and Thursday night. You should then have the transaction log back up every hour during business hours. Answer: D Explanation: You should do the following: You should perform a full database backup each Friday night. You should perform differential database backups each Monday, Tuesday, Wednesday, and Thursday night. You should perform transaction log backups every hour during business hours. By implementing a disaster recovery strategy that uses full database backups, differential database backups, and transaction log backups, you can reduce the amount of time that is involved in restoring the database to the moment of failure. Full database backups should be performed regularly because a full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state. Differential database backups are cumulative; each differential database backup includes all changes made to the database since the last full database backup. Therefore, each subsequent differential database backup includes all of the information from the previous differential backup. Thus, more time is usually required to perform a differential backup than a series of transaction log backups that cover the same time period. However, differential backups minimize restore time. After restoring the latest full database backup, you do not need to restore all subsequent differential database backups. You need to restore only the latest differential backup. Transaction log backups, which do not contain redundant data, are necessary when a database must be restored to a specific time. You must consecutively restore each of the transaction log backups that have been made since the last full or differential database backup. Incorrect Answers: A: You should not perform your full database backups every other Friday night, differential database backups every Monday, and filegroup backups at the end of each business day. A filegroup backup is functionally equivalent to backing up all files in the filegroup. Generally, filegroup backups are performed when a database is so large that a full backup becomes unmanageable or when certain files change more frequently than others. However, if possible, you should avoid performing filegroup backups because they increase administrative overhead. Additionally, filegroup backups do not include any information from a transaction log, whereas full "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

124

Microsoft 70-450: Practice Exam database backups and differential database backups do. When a filegroup backup is performed, you must also perform transaction log backups, because you must restore them to recover the database after you have restored the filegroup backup. B: You should not perform a differential database backup each Friday night and perform transaction log backups each Monday, Wednesday, and Saturday nights. This solution does not contain a full backup. A full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state. C: You should not limit your full database backups to a monthly schedule, or limit transaction log backups to each Friday. Transaction logs should be made often enough to reflect changes in the database. Generally, you should perform a transaction log backup on a daily or hourly basis. Performing a full backup once a month and transaction backups every week will not be sufficient to restore a database up to the point of failure.

What should you do? (Choose all that apply, by placing options in the correct order)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com has configured the CK-SALES database with its transaction logs and database files stored on separate disk drives. During the course of the day one of the disk drives of CERTKILLER-DB01 has failed. CertKiller.com wants you to perform a recovery of the database up to the point of failure.

sts

.co

QUESTION NO: 130 CORRECT TEXT

125

Microsoft 70-450: Practice Exam Answer:

QUESTION NO: 131 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to enable FILESTREAM for a failover cluster of CertKiller.com. CertKiller.com wants to know what should be kept in mind when configuring FILESTREAM in a failover cluster? (Choose two) A. You should keep in mind that you should have the FILESTREAM filegroup on all nodes in the cluster. B. You should keep in mind that FILESTREAM should be enabled on the primary node in the cluster. C. You should keep in mind that any node which is required to host FILESTREAM should have FILESTREAM enabled. D. You should keep in mind that you should allow remote clients to have streaming access to FILESTREAM data option enabled. E. You should keep in mind that you should have the FILESTREAM filegroup on the shared disk. Answer: C,E

Explanation: The following guidelines must be met when configuring FILESTREAM in a failover cluster: You must have FILESTEAM filegroup on the shared disk so that it can be accessible to all nodes in the cluster. Any node that needs to host FILESTREAM must have FILESTREAM enabled. If this is not done, then the node cannot host FILESTREAM. Incorrect Answers: A: You are not required to have the FILESTREAM filegroup on all nodes. It should be enabled only on the nodes on which you want to configure FILESTREAM. B: Enabling FILESTREAM only on the primary node in the cluster will not work. You will need to enable FILESTREAM on all nodes that need to host FILESTREAM data. D: You would enable this option when you want to have remote access to FILESTREAM data. If remote access is not required, you should not enable this option. This option is not a prerequisite parameter to create a failover cluster with FILESTREAM data.

QUESTION NO: 132

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

126

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts two database named CK_SALES and CK_PRODUCTS which are used by an application making updates. During the course of the day you receive instruction from CertKiller.com to make full backups everyday with transaction log backups every hour. CertKiller.com wants the database to be restored to the same consistent point if disaster should strike. You have later decided to test the recovery of the databases to a marked transaction by doing the tasks listed below: You first created a tail-log backup of the databases.You secondly restore the most recent full database backup. CertKiller.com wants you to identify the most recent marked transactions available in all the transaction log backups.

Explanation: You can use the stopat , stopatmark or stopbeforemark keywords to have a point in time restore. The stopat key word can be used to stop at a specific time. You can use the stopatmark or stopbeforemark keyword to stop at a marked transaction. Incorrect Answers: A: You should not look in the syslogs table in the database that you are trying to restore. In previous versions of Microsoft SQL Server, the syslogs table allowed users to see the transactions that were in the transaction log. After SQL Server 7.0, the syslogs table was not used. The syslogs table cannot be used with SQL Server 2008 to find the most recent marked transactions. B: You should not look in the logmarkhistory table in either the master database or the database that you are trying to restore. The logmarkhistory table is kept in the msdb database. D: You should not look in the logmarkhistory table in either the master database or the database that you are trying to restore. The logmarkhistory table is kept in the msdb database.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

Answer: C

lTe

A. You should look for the information in the syslogs table in the database that you are trying to restore. B. You should look for the information in the logmarkhistory table in the master database. C. You should look for the information in the logmarkhistory table in the msdb database. D. You should look for the information in the logmarkhistory table in the CK_SALES and CK_PRODUCTS databases.

sts

.co

What should you do?

127

Microsoft 70-450: Practice Exam QUESTION NO: 133 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES spanned across multiple disks. CertKiller.com has additionally located the transaction logs on a separate disk subsystem for performance purposes. The backups listed below have been scheduled for the CK_SALES database: FullBackup1 - Full database backup performed from 08/20/2009 01:00TransactionBackup1 Transaction Log backup performed fromTransactionBackup2 - Transaction Log backup performed from 08/21/2009 13:00DifferentialBackup1 - Differential Backup performed from 08/21/2009 01:00TransactionBackup3 - Transaction Log backup performed from 08/22/2009 07:00TransactionBackup4 - Transaction Log backup performed from 08/22/2009 13:00FullBackup2 - Full database backup performed from 08/23/2009 01:00TransactionBackup5 Transaction Log backup performed from 08/23/2009 07:00TransactionBackup6 - Transaction Log backup performed from 08/23/2009 13:00DifferentialBackup2 - Differential Backup performed from 08/24/2009 01:00TransactionBackup7 - Transaction Log backup performed from 08/24/2009 07:00TransactionBackup8 - Transaction Log backup performed from 08/24/2009 13:00 During the course of the day on 08/24/2009 you receive reports from employees all stating that errors are present in the CK_SALES database. You decided to check the log and notice the error occurred at 05:42. CertKiller.com wants you to have the CK_SALES database restored to the point of failure by selecting the order of the backup sets to restore. What should you do?

A. You should consider creating a tail-log backup and restoring FullBackup2, DifferentialBackup2, TransactionBackup7 and the tail-log backup. B. You should consider creating a tail-log backup and restoring FullBackup2, TransactionBackup5, TransactionBackup6, DifferentialBackup2, TransactionBackup7 and the tail-log backup. C. You should consider restoring FullBackup2, DifferentialBackup2 and TransactionBackup7. D. You should consider restoring FullBackup2, TransactionBackup5, TransactionBackup6, DifferentialBackup2 and TransactionBackup7. Answer: A

QUESTION NO: 134 DRAG DROP You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which uses the full recovery model and has multiple online filegroups. The "Pass Any Exam. Any Time." - www.actualtests.com 128

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam CertKiller.com secondary file groups are shown below: KingGroup1 - contains the most valued tables of the database.KingGroup2 - contains the historic dataKingGroup3 - contains the inventory table CertKiller.com wants you to develop a plan to do a piecemeal restore in case of a disaster. What should you do? (Move the correct steps from the left column to the right column, and place them in the correct order)

Answer:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

129

Microsoft 70-450: Practice Exam

QUESTION NO: 135 DRAG DROP You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you discover that there are damaged pages present in the CK_SALES database. You later concluded that the damaged pages are not in the transaction log and are not metadata pages, but are in the database. What should you do? (Click and drag the required steps from the left column in the correct order on the column to the left)

Answer:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

130

Microsoft 70-450: Practice Exam

QUESTION NO: 136

What should you do?

A. You should consider having the msdb database restored. B. You should consider having the model database restored. C. You should consider having the distribution database restored. D. You should consider having the master database restored. Answer: A Explanation: You should restore the msdb database to ensure that policies are applied after a disk in the server has failed. Policies for Policy-Based Management are stored in the msdb database. You should ensure that the msdb database is backed up on a regular basis. Besides policies for Policy-Based Management, the msdb database stores jobs, operators, and alerts. "Pass Any Exam. Any Time." - www.actualtests.com 131

Ac

tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to ensure that CERTKILLER-DB01 does not have Database Mail or SQL Mail enabled. You later use the user named Rory Allen to create the policy by adding Rory Allen to the PolicyAdministrator Role role. Rory Allen has later applied the policy to CERTKILLER-DB01. CertKiller.com wants to know in event of disk drive failures suffered on CERTKILLER-DB01 which database should be restored from backup to restore the policy.

lTe

sts

.co

Microsoft 70-450: Practice Exam Incorrect Answers: B: The model database is used as a template database for any new databases that are created in the SQL server instance. C: The distribution database is used by SQL replication. None of these databases stores policies from Policy-Based Management. D: You should not restore the master, model, or distribution database. The master database contains information that pertains to the SQL server configuration.

QUESTION NO: 137 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which are used by users running geospatial queries on database tables. During the course of the day you discover that queries are slow and you think the problem is caused with the spatial indexes. You later conclude that no physical corruption is evident and page-level checksums have not been turned off. CertKiller.com wants you to perform logical checks on the spatial indexes. What should you do?

Answer: D

Explanation: This option performs logical checks on an indexed view, XML indexes, and spatial indexes. You would specify with extended_logical_checks only if you have the following issues: Index problems that are not due to physical corruption Disabled page-level checksums Column-level hardware corruption. In this scenario, you wanted to perform logical checks on the spatial indexes in the database. Therefore, running DBCC CHECKDB with the extended_logical_checks option would be the best "Pass Any Exam. Any Time." - www.actualtests.com 132

Ac

A. You should consider having the DBCC CHECKDB with the REPAIR_FAST option command run. B. You should consider having the DBCC CHECKDB with the REPAIR REBUILD Option command run. C. You should consider having the DBCC CHECKDB with the ESTIMATEONLY Option command run. D. You should consider having the DBCC CHECKDB with the EXTENDED_LOGICAL_CHECKS option command run.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam choice. Incorrect Answers: A: You should not run dbcc checkdb with the repair_fast option. This option will not actually perform any repair actions on the database. This option is kept in SQL Server 2008 for backward compatibility only. B: You should not run dbcc checkdb with the repair_rebuild option. This option performs quick repairs with no possibility of data loss. This option can rebuild an index or repair rows in nonclustered indexes. This option is not designed to perform logical checks on the spatial indexes in the database. You should run dbcc checkdb with the extended_logical_checks option to perform logical checks on the spatial indexes in the database. C: You should not run dbcc checkdb with the estimateonly option. This option does not perform a database check. This option only displays the amount of tempdb space needed to run DBCC checkdb.

QUESTION NO: 138

CK_PRODUCTS contains two filegroups named Primary and FileGroup1 as shown in the exhibit:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_PRODUCTS.

.co

133

Microsoft 70-450: Practice Exam

A. Your best option would be to ensure that a restore is executed without recovery on the log backups that were made since the last database backup. B. Your best option would be to ensure that a restore is executed with recovery on the tail-log backup. C. Your best option would be to ensure that a restore is executed with recovery on the database from the latest full database backup. D. Your best option would be to ensure that transaction log is truncated. E. Your best option would be to ensure that a restore is executed without recovery on KingGroup1 from the latest full database backup. F. Your best option would be to ensure that a tail-log backup is made. Answer: A,B,E,F

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

What should you do? (Choose all that apply.)

tua

There are no tables spanning these two filegroups. You receive notification from the Sales manager stating that an incorrect change was made to the Specifications table in FileGroup1. You decide to restore CK_PRODUCTS from the backups two minutes prior to entering the wrong specifications. CK_PRODUCTS is configured by default to make use of the full recovery model. The transaction log backups are executed hourly and a full database backup is executed every evening.

lTe

sts

.co

134

Microsoft 70-450: Practice Exam Explanation: The latest transaction log backup was made within the last hour, and the incorrect transaction was recorded a few minutes ago. To correct the situation, you should do the following: Immediately make a tail-log backup, which contains the transactions that have been recorded since the previous log backup. Restore FileGroup1 from the latest full database backup and specify with norecovery in the restore statement. The norecovery option is required in this scenario because you will be applying transaction log backups after the database is restored. Consecutively restore each of the transaction log backups that were made after the last full database backup. Each transaction log backup must be restored by specifying the norecovery option so that all subsequent transaction log backups can be restored. Restore the transaction log backup that was made on the active transaction log. This is the latest log backup. When the restore statement that will use the latest transaction log backup is executed, the stopat and with recovery options must be specified. The stopat option specifies the desired moment in time to which you must restore the database, and the with recovery option brings the database to a consistent state. Because the Specifications table is located on FileGroup1 and no tables span filegroups , it is not necessary to restore the entire database in order to expunge the incorrect change made to Specifications. Each time a transaction log is backed up using the default settings, the inactive portion of the log is automatically truncated. Therefore, it is not necessary to truncate the transaction log again.

QUESTION NO: 139

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES and CK_PRODUCTS. During the course of the day you decided to use an application which makes updates to the databases. You test the application and know some data would be lost but you want to recover transactions the application has made. If a disaster should occur you should be able to restore each of the databases to the same consistent point. The application makes use of the script below: BEGIN TRANSACTION UpdateDiscount WITH MARK 'UPDATE CK_PRODUCTS discount'; GO UPDATE CK_SALES.Products SET discount = Price * 0.925 WHERE Code LIKE '70-%'; GO CertKiller.com has additionally scheduled the tasks below: CertKiller.com has configured a full backup to be performed at midnight (12:00 A.M.).CertKiller.com has configured a differential backup to be performed at noon (12:00 P.M.).CertKiller.com has configured transaction log backups to be performed every two hours beginning at 1:00 A.M.CertKiller.com has configured a snapshot of the databases to be taken at "Pass Any Exam. Any Time." - www.actualtests.com 135

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam 12:30 P.M. for reporting purposes. CertKiller.com wants to know what should be done to recover transactions made by the application in each database to a consistent point if the error occurs at 12:35 P.M. What should you do? A. You should consider having the database reverted with the database snapshot on each database. B. You should consider having the latest full backup restored on each database with the latest differential backup, and the transaction log backups in order. You should then make use of the recovery keyword and STOPMARK = 'UPDATE CK_PRODUCTS discount'; C. You should consider having the database restored with the latest full backup each transaction log backup in order on each database. You should then have each database recovered by using WITH RECOVERY. D. You should consider having the latest full backup restored on each database followed by the latest transaction log backup. You should then have each database recovered with RECOVERY. Answer: B

Explanation: You should restore the full backup, the latest differential backup, and the transaction log backups in order on each database. You should also use the recovery keyword and stopmark = i update CK_PRODUCTS discount' ; to bring both databases back to the same consistent point. These actions will not recover each database to the point of failure, but will recover each database to the marked transaction of updating the CK_PRODUCTS discount. Any committed changes after the marked transaction will not be restored. When using marked transactions in two related databases, you should have full database backups with differential backups. You should mark a transaction block in both databases. You can use the WITH mark keyword in your script. You should back up the transaction log for both databases. You must restore the database backups with norecovery , and restore the logs with stopatmark to return to the marked transaction. Incorrect Answers: A: You should not revert the databases using the database snapshot. This action will only restore the database up to 12:30 P.M. In the scenario, the error occurred at 12:35 P.M. Reverting the snapshot would not bring the database up to the point of failure. When you revert a database from a snapshot, you break the log backup chain. The tail-log backup that you made is not usable when reverting a database. You will have to take a full backup of the database before you can make a log backup. C: You should not restore the latest full backup, each differential backup, and the latest transaction log backup on each database and recover each database with recovery. You should not recover each differential backup. You should only restore the latest differential backup since the last full backup. D: You should not restore the latest full backup, restore each transaction log backup in order on "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

136

Microsoft 70-450: Practice Exam each database, and recover each database with recovery. This action will not consistently recover both databases. You must restore the latest differential backup after recovering the full backup. If you omit the differential backup, the database will be an inconsistent state.

QUESTION NO: 140 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com also makes use of an application which sets product prices. The application makes use of the script below: USE CK_SALES GO BEGIN TRANSACTION DiscountUpdate WITM MARK 'UPDATE Product Discount prices'; GO UPDATE CK_Sales.Products SET Discount = Price * 0.95; GO

What should you do?

A. You should consider having a tail-log backup created and restore the full backup with norecovery. You should then have the transaction log backups and tail-log backup restored with norecovery, and recover the database with recovery. B. You should consider having a tail-log backup created and revert the CK_SALES database using the database snapshot. You should then have the tail-log backup restored with RECOVERY and STOPATMARK. C. You should consider having the full backup restored with norecovery and restore the transaction log backup with recovery and stopatmark. D. You should consider having the CK_SALES database reverted using the database snapshot. "Pass Any Exam. Any Time." - www.actualtests.com 137

Ac

CertKiller.com is aware that the CK_SALES database is set to use the full recovery model and that the application updates the prices at noon. During the course of the day you discover that a error has occurred in the CK_SALES database. CertKiller.com wants you to ensure that all data is recovered up to point of failure.

tua

lTe

CertKiller.com has additionally scheduled their backups as shown below: CertKiller.com has full backups performed on the CK_SASLES database at midnight (12:00 A.M.)CertKiller.com has transaction log backups performed at 8. A.M. and 4 P.M.CertKiller.com has a snapshot of the database backup at noon for reporting purposes.

sts

.co

Microsoft 70-450: Practice Exam Answer: A Explanation: You should do the following to ensure that all data is recovered up to the point of failure: Create a tail-log backup. Restore the full backup with norecovery . Restore the transaction log backups with norecovery and restore the tail-log backup with recovery.

To restore the database to the point of failure, you must create a tail-log backup. A tail-log backup contains all the transactions that have not been backed up since the last transaction log backup was performed. After performing the tail-log backup, you should restore the full backup that was taken at midnight using the norecovery keyword and restore the transaction log taken at 8 A.M. with the norecovery keyword. You should then restore the tail-log backup with the recovery keyword. You should use the recovery keyword only after the latest full backup, the latest differential backup, the latest transaction log backups, and the tail-log backup have all been restored in the proper sequence. The database recovery, however, should be performed using the recovery keyword to ensure that data can be rolled back after the entire set of data has been restored. Incorrect Answers: B: You should not create a tail-log backup, revert the Products database using the database snapshot, and restore the tail-log backup with recovery and stopatMark. When you revert a database from a snapshot, you break the log backup chain. The tail-log backup that you made is not usable when reverting a database. You will have to take a full backup of the database before you can make a log backup. C: You should not restore the full backup with norecovery and restore the transaction log backup with recovery and stopatMark. This action will not recover the database to the application update performed at noon. The stopatMark keyword is used to recover a marked transaction. The script used to update retail prices contains with mark 'update Product Discount prices'. This action will only recover the database to the previous time that the application ran an update. Because the last transaction log backup was taken at 8 P.M., it would not contain the update that was done at noon, or restore data changes that were performed after noon. D: You should not revert the Products database using the database snapshot. This action will only restore the database up to noon. In the scenario, the error occurred sometime after noon. Reverting the snapshot would not bring the database up to the point of failure.

QUESTION NO: 141 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which has the full recovery model set. During the course of the day you perform full "Pass Any Exam. Any Time." - www.actualtests.com 138

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam backups on the database at midnight 1:00 A.M. with transaction log backups every hour. CertKiller.com recently finished and application which updates the data in the database. You have later discovered checking the logs that the application has added corrupt data in the database at 3:15 A.M. You decided to restore the database using the statement below: RESTORE DATABASE CK_SALES FROM CK_SalesBackups WITH NORECOVERY; What should you do next? A. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, RESTART, STOPATMARK = 'Jun 14, 2009 3:15 AM'; B. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, STOPBEFOREMARK = 'Jun 14, 2009 3:15 AM' C. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, STOPAT = 'Jun 14, 2009 3:15 AM'; D. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, STOPATMARK = 'Jun 14, 2009 3:15 AM'; Answer: C

Explanation: To restore a database, you should restore the latest full backup, restore the latest differential backup, and then the transaction log backups after the latest differential backup. You must use the recovery keyword with restore log statement. This keyword is used to ensure that data can be rolled back after the entire set of data has been restored. The stop AT keyword allows a point in time restore to an exact time. In this scenario, the restore is to June 14, 2009 at 3:15 A.M. You should restore the each transaction log backup transaction after midnight with the stop at keyword. You should also issue the restore database CK_SALES WITH RECOVERY to complete the restore process. Incorrect Answers: A: You should not use the STOPATMARK keyword. This keyword can restore a database to a marked transaction. This keyword accepts a mark name, not a date and time. You can use an optional after <datetime> clause that will allow the STOPATMARK or STOPBEFOREMARK keyword to accept a date. If you do not use the AFTER <datetime> clause, you can only use a "Pass Any Exam. Any Time." - www.actualtests.com 139

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam unique mark name for the transaction, and not a date. The restart keyword is used to restart a restore operation that may have been interrupted due to a power failure. B: You should not use the STOPBEFOREMARK keyword. This keyword can restore a database to a marked transaction. This keyword accepts a unique mark name, but not a date. D: You should not use the STOPATMARK keyword. This keyword can restore a database to a marked transaction. This keyword accepts a mark name, not a date and time. You can use an optional after <datetime> clause that will allow the STOPATMARK or STOPBEFOREMARK keyword to accept a date. If you do not use the AFTER <datetime> clause, you can only use a unique mark name for the transaction, and not a date. The restart keyword is used to restart a restore operation that may have been interrupted due to a power failure.

QUESTION NO: 142 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_PRODUCTS which is configured to use the full recovery model. CertKiller.com currently possesses full backups and multiple log backups of the CK_PRODUCTS database. The CK_PRODUCTS database has several file groups shown in the exhibit below:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

140

Microsoft 70-450: Practice Exam During the course of the day you discover that there are problems with the FileGroup1 file group and FileGroup2 file group. You later discover that the file containing FileGroup3 file group is undamaged and is consistent with the CK_PRODUCTS database. CertKiller.com wants you to perform a piecemeal restore of the CK_PRODUCTS database to a specific point in time by selecting which statements are true regarding piecemeal restores to a specific point in time. Which of the statements are correct? (Choose two). A. You would be required to restore the FileGroup2 filegroup first. B. You would be required to restore the FileGroup1 filegroup first. C. You would be required to have all the filegroups of the CK_PRODUCTS database restored. D. You would not have to worry about the sequence order of the restoration of the CK_PRODUCTS database filegroups. E. You would be required to specify every step of the restore sequence and specify the same point in time. F. You would be required to indicate the partial option in the restore database option. Answer: E,F

Explanation: The restore sequences of a piecemeal restore that uses the full recovery model must do the following: Restore the primary filegroup first. Secondary filegroups can be restored in the order of importance. Read-only filegroups , such as FileGroup3, can be restored last. The restore database statement must specify the partial option. The partial option indicates that a partial restore is being performed. You must have a full database backup that contains the primary filegroup . You do not require a single backup that contains all filegroups . You must specify the time in which you want to restore to in the partial restore sequences. Incorrect Answers: A: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you must restore the Primary filegroup first. The sequence order of restoration of the filegroups is important. You should restore the more important filegroups first. Read-only filegroups need to be restored should be restored last because their data is static. B: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you must restore the Primary filegroup first. The sequence order of restoration of the filegroups is important. You should restore the more important filegroups first. Read-only filegroups need to be restored should be restored last because their data is static. C: You do not have to restore all filegroups of the CK_PRODUCTS database. You do not have to restore a read-only filegroup if the file that contains the filegroup is undamaged and consistent with the database. In this scenario, FileGroup3 is undamaged and consistent with the CK_PRODUCTS database. D: You should restore the primary filegroup first; the secondary filegroups can be restored in the "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

141

Microsoft 70-450: Practice Exam order of importance and read-only filegroups, such as FileGroup3, can be restored last.

QUESTION NO: 143 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to save consumed disk space with the Invoices table which contains reoccurring data and is partitioned across multiple partitions in the CK_SALES database. What should you do? A. You should consider running the statement: ALTER TABLE Invoices REBUILD PARTITION ALL WITH (DATA_COHPRESSION = PAGE ON PARTITIONS(1) ); B. You should consider running the statement: ALTER TABLE Invoices REBUILD PARTITIONS WITH (DATA COMPRESSION = ROW); C. You should consider running the statement: ALTER TABLE Invoices REBUILD WITH (DATA_COHPRESSION = PAGE); D. You should consider running the statement: ALTER TABLE Invoices REBUILD WITH (DATA_COHPRESSION = ROW); Answer: A

Explanation: Page compression is usefully if the table stores reoccurring data. Page compression reduces data redundancy in columns in multiple rows on a page. The redundant data is stored in on a single page and then the data is referenced to multiple columns. By contrast, row compression reduces the metadata overhead, uses variable-length storage format for numeric data types, and stores fixed character strings by not storing the blank characters similar to the variable length format. Incorrect Answers: B: This statement is syntactically incorrect: C: These statements apply data compression to a non-partitioned table. The Invoices table is a partitioned table. You should use the rebuild partition keyword to compress a partitioned table. Part 3: Design a recovery test plan (5 Questions) D: These statements apply data compression to a non-partitioned table. The Invoices table is a partitioned table. You should use the rebuild partition keyword to compress a partitioned table. Part 3: Design a recovery test plan (5 Questions) "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

142

Microsoft 70-450: Practice Exam

QUESTION NO: 144 You work as a database administrator at CertKiller.com. You are responsible for administering the SQL Server 2008 database servers. You have finished configuring log shipping between a primary server and a secondary server. The secondary database was configured in standby mode. You need to determine what effect the configuration will have on the secondary database. What should you identify? A. It will result in employees being disconnected when the secondary database is in standby mode. B. It will result in employees being unable run any queries on the secondary server. C. It will result in transaction log restores not taking place on the secondary server. D. It will result in the ability of configuring read-only queries on the secondary server. Answer: D

Explanation: The option stating that you will be able to configure read-only queries on the secondary server is correct. When you configure the secondary database on the secondary server in standby mode, you have the flexibility to shift the load of the read-only queries from the primary server to the secondary server. This eases the load on the primary server. When you configure the database on the secondary server in the standby mode, you can schedule users either to be disconnected or to be connected to the primary database only when there is no connection to the primary database. The transaction log will be restored on the secondary server. If you choose to disconnect the users, the users will be disconnected as soon as the restore of the transaction logs on the secondary server is initiated. Incorrect Answers: A: The option stating that the users will always be disconnected when the secondary database is in the standby mode is incorrect. The users are not able to connect to the database when it is in the norecovery mode. In the standby mode, you can configure the users to be disconnected when transaction logs are restored on the secondary server or wait for users to disconnect. B: The option stating that the users will not be able to run any queries is incorrect. The users are not able to run any queries when the database is in the norecovery mode. Users will be able to perform queries on the secondary server when the secondary database is in STANDBY mode .When you are backing up the transaction log on the secondary server, you should use the norecovery mode. You need to back up the transaction logs using with norecovery from the primary to the secondary server. When you back up the transaction logs from the primary server using with norecovery, the database in the primary server goes into the restoring state. In this state, the database is not available to users for updates. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

143

Microsoft 70-450: Practice Exam C: The option stating transaction log restores on the secondary server will not take place is incorrect. This option is true only if you have chosen not to disconnect the users when you must run the restore of the transaction log backups. In this condition, the restore will not take place as long as the users are connected. Only when there is an idle session, which means that there are no users connected, will the restore operation will take place.

QUESTION NO: 145 CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES. The sales information of the company is located on CK_SALES. You receive an instruction from the CIO to make sure that you are able to recover CK_SALES without any data loss exposure. You thus need to devise a restore strategy that will accomplish this. What should you include? (Choose all that apply)

Answer: B,D,F

QUESTION NO: 146

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to design a disaster recovery plan. CertKiller.com wants to know which of the following would be included in the plan. What should you do? (Choose all that apply) A. The recovery plan should have a RAID 1 volume tested and used that contains the operating system. B. The recovery plan should have a RAID 5 volume tested and used that contains the database files. "Pass Any Exam. Any Time." - www.actualtests.com 144

Ac

tua

lTe

A. The strategy should include differential backups as well as log backups. B. The strategy should include full backups as well as log backups. C. The strategy should include the bulk-logged recovery model. D. The strategy should include full backups as well as differential backups. E. The strategy should include the simple recovery model. F. The strategy should include the full recovery model.

sts

.co

Microsoft 70-450: Practice Exam C. The recovery plan should have a base-functionality script run. D. The recovery plan should have the locations determined to store offsite backups. E. The recovery plan should have a schedule created for overwriting backup media. Answer: C,D,E Explanation: Your disaster recovery plan should include the following tasks: Schedule for overwriting backup media Determine locations to store offsite backups Run a base-functionality script There are number of items that should be included in your disaster recovery plan. You should consider how long you will keep the media, how often you should overwrite the media, and where to store the media. If you store the media offsite, you should also determine how long will it take to retrieve the media and restore the data. Determining where you store this media could be a factor in the time it takes to retrieve the data. You should always perform a restore of a database to test the backup sets and to test whether the operator is skilled in performing a restore. You should also have a base-functionality script that may execute insert, update, and delete statements or a batch of stored procedures to determine if everything is working correctly after a restore. Incorrect Answers: A: You should not test and use RAID-1 for the volume that has the operating system as part of a disaster recovery plan. Using a RAID-1 can provide fault tolerance for the operating system if a disk fails. RAID-1 is designed to prevent the server from stopping if a failure of a disk occurs. It should be part of the design process, but not a part of the disaster recovery process. B: You should not test and use RAID-5 for the volume that contains the database files as part of a disaster recovery plan. Using a RAID-5 can provide fault tolerance be supporting up to one drive failure. RAID-5 should not be implemented for the drive that contains the transaction log files for a database. RAID-5 is designed to prevent the server from stopping if a failure of a disk occurs. It should be part of the design process, but not a part of the disaster recovery process.

QUESTION NO: 147 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to make full backups once a day with transaction log backups every hour of the CK_SALES database. CertKiller.com is aware that all backup statements include the checksum keyword. CertKiller.com wants you to verify that the backup of the CK_SALES database can be restored.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

145

Microsoft 70-450: Practice Exam What should you do? A. You should consider making use of the restore verifyonly statement check the integrity of the backup. B. You should consider making use of the binary_checksum statement to on the backup device to validate the checksum on the backup. C. You should consider making use of the dbcc checkdb statement on the backup device to check the integrity of the backup. D. You should consider making use of the dbcc showcontig statement on the backup device to check the integrity of the backup. Answer: A Explanation: This statement can ensure the following conditions are met: The backup set is complete. Checksum is present on the media. Volumes are all readable. The destination drive has sufficient space to restore.

The restore verifyonly command does not guarantee that the data can be recovered. This statement can be used to determine database integrity problems that could compromise the backup set. Using the checksum keyword with your backup statement and using the restore verifyonly statement to validate a backup increases the chances that your backup can be restored. Incorrect Answers: B: You should not use the binary_checksum statement to on the backup device to validate the checksum on the backup. This statement is used to check the checksum value for a row of a table. It cannot be use to check the checksum of the backup media. C: You should not use the dbcc checkdb statement. The dbcc checkdb statement is used to check the integrity of a database and can be used on tables, indexes, and filegroups, but not on backup devices. D: You should not use the dbcc showcontig statement. The dbcc showcontig statement displays fragmentation information for indexes and tables.

QUESTION NO: 148 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. During the course of the day you decided to enable Transparent Data Encryption (TDE) on the CK_DATA database using the statement below to backup the database:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

146

Microsoft 70-450: Practice Exam BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_Data.bak',[CK_DATABackup] WITH FORMAT, MEDIANAME = 'CK_DATABackup', MEDIADESCRIPTION = 'media set for CK_DATA database', MEDIAPASSWORD = 'T3$tl<1n8' CertKiller.com wants you to plan for a disaster recovery by selecting what would be required to restore the CK_DATA database should disaster strike. What should you do? A. You would require having a backup of the SSL certificate of the server. B. You would require having the password for the media. C. You would require having a backup of the certificate used to protect the database encryption key. D. You would require having the password for the account used for the SQL Server Agent service E. You would require having access to CK_SALES.bak. Answer: B,C,E

You should have access CK_Data.bak. This is the backup file for the database. It is imperative that you can access the backup file for the Sales database because without access to this file, the database cannot be restored. You should know the password to the media. The MEDIAPASSWORD keyword places a password on the media to protect the media from being restored by rogue operators. However, a rogue operator could use a password cracker to reveal the password for the media. The MEDIAPASSWORD keyword is not a recommended way to secure your backup. Transparent Data Encryption (TDE) is recommended by Microsoft to encrypt any backups of your database. The MEDIAPASSWORD keyword will not be available in future versions of SQL Server 2008. You should have a backup of the certificate used to protect the database encryption key as well as a backup of the database. The backup of the database and the certificate should not be stored in the same location for security reasons. If the certificate is lost, data on the encrypted backup will not be decrypted, and thus will be unreadable. Incorrect Answers: A: You do not need to have a backup of the SSL certificate for the SQL server. The SSL certificate can be used to have a SSL connection between a client and the SQL server, but you do not need this certificate to restore a database. D: You do not need the password for the SQL Server service or the SQL Server Agent service. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

Explanation: The following three things are required to restore the CK_DATA database: The password for the media Access to CK_Data.bak A backup of the certificate used to protect the database encryption key

sts

.co

147

Microsoft 70-450: Practice Exam The password for these accounts may be needed to make changes to the respective accounts, but they are not needed to restore a database.

QUESTION NO: 149 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you move parts of the CK_SALES database from CERTKILLER-DB01 to a new server named CERTKILLER-DB02. You later inspect the application used to update the database and discover that an invalid out-ofrange value were entered into the database by the network users based on column data type in the tables in the CK_SALES database. You later come to the conclusion that the problem was not caused by indexes in the database or hardware corruption. CertKiller.com wants you to find the out-of-range values manually and modify them. What should you do?

Answer: D

Explanation: This option causes dbcc checkdb to check column values of tables to see if the data is out-ofrange or not valid. When a database is upgraded from a previous version of SQL Server, columnvalue checks are not enabled by default. Because the Parts database used to be on a SQL Server 2000 server, you must run dbcc checkdb with the data_purity option to enable column-value checks. Once dbcc checkdb with data_purity has been run error-free on the Paris database, column-value integrity will be checked with dbcc checkdb . You should not run dbcc checkdb with the extended_logical_checks option. This option performs logical checks on an indexed view, XML indexes, and spatial indexes. You would specify with extended_logical_checks only if you have the following issues: Index problems that are not due to physical corruption Disabled page-level checksums Column-level hardware corruption

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. You should run the DBCC CHECKDB command with the EXTENDED_LOGICAL_CHECKS Option. B. You should run the DBCC CHECKDB command with the REPAIR_ALLOW_DATA_LOSS Option. C. You should run the DBCC CHECKDB command with the PHYSICAL_ONLY option. D. You should run the DBCC CHECKDB command with the DATA_PURITY option.

lTe

sts

.co

148

Microsoft 70-450: Practice Exam Incorrect Answers: A: In this scenario, you do not believe that index issues or hardware corruption are the cause of the out-of-range issues with the column values. Therefore running dbcc checkdb with the extended_logical_checks option would not be the best choice. B: You should not run dbcc checkdb with the repair_allow_data_loss option. This option will attempt to correct errors in the database and might delete some pages in the database. Therefore, this option might delete some data. In this scenario, you wanted to determine the out-of-range column values and manually change them. Therefore, you should not run dbcc checkdb with the repair allow data loss option. C: You should not run dbcc checkdb with the physical_only option. When the physical_only option is specified, column-integrity checks are not performed. In this scenario, you need to run columnintegrity checks on the tables in Parts database. Part 2: Design a monitoring solution at the instance level (2 Questions)

QUESTION NO: 150

What should you do?

A. You should consider having the new monitor server brought up and simply shut down the older one. B. You should consider having log shipping removed from the old monitor server first and then configure the new monitor server with log shipping. C. You should consider having the new server designated as the monitor server from the primary server. D. You should consider having the new server designated as the monitor server from the primary and secondary servers. Answer: B Explanation: To be able to configure a new server as the monitor server and remove the existing monitor server, you will need to remove log shipping first from the existing monitor server, and then reconfigure the new monitor server. This is the only method that can be used to change to a new monitor server. After you configure log shipping with a monitor server, you cannot change the "Pass Any Exam. Any Time." - www.actualtests.com 149

Ac

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com additionally added a new server named CERTKILLER-DB02 and configured log shipping between CERTKILLER-DB01 and CERTKILLER-DB02 and a new monitor server. You have successfully configured log shipping with the monitor server and require assigning the role of monitor server to another server removing the existing monitor server.

sts

.co

Microsoft 70-450: Practice Exam monitor server unless log shipping has been removed and reconfigured on the new monitor server. A monitor server is responsible for tracking activities that take place in log shipping. For instance, a monitor server will track the last backup of the transaction log from the primary to the secondary server. A monitor server can be configured to monitor more than one log shipping configuration. All the remaining methods are incorrect and will not allow you to change the monitor server. Incorrect Answers: A: You cannot shut down the old monitor server and bring the new server up as the monitor server. C: You cannot designate the new server as the monitor server if a monitor server currently exists. D: You cannot designate the new server as the monitor server if a monitor server currently exists.

QUESTION NO: 151 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day CertKiller.com planned using the sys.server_event_notifications catalog to view and track server-scoped event notifications. CertKiller.com wants you to select which database stores such events? A. The model database would store such events. B. The tempdb database would store such events. C. Any database would store such events. D. The master database would store such events. Answer: D

Explanation: When you execute a query for retrieving an event notification, the WMI Provider for Server Events translates the query into another form, which is an event notification. The event notification is created in the master database, which is used only for server-scoped event notifications. You use the sys.server_event_notifications view to view the event notifications in rows, where each row represents an event notification. Server-scoped event notifications are not stored in the model or tempdb databases, or in any database other than the master database. The event notifications specific to database or object are stored in the database that you have specified in the query. The model and tempdb databases are never used for event notifications.

Part 3: Design a solution to monitor performance and concurrency (22 Questions)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

150

Microsoft 70-450: Practice Exam

QUESTION NO: 152 You work as a database administrator at CertKiller.com. You are responsible for administering a database server named CERTKILLER-DB01 with a SQL Server 2008 instance. CERTKILLER-DB01 contains the following attributes:64-GB RAM4 quad-core processorsNumerous independent physical raid volumes You are in the process of using a transactional database on the instance. It is anticipated that the transactional database will have a high volume of INSERT, UPDATE, and DELETE activities. The activities encompass the creation of new tables. You receive an instruction from management to optimize the performance of the database as well as maximizing the disk bandwidth. You need to accomplish this by ensuring that the contention in the storage allocation structures is minimized. What should you do?

Answer: B

You work as a database administrator at CertKiller.com. Your duties include administrating the SQL Server 2008 infrastructure of CertKiller.com. You receive a notification from management requesting capacity planning data. You thus decide to implement a long-term infrastructure monitoring strategy. You need to determine the tasks you need to include in the design. What should you include? (Choose all that apply.) A. You should consider deploying the production databases after base lining the system. B. You should consider using database snapshot. C. You should consider setting the max worker threads. D. You should consider creating a new Database profile. "Pass Any Exam. Any Time." - www.actualtests.com 151

Ac

QUESTION NO: 153

tua

lTe

A. You should consider enabling Server Auditing. B. You should consider using multiple data files for the database. C. You should consider using row-level compression. D. You should consider using the checksum page verify option.

sts

.co

Microsoft 70-450: Practice Exam E. You should consider, on a regular basis, reviewing the system monitor counters. Answer: A,E

QUESTION NO: 154 CertKiller.com has employed you as a database administrator. You are responsible for administering the SQL Server 2008 infrastructure. During routine maintenance you discover that the instance is experiencing poor performance due to excessive CPU usage, server processes paging as well as deadlocks. You receive an instruction from the CIO to design a monitoring solution that will:Supply information including detailed deadlock informationMonitor and troubleshoot performance issues. You need to design this solution with the least amount of administrative effort. What should you do?

Answer: C

QUESTION NO: 155

You decide to implement a monitoring solution plan for the instance. You want to monitor the object usage statistics. Your solution needs to identify a list of at least 15 objects for the subsequent components:Stored procedures and functions that are often performed.Transact-SQL statements that is long running. Management wants you to use the monitoring solution plan in order to decrease the performance effect. You need to accomplish this with the minimum amount of administrative effort. What should you do? A. You should consider using the Hyper-V feature.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

CertKiller.com has employed you as a database administrator. You are responsible for administering a SQL Server 2008 instance.

tua

lTe

A. This can be accomplished using the SQLAGENT.OUT log. B. This can be accomplished using the Netsh utility. C. This can be accomplished using the Extended Events utility. D. This can be accomplished using the ServerManagerCMD utility.

sts

.co

152

Microsoft 70-450: Practice Exam B. You should consider using RAID 3. C. You should consider using the Background Intelligent Transfer Service (BITS). D. You should consider using dynamic management views. Answer: D

QUESTION NO: 156 CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com include administering the SQL Server 2008 infrastructure. The instance includes a database named CERTKILLER-DB02. CERTKILLER-DB02 is used for the day-to-day business operations of your company. You receive numerous complaints from clients stating that the response times are poor when executing reports. You thus decide to implement a performance monitoring strategy plan. This plan will capture and store the subsequent information:The executed Transact-SQL statements as well as query activity.Blocking and deadlock data.The counters for memory, disk and CPU. To ensure productivity you need to use the monitoring process. You need to accomplish this with the least amount of administrative effort. What should you do?

Answer: B

QUESTION NO: 157 CertKiller.com has hired you as a database administrator for their network. The CertKiller.com network contains four SQL servers that are configured to run SQL Server 2008. You receive an instruction from the CIO to configure one of the SQL servers named CERTKILLER-DB01 as a Central Management Server. CERTKILLER-DB01 will administer the other SQL servers on the company network. You then create a server group on CERTKILLERDB01 that will contain the other SQL servers in order to manage them. You require data about the memory and CPU from members of the server group. You need to determine a way to retrieve this data. "Pass Any Exam. Any Time." - www.actualtests.com 153

Ac

tua

A. You should consider using the Background Intelligent Transfer Service (BITS). B. You should consider using the data collector. C. You should consider using the Windows System Resource Manager (WSRM) feature. D. You should consider using the Event Subscriptions.

lTe

sts

.co

Microsoft 70-450: Practice Exam What should you do? (Choose all that apply.) A. You should consider using the Policy-Based Management policies. B. You should consider using Rules. C. You should consider using Dimensions. D. You should consider using the Transact-SQL statements. Answer: A,D Explanation: Central Management Servers allow you to administer multiple servers simultaneously. The Central Management Server uses server groups to maintain connection information for one or more instances of SQL Server. You can use Transact-SQL statements or Policy-Based Management policies to administer servers in server groups. After you configure a Central Management Server, you can create a query to display the resource usage, such as CPU and memory, on the servers that are members of the server group. Incorrect Answers: B: You cannot use rules or dimensions to administer servers in server groups by using Central Management Servers. Rules are database objects that are bound to columns or alias data types, and specify which data values are acceptable in a column. C: A dimension is a structural attribute of a cube, which is an organized hierarchy of categories that describe data in the fact table.

QUESTION NO: 158

You are employed as the database administrator at CertKiller.com. Your duties include managing a SQL Server 2008 server that host a database named CK_SALES. Employees in the sales department make use of CK_SALES to update sales records for online clients. You need to be able to check the amount of employees who are connected to CK_SALES at any given time. You decide to make use of System Monitor in conjunction with SQL Server objects and counters in order to capture the current amount of users for performance benchmarking. You need to determine a way to accomplish this. What should you do? A. This can be accomplished using SQL Server: Workload Group Stats. B. This can be accomplished using SQL Server: SQL Statistics. C. This can be accomplished using SQL Server: General Statistics. D. This can be accomplished using SQL Server: Databases.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

154

Microsoft 70-450: Practice Exam Answer: C Explanation: Using this object, you can capture information on the number of current connections to the SQL Server. You can also view the number of users who either connect or disconnect with the SQL Server instance. The connections and disconnections are displayed on per second basis. In this scenario, you would use the User Connections counter to view the current number of users connected an instance of SQL Server. Along with this counter, there are other counters available with this object. These counters are Temp Tables for Destruction, Transactions, Active Temp Tables, Connection resets/sec, and Logins/sec. Incorrect Answers: A: You should not use SQL Server: Workload Group Stats object to view the current number of users. This object contains counters that monitor the performance of the Resource Governor workload group. However, this object cannot be used for monitoring the current number of connected users to an instance of SQL Server. B: You should not use SQL Server: SQL Statistics object to view the current number of users. This object contains counters used for monitoring compilation and recompilations of user queries sent to an instance of SQL Server. However, this object cannot be used for monitoring the current number of connected users to an instance of SQL Server. D: You should not use SQL Server: Databases object to view the current number of users. This object contains counters that help you monitor backup/restore throughput, transaction log activities, and bulk copy operations. However, this object cannot be used for monitoring the current number of users connected to an instance of SQL Server.

QUESTION NO: 159

During routine monitoring you discover that numerous high-priority applications performs poorly when they are run simultaneously with low-priority resource-intensive applications on CERTKILLER-DB01. In order to solve the error you decide to make use of the Resource Governor. You thus need to determine what percentage of the processor is used by a particular group of applications. What should you do? A. You should look at the SQL Server:Workload Group Statistics in System Monitor. B. You should look at the SQL Server:SQL Statistics in System Monitor. C. You should look at the SQL Server:General Statistics in System Monitor.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01.

tua

lTe

sts

.co

155

Microsoft 70-450: Practice Exam D. You should look at the SQL Server:Exec Statistics in System Monitor. Answer: A Explanation: The SQL Server :Workload Group Statistics object allows you to look at various counters such as CPU usage %. Max request cpu time, Max request memory grant (KB), and Query optimizations/sec. You can apply these counters to the resource pools that you have defined in the workload groups. Incorrect Answers: B: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL Server:Exec Statistics objects. None of these objects allows you to apply the counters to an instance of the resource pools that you have defined in the workload groups. C: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL Server:Exec Statistics objects. None of these objects allows you to apply the counters to an instance of the resource pools that you have defined in the workload groups. D: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL Server:Exec Statistics objects. None of these objects allows you to apply the counters to an instance of the resource pools that you have defined in the workload groups.

QUESTION NO: 160

What should you identify? A. Your best choice would be to use the Query Statistics collection set. B. Your best choice would be to use the Disk Usage collection set. C. Your best choice would be to use a combination of the Disk Usage and Server Activity collection sets. D. Your best choice would be to use the Server Activity collection set. Answer: D Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

During routine monitoring you discover that CERTKILLER-DB01 is experiencing performance related errors. You decide to trace resource issues that are related to the disk I/O and memory. You thus need to determine the appropriate System Data collection sets you should use.

tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.

lTe

sts

.co

156

Microsoft 70-450: Practice Exam This collection set is mainly used for checking the health and resource utilization of the SQL Server. You can use this collection set to determine the health of system resources and to track any performance bottleneck with the system resources utilization. This collection set can use different resources, such as performance counters from the system and SQL Server, sys. dm_os_schedulers , sys.dm_exec_sessions , sys.dm_exec_requests and sys.dm_os_waiting_tasks views. You can use these resources to track performance issues such as deadlocks. The sys.dm_exec_sessions , sys.dm_exec_requests and sys. dm_os_waiting_tasks can be used together to detect deadlocks and performance bottlenecks. Incorrect Answers: A: You should not use Query Statistics collection set because this collection set gathers information related to queries used in the database, such as query statistics, query plans, and the text of individual queries. This collection set uses the sys. dm_exec_query_stats view to gather information along with many different resources. This collection set cannot gather information related to disk I/O and memory. B: You should not use the Disk Usage collection set because this collection set gathers information on the databases hosted on the SQL Server 2008 system. The information gathered is about the disk and the log usage on the SQL Server. You would use this collection set when you want to know how much a database and its related log files are growing on daily basis. The growth is tracked in megabytes (MB) per day. There are two types of collection items in this collection set: Disk Usage - Data Files and Disk Usage - Log File. This collection set cannot gather information related to disk I/O and memory. C: You should not use a combination of the Disk Usage and Server Activity collection sets to solve the problem stated in the scenario. You would not be able to use two collection sets in combination. It is recommended that you use a specific collection set to solve a problem related to one specific area in SQL Server performance. For instance, you can track the database growth using Disk Usage collection set.

QUESTION NO: 161

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES. The Sales department at CertKiller.com makes use of CK_SALES to accomplish their daily tasks. You receive notification from the CIO to capture all events taking place on CERTKILLER-DB01 as well as replaying a step-by-step analysis of the captured events. You thus need to determine the most appropriate utility that will assist you in this task. What should you do? A. You should consider using SQL Server Profiler. "Pass Any Exam. Any Time." - www.actualtests.com 157

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam B. You should consider using System Monitor. C. You should consider using Policy-Based Management policy. D. You should consider using Database Engine Tuning Advisor. Answer: A Explanation: SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of the SQL Server Database Engine or Analysis Service services. SQL Server Profiler allows you to capture and save data about each event to a table or a file for analysis. You can also replay the events captured by SQL Server Profiler to determine what exactly happened. You cannot use System Monitor, Database Engine Tuning Advisor, or a Policy-Based Management policy for the purpose stated in the scenario. Incorrect Answers: B: System Monitor is primarily used for monitoring resource usage associated with server processes, but it does not allow you to replay captured events. Database Engine Tuning Advisor allows you to analyze the performance effects of Transact-SQL statements executed against databases you want to tune. C: Policy-Based Management manages entities, such as databases or other SQL Server objects, on an instance of SQL Server 2008. D: Database Engine Tuning Advisor provides recommendations to add, remove, or modify indexes, indexed views, and partitions.

QUESTION NO: 162

CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are the administering SQL Server 2008 server named CERTKILLER-DB06. You receive an instruction from the CIO to optimize the performance of CERTKILLER-DB06. You need to gather data regarding the operating system-related memory usage of CERTKILLERDB06. You need to determine the suitable dynamic management views that will assist you to accomplish the task. What should you identify? (Choose all that apply.) A. You should consider using sys.dm_os_sys_info. B. You should consider using sys.dm_os_process_memory. C. You should consider using sys.dm_os_sys_memory. D. You should consider using sys.dm_os_memory_brokers. E. You should consider using sys.dm_os_memory_nodes. Answer: A,C "Pass Any Exam. Any Time." - www.actualtests.com 158

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam Explanation: Both views are new to SQL Server 2008. The sys.dm_os_sys_info view provides a simple display of physical and virtual memory that is available with the operating system. This view also provides the information of the system resources available and consumed by SQL Server. The sys.dm_os_sys_memoiy view provides a more detailed view of the physical memory and the memory-resource notification bits, which provide the state of the memory resource. The sys.dm_os_sys_memory view displays the memory usage in ten columns, including total_phys , avail_phys , sys_cache , and sys_hi_signal . Incorrect Answers: B: You should not use the sys.dm_os_process_memory view. This view is used to display the memory allocations for SQL Server process space. For instance, you can use it to track the number of page fault count incurred by the SQL Server process. D: You should not use the sys.dm_os_memory_brokers view. This view is used for tracking memory allocation between the components of SQL Server. E: You should not use the sys.dm_os_memory_nodes view. This view displays information regarding memory nodes and the amount of physical memory reserved by SQL Server.

QUESTION NO: 163

A. You should consider using sys.dm_os_sys_memory. B. You should consider using sys.dm_os_process_memory. C. You should consider using sys.dm_os_memory_objects. D. You should consider using sys.dm_os_memory_nodes. Answer: C Explanation: It also allows you to track memory objects allocated to the SQL Server 2008 instance. When managing SQL Server, if there are performance issues related to memory, you can use this view to locate any possible memory leaks that may be occurring. Incorrect Answers:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

What should you do?

tua

You receive an instruction from the CIO to test the SQL Server instance for memory leaks. You thus need to determine the appropriate dynamic management view you need to use to accomplish this.

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a SQL server named CERTKILLER-DB01.

sts

.co

159

Microsoft 70-450: Practice Exam A: You should not use the sys.dm_os_sys_memory view. This view provides a detailed view of the physical memory and memory-resource notification bits, which provide the state of the memory resource. The sys.dm_os_sys_memory view displays memory usage in ten columns. Some of the columns are total_phys, avail_phys, sys_cache and sys_hi_signal. B: You should not use the sys.dm_os_process_memory view. This view is used to display memory allocations for the SQL Server process space. For instance, you can use it to track the number of page fault count incurred by the SQL Server process. D: You should not use the sys.dm_os_memory_nodes view. This view displays information about the memory nodes and the amount of physical memory reserved by SQL Server.

QUESTION NO: 164 CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01. You have received instruction from the CIO to test the Dedicated Administrator Connection (DAC) connection with CERTKILLER-DB01. You need to determine the correct port DAC will it use by default to connect to CERTKILLER-DB01. What should you identify?

Answer: B

Explanation: By default, DAC uses the Ioopback address, which is 127.0.0.1, along with port 1434. To initialize DAC on the SQL Server, you should first use a client on the server itself. If you need to remotely connect to the SQL Server instance using DAC, then you should run the sp_configure stored procedure. This will enable DAC for the remote connections. Incorrect Answers: A: Port 1433 is the port on which SQL Server listens for client requests. This port is not used for DAC connections. C: Port 443 is the default SSL port. This port is not used for DAC connections. D: Port 80 is the default HTTP port. This port is not used for DAC connections.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. The DAC model will use port 1443 by default. B. The DAC model will use port 1434 by default. C. The DAC model will use port 443 by default. D. The DAC model will use port 80 by default.

lTe

sts

.co

160

Microsoft 70-450: Practice Exam QUESTION NO: 165 CertKiller.com has hired you as a database administrator for their network. You are responsible for administering a Microsoft SQL Server 2008 server named CERTKILLER-DB01. CERTKILLERDB01 contains numerous databases that are accessed by aCertKiller.com users. You receive numerous complaints from users regarding the poor performance of CERTKILLERDB01. You have a suspicion that the performance error is a result of deadlocks. You receive an instruction from management to determine which transaction is causing the deadlocks. You decide to collect the information regarding the deadlocks and save it in a file. What should you do? A. You should consider creating a trace flag. B. You should consider creating a System Monitor counter. C. You should consider creating a SQL Server Profiler trace. D. You should consider creating a Policy-based Management policy. Answer: C

Explanation: SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of the SQL Server Database Engine or Analysis Service services. SQL Server Profiler allows you to capture and save data about each event to a table or a file for analysis. You can also replay the events captured by SQL Server Profiler to determine what exactly happened. To trace deadlock events, you should add the Deadlock graph event class to a trace. To do this, you should create a new trace by using SQL Server Profiler. Incorrect Answers: A: You cannot create a new trace flag in SQL Server 2008. Trace flags typically diagnose performance issues or debug stored procedures. Trace flags allow you to set particular characteristics of a server on a temporary basis or to turn off specific behavior. SQL Server contains some existing trace flags that can be used for this purpose. SQL Server 2008 does not allow you to create new trace flags. B: You should not create a System Monitor counter. System Monitor is primarily used for monitoring resource usage associated with server processes. A System Monitor counter would not allow you to capture information about deadlock events and save it in a table on the SQL server. D: You should not create a Policy-Based Management policy because it cannot be used to collect information about deadlock events and save it in a file. Policy-Based Management manages entities, such as databases or other SQL Server objects, on an instance of SQL Server 2008.

QUESTION NO: 166

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

161

Microsoft 70-450: Practice Exam CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB03 that hosts a database named CK_SALES. CK_SALES is configured as a log shipping database. You have received instruction from the CIO to create a maintenance plan in order to execute full backups, differential backups as well as transaction log backups on CK_SALES. During routine monitoring you discover that log shipping does not function properly on CK_SALES. To maintain productivity you need ensure that log shipping functions properly. What should you do? A. This can be accomplished by ensuring that the database maintenance plan does not create transaction log backups. B. This can be accomplished by ensuring that the database maintenance plan does not create full backups C. This can be accomplished by rescheduling the backup job and alert job for log shipping D. This can be accomplished by rescheduling the copy job and restore job for log shipping

Explanation: In this scenario, if the maintenance plan and log shipping both attempt to create transaction log backups of the Orders database, log shipping will not function correctly. You should only have the maintenance plan create full backups and differential backups. You should use your log shipping backup folder to archive the log backups. You should archive the logs to another media for longterm storage. You should also set the backup retention period to a longer time period to allow you to store the log files. Incorrect Answers: B: You do not have to eliminate the full backups from the database maintenance plan. The conflict is not caused by the full backup, but by the log shipping and maintenance plan trying to create log backups of the same database. C: You should not reschedule the any of the jobs for log shipping. When log shipping is implemented, four jobs are needed: the backup job, copy job, restore job, and alert job. The backup job performs the backup operation, logs history to the local server and the monitor server, and removes old backup files and history information. The copy job resides on the secondary server instance and copies the backup files from the primary server to the secondary server. The restore job is created on the secondary server and restores the copied backup files to the secondary databases. The alert job is created on the monitor server instance. This job raises alerts for the primary and secondary databases when the backup and restore operations have not completed successfully. Changing the schedule of these jobs will not fix the problem. The problem is caused because the maintenance plan and log shipping are both attempting to create a transaction log of the same database. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

Answer: A

.co

162

Microsoft 70-450: Practice Exam D: You should not reschedule the any of the jobs for log shipping. When log shipping is implemented, four jobs are needed: the backup job, copy job, restore job, and alert job. The backup job performs the backup operation, logs history to the local server and the monitor server, and removes old backup files and history information. The copy job resides on the secondary server instance and copies the backup files from the primary server to the secondary server. The restore job is created on the secondary server and restores the copied backup files to the secondary databases. The alert job is created on the monitor server instance. This job raises alerts for the primary and secondary databases when the backup and restore operations have not completed successfully. Changing the schedule of these jobs will not fix the problem. The problem is caused because the maintenance plan and log shipping are both attempting to create a transaction log of the same database.

QUESTION NO: 167 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01.

What should you identify?

Answer: B

Explanation: A trace flag can be either a session trace flag or a global trace flag. A session trace flag is active for the current session only. A global trace flag is visible to every connection on the server. The -T parameter applies only to a global trace flag. The trace flag will apply to the current session, but not to any other sessions on the server. To enable it globally, you should use the -T parameter at startup. You can also write a startup script to apply the global trace flag. A trace flag can either be specific to a session or it can be a global trace flag. A trace flag can be switched on or off by using the DBCC TRACEON and DBCC TRACEOFF commands. Incorrect Answers:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

A. The command will have no effect. B. The command will be applicable for the current session. C. The command will be automatically used as a global trace flag. D. The command will vary as applied using the dbcc traceon command.

tua

lTe

sts

You have received instruction from the CIO to use the dbcc traceon 1222 command in order to enable a global trace. You enter command by omitting the -T parameter. You need to determine what the result will be.

.co

163

Microsoft 70-450: Practice Exam A: The remaining options are incorrect. A global trace flag is applicable globally and is not specific to a session. The global trace flag is never used automatically as a global trace flag; you must use the -T parameter to mark it a global trace flag. The behavior of the trace flag does not vary except that you need to use the -T parameter. C: The remaining options are incorrect. A global trace flag is applicable globally and is not specific to a session. The global trace flag is never used automatically as a global trace flag; you must use the -T parameter to mark it a global trace flag. The behavior of the trace flag does not vary except that you need to use the -T parameter. D: The remaining options are incorrect. A global trace flag is applicable globally and is not specific to a session. The global trace flag is never used automatically as a global trace flag; you must use the -T parameter to mark it a global trace flag. The behavior of the trace flag does not vary except that you need to use the -T parameter.

What should you identify?

Answer: B Explanation: The CXPACKET wait occurs when there is a wait on the data packets and the thread is waiting for the query to finish. This type of wait can be viewed using sys.dm_os_wait_stats view. To reduce wait, you can either reduce the degree of parallelism, or use the MAXDOP query hint to limit the number of processors used for the query. Incorrect Answers: A: The CHECKPOINT_QUEUE option is incorrect. This wait occurs when a checkpoint task is made to wait for the next checkpoint request. The CHECKPOINT_QUEUE wait does not occur when there is a wait on the data packets and the thread is waiting for the query to finish. "Pass Any Exam. Any Time." - www.actualtests.com 164

Ac

A. The CHECKPOINT_QUEUE wait will illustrate this. B. The CXPACKET wait will illustrate this. C. The CHKPT wait will illustrate this. D. The EXCHANGE wait will illustrate this.

tua

lTe

You are in the process of monitoring the threads on CERTKILLER-DB01. You accomplish this using the sys.dm_os_wait_stats view. You discover that there is a wait on the data packets. The thread is also waiting for the query to end. You need to determine the type of wait that will illustrate this.

sts

.co

CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01.

QUESTION NO: 168

Microsoft 70-450: Practice Exam C: The CHKPT option is incorrect. The CHKPT wait occurs when SQL Server is starting up. CHKPT informs the checkpoint thread to start during a SQL Server start. The CHKPT wait does not occur when there is a wait on the data packets and the thread is waiting for the query to finish. D: The EXCHANGE option is incorrect. This type of wait occurs in the query processor exchange iterator when the synchronization phase of parallel queries is in process. The EXCHANGE wait does not occur when there is a wait on the data packets and the thread is waiting for the query to finish.

QUESTION NO: 169 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to view the deadlocks that have occurred on CERTKILLER-DB01 whilst extracting the information to a deadlock XML file. What should you do?

Answer: D

Explanation: You should use the SQL Server Profiler to view deadlocks that have occurred on the server and to extract the information to a deadlock XML file. You can use SQL Server Profiler to trace specific events that take place in the database. To be able to capture a deadlock event, you need to add the Deadlock graph event class to the trace that you use for tracking deadlock events. When you add the Deadlock graph event, the information regarding the processes and objects in the deadlock is added to the Text Data column. You can extract the XML document as a deadlock XML document, which is . xdl file. You can then open the . xdl file in the SQL Server Management Studio. Incorrect Answers: A: You should not use dynamic management views to view the deadlocks that have occurred on the server. Dynamic management views are used for monitoring the health of a SQL Server and its resources. You can also use dynamic management views to diagnose a variety of performance-related issues that may arise while running the server. B: You should not use Database Engine Tuning Advisor to view the deadlocks that have occurred on the server. Database Engine Tuning Advisor is not meant to capture information on deadlocks. "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

A. You should consider making use of Dynamic management views. B. You should consider making use of Database Engine Tuning Advisor. C. You should consider making use of Performance Monitor. D. You should consider making use of SQL Server Profiler.

sts

.co

165

Microsoft 70-450: Practice Exam Database Engine Tuning Advisor can work with different types of indexes, such as clustered or nonclustered. You can also use Database Engine Tuning Advisor to resolve unused or potential index issues. C: You should not use Performance Monitor to view the deadlocks that have occurred on the server. Performance Monitor is not meant to capture information on deadlocks. However, Performance Monitor can capture performance-related information on the services running on the operating system and using operating system resources, such as RAM and the processor.

QUESTION NO: 170 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com recently discovered that CERTKILLER-DB01 is no longer accessible to its clients due to an error. You have later created a Dedicated Administrator Connection with the server and attempt to connect to CERTKILLER-DB01 from the SQL Server Management Studio Query Editor, but receive an error 17810. CertKiller.com wants you to resolve the error.

Answer: C

Explanation: There can only be one DAC connection to the SQL Server instance. Error 17810 occurs if you attempt another connection when an existing connection is alive. You must disconnect the first connection to be able to connect using DAC. With a single connection, this error does not occur. You can connect either remotely or through the client on the server itself. If you want to connect remotely, you must run the sp_configure procedure on the server to enable remote connections. Also, anyone trying to establish a DAC connection must have the sqladmin permission on the SQL Server. Incorrect Answers: A: You can use either the sqlcmd command-prompt utility or the SQL Server Management Studio Query Editor to connect. It is not mandatory to connect using the sqlcmd command-prompt utility. The error in this scenario does not relate to the command. B: You should not use port 80 as the default port to resolve this problem. By default, DAC uses the loopback address, which is 127.0.0.1, along with port 1434. To initialize DAC on the SQL Server, "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

A. You should consider making use of the sqlcmd command-prompt utility to use DAC. B. You should consider using port 80 as the default port. C. You should consider disconnecting before you attempt to connect. D. You should consider making use of the DAC to connect with the default database instead of the master database.

lTe

sts

What should you do?

.co

166

Microsoft 70-450: Practice Exam you should first use a client on the server itself. If you need to remotely connect to the SQL Server instance using DAC, you should run the sp_configure stored procedure. This will enable DAC for remote connections. The error stated in the scenario does not relate to the port being used. D: You should not try to make a connection to the default database. The error in this scenario does not relate to which database you are trying to connect. By default, connections are made to the default database. After connecting to the default database, you can connect with the master database. However, there is a provision to override the connection to the default database and directly connect to the master database. You can do this by issuing the sqlcmd A d master command.

QUESTION NO: 171 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to lower the degree of parallelism after discovering a wait problem in the sys.dm_os_wait_stats view. CertKiller.com wants you to identify which problem will be corrected taking the actions above? A. The CXPACKET problem will be corrected. B. The CHECKPOINT_QUEUE problem will be corrected. C. The CHKPT problem will be corrected. D. The EXCHANGE problem will be corrected. Answer: A

Explanation: Lowering the degree of parallelism will affect the CXPACKET wait. This type of wait occurs when there is a wait on the data packets and the thread is waiting for the query to finish. To be able to reduce wait, you can either reduce the degree of parallelism or use the MAXDOP query hint to limit the number of processors used for the query. Incorrect Answers: B: The option CHECKPOINT_QUEUE is incorrect. This wait occurs when the checkpoint task is made to wait for the next checkpoint request. Lowering the degree of parallelism does not affect this wait. C: The CHKPT option is incorrect. CHKPT wait occurs when a SQL Server is starting up. CHKPT informs the checkpoint thread to start during a SQL Server start. Lowering the degree of parallelism does not affect this wait. D: The EXCHANGE option is incorrect. This type of wait occurs in the query processor exchange iterator when the synchronization phase of parallel queries is in process. Lowering the degree of parallelism does not affect this wait.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

167

Microsoft 70-450: Practice Exam

QUESTION NO: 172 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to make use of SQL Server Profiler to trace specific event on the database which took place. CertKiller.com additionally wants you to create a template which will be used in another server named CERTKILLER-DB02. CertKiller.com wants to know the advantages of using a trace template. A. The advantage of using a trace template is that you will be allowed to capture the same event data each time. B. The advantage of using a trace template is that you will be allowed to share the traces in a file. C. The advantage of using a trace template is that you will be allowed to create a workload. D. The advantage of using a trace template is that you will be allowed to capture events and replay them later. Answer: A

Explanation: The benefit of creating a trace template is that you will be able to capture the same event data each time you use the template. When you define a trace template, you define trace definitions to monitor for a specific event. With a template, you do not need to configure the trace definitions repeatedly. The same template can be exported from one server and imported onto the other server for reuse. The other alternatives are benefits of saving traces in a file, not benefits of creating a trace template. Saving traces in a file has the following benefits: Allows you to create a workload Allows you to capture events and replay them later Allows you to share traces in a file In SQL Server Profiler, you can have either a trace file or a trace template. The trace file contains the captured trace data and the trace template contains consistent trace definitions that can be used each time you run the template. SQL Server Profiler is typically used to trace specific events. For instance, you can use SQL Server Profiler to view deadlocks that have occurred on the server and extract the information to a deadlock XML file (. xdl ). You can use SQL Server Profiler to trace specific events on the database that take place in the database.

QUESTION NO: 173

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

168

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to generate performance recommendations for indexes available in the CK_SALES database on CERTKILLER-DB01 then generate a script to apply the recommendations. What should you do? A. You should consider making use of Dynamic management views. B. You should consider making use of Database Engine Tuning Advisor. C. You should consider making use of SQL Server Profiler. D. You should consider making use of SQL Query Analyzer. Answer: B Explanation: You should generate a script to apply the recommendations, which can be done easily by exporting the script with the . sql extension. The same script can then be run on a database in Query Editor. If you have a performance-related concern, you can use the Database Engine Tuning Advisor to recommend indexes for a single or multiple databases. The Database Engine Tuning Advisor can work with different types of indexes, such as clustered or nonclustered . You can also use the Database Engine Tuning Advisor to resolve unused or potential index issues. Incorrect Answers: A: You should not use dynamic management views. A number of dynamic management views or functions are available to provide index status in a database. However, these views or functions do not provide recommendations and generate a script for applying the recommendations. C: You should not use SQL Server Profiler because it does not provide recommendations on the indexes in your database. It will also not be able to generate a script for the recommendations. SQL Server Profiler is used for tracing certain events that take place within a database. An example of such an event is login failures that may occur when connecting to a database. D: You should not use SQL Query Analyzer because it no longer exists in SQL Server 2008. This was part of the SQL Server 2000 or prior versions. From SQL Server 2005 onwards, it has been replaced with SQL Server Management Studio.

QUESTION NO: 174 You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server named CERTKILLER-DB04. CERTKILLER-DB04 often experiences CPU pressure. The instance includes an enormous "Pass Any Exam. Any Time." - www.actualtests.com 169

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam mission-critical database that is constantly being used. You receive an instruction from management to make sure that the online index rebuilds does not use all the available CPU cycles. You thus need to determine the configuration option that will ensure this. What should you do? A. You should use the affinity I/O mask option. B. You should use optimize for ad hoc workloads option. C. You should use the affinity mask option. D. You should use the max degree of parallelism option. Answer: D

QUESTION NO: 175 CertKiller.com has employed you as a database administrator. You are responsible for administering the SQL Server 2008 infrastructure of the organization. You receive an instruction from management to implement a maintenance strategy plan for a critical database that includes a table named CK_SALES. The maintenance strategy plan should also include the index maintenance operations. You consider the facts below prior to designing the strategy:The standard fragmentation for the clustered index of the CK_SALES is less than 3 percent.New rows are added to CK_SALES continuously.CK_SALES includes a column of the xml data type.CK_SALES is accessed continuously. To ensure productivity you need to use strategy to make sure that the performance of the queries on CK_SALES is at its best. What should you do?

A. You should consider having CK_SALES reorganizing by configuring the NTFS quotas. B. You should consider stopping the clustered index of CK_SALES from reorganizing, scheduled or rebuilding operations. C. You should consider using the File Server Resource Manager (FSRM) on CK_SALES. D. You should consider having the Storage Manager rebuilding montly. Answer: B

QUESTION NO: 176 "Pass Any Exam. Any Time." - www.actualtests.com 170

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for managing a database server named CERTKILLER-DB01 that hosts a database named CK_PRODUCTS. CK_ PRODUCTS contains over three million rows and six columns with information for the year. You receive an instruction from the CIO to replicate the information to numerous subscribers. You decide to divide the table into multiple partitioned tables. You make use of transformable subscriptions that exclude certain rows on a per subscriber basis to accomplish this. You need to make sure that every table hold data for a specific quarter is included in a table. What should you do? A. You should consider using vertical partitioning. B. You should consider using horizontal partitioning. C. You should consider using Row-Splitting partitioning. D. You should consider using Normalization partitioning. Answer: B

Explanation: When you apply horizontal partitioning on a table that contains a large number of rows, you will be able to split the table into fewer rows with the same number of columns. With horizontal partitioning, the number of rows is split across multiple tables but the number of columns remains the same. You gain a performance benefit because you will have fewer rows to work with. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs. As an example, you can split the table into four different tables where each table represents data for a specific quarter for the year. However, in this type of partitioning, the number of columns always remains the same across multiple tables. Incorrect Answers: A: In vertical partitioning, you will have the same number of rows but fewer columns. In vertical partitioning, the columns are divided among multiple tables with the same number of rows. Vertical partitioning can be of two types: C: In row splitting, fewer columns are retained, which means that each row contains a portion of the logical row in the partitioned table. When you join the rows from the partitioned tables based on a UNIQUE KEY column, it becomes the original row with the complete data. D: In normalization, redundant columns are removed from the primary table and moved into secondary tables. The redundant columns are then linked with the primary table using the primary or foreign key.

QUESTION NO: 177

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

171

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for managing a database server named CERTKILLER-DB01 that hosts a database named CK_RESEARCH. CK_RESEARCH contains over four million rows and eight columns with information for one annum. You receive an instruction from the CIO to replicate the information to numerous subscribers. You decide to divide the table into multiple partitioned tables. You make use of transformable subscriptions that exclude certain rows on a per subscriber basis to accomplish this. You need to make sure that every table hold data for a specific quarter is included in a table. What should you do? A. You should consider using vertical partitioning. B. You should consider using Row-Splitting partitioning. C. You should consider using Normalization partitioning. D. You should consider using horizontal partitioning. Answer: D

Explanation: When you apply horizontal partitioning on a table that contains a large number of rows, you will be able to split the table into fewer rows with the same number of columns. With horizontal partitioning, the number of rows is split across multiple tables but the number of columns remains the same. You gain a performance benefit because you will have fewer rows to work with. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs. As an example, you can split the table into four different tables where each table represents data for a specific quarter for the year. However, in this type of partitioning, the number of columns always remains the same across multiple tables. Incorrect Answers: A: In vertical partitioning, you will have the same number of rows but fewer columns. In vertical partitioning, the columns are divided among multiple tables with the same number of rows. Vertical partitioning can be of two types: B: In row splitting, fewer columns are retained, which means that each row contains a portion of the logical row in the partitioned table. When you join the rows from the partitioned tables based on a UNIQUE KEY column, it becomes the original row with the complete data. C: In normalization, redundant columns are removed from the primary table and moved into secondary tables. The redundant columns are then linked with the primary table using the primary or foreign key.

QUESTION NO: 178

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

172

Microsoft 70-450: Practice Exam CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are the administering a Microsoft SQL Server 2008 that contains a database with a huge amount of data. A table in the database contains more than 6 million rows and 6 columns. You receive an instruction from the CIO to replicate the data to a number of subscribers. You decide to partition the information in a horizontal manner for a transformable subscription. You need to determine how the subscribers will receive the subscription during the replication process. What should you identify? A. It will result in the table having fewer rows and same amount of columns. B. It will result in the table having same amount of columns and same amount of rows. C. It will result in the table having same amount of rows but less columns. D. It will result in the table having fewer columns and fewer rows. Answer: A

In vertical partitioning, you will have the same number of rows but fewer columns. In vertical partitioning, the columns are divided amongst multiple tables with the same number of rows. Vertical partitioning can be of two types: normalization and row splitting. In normalization, redundant columns are removed from the primary table and moved into secondary tables. The redundant columns are then linked with the primary table using primary or foreign key. In row splitting, fewer columns are retained, which means that each row contains a portion of the logical row in the partitioned table. When you join the rows from the partitioned tables based on a UNIQUE KEY column, it becomes the original row with the complete data. The remaining two options are incorrect. They cannot be achieved by applying horizontal partitioning.

QUESTION NO: 179 CertKiller.com has hired you as a database administrator for their network.. CertKiller.com currently makes use of Microsoft SQL Server 2008 Enterprise Edition for hosting databases. You "Pass Any Exam. Any Time." - www.actualtests.com 173

Ac

tua

Explanation: When you apply horizontal partitioning on a table that contains a large number of rows, you will be able to split the table into fewer rows and the same number of columns. With horizontal partitioning, the number of rows is split across multiple tables but the number of columns remains the same. You gain a performance benefit because you will have fewer rows to work with. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs. As an example, you can split the table into four different tables where each table represents data for a specific quarter for the year. However, in this type of partitioning, the number of columns always remains the same across multiple tables.

lTe

sts

.co

Microsoft 70-450: Practice Exam are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_ACCOUNTS. You are in the process of creating a partition for a column named ItemID in the Items table that is located in CK_ACCOUNTS. You decide to configure page partition on the partition. During routine monitoring you discover that the performance of CERTKILLER-DB01 has degraded after page compression was configured. You need to determine the dynamic management function you should use in order to monitor the page compression statistics for the partition. What should you do? A. You should consider using sys.dm_db_index_operational_stats. B. You should consider using sys.dm_db_partition_stats. C. You should consider using sys.dm_db_index_usage_stats. D. You should consider using sys.dm_db_index_physical_stats. Answer: A

Explanation: SQL Server 2008 Enterprise and Developer editions allow you to configure compression for tables and indexes. The two types of data compression are row and page compression. When you have configured partitions on a table or index, you can configure different types of compression for each partition. You can use the data_compression parameter of the create table, create index , alter table, and alter index Transact-SQL statements to configure data compression. The possible values for this parameter are: DATA_ COMPRESSION = { NONE | ROW | PAGE } Configuring row and page compression can affect the performance of your sever. When you configure row and page compression, CPU utilization is increased, while I/O utilization and memory utilization is decreased. You can query the sys. dm_db_index_operational_stats dynamic management function to obtain page compression statistics. Incorrect Answers: B: You should not query the sys.dm_db_partition_stats dynamic management function because this function does not provide page compression statistics for a partition. The sys.dm_db_partition_stats function provides information about page and row-count for every partition in the current database. C: You should not query the sys.dm_db_index_usage_stats dynamic management function because this function does not provide page compression statistics for a partition. The sys.dm_db_index_usage_stats function provides information about the number of different types of index operations along with the time each type of operation was last performed. D: You should not query the sys.dm_db_index_physical_stats dynamic management function because this function does not provide page compression statistics for a partition. The sys.dm_db_index_physical_stats function contains information about the size and fragmentation "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

174

Microsoft 70-450: Practice Exam for the data and indexes of the specified table or view.

QUESTION NO: 180 CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com include administering the SQL Server 2008 servers. You receive an instruction from the CIO to create a partitioned data warehouse fact table. Due to the size of the table you need to store the information over a number of disks. CertKiller.com has partitioning functions that split the tables horizontally based on the value in a particular column. You need to make sure that the partitions are all compressed. What should you do? A. You should make use of ALTER TABLE and REBUILD PARTITION = 0. B. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = 0. C. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = ALL. D. You should make use of ALTER TABLE and REBUILD PARTITION = ALL. Answer: D

In correct Answers: A: You should not use the alter table statement and the rebuild partition = 0 option. The rebuild partition option specifies the number of the partition to be rebuilt. The number of the partition cannot be zero. B, C: You should not use any option with the alter partition function statement. You can only rebuild a partition for a table with the alter table statement, not the alter partition function statement. Splits and merges are handled through the alter partition function statement.

Part 2: Design a solution to govern resources (2 Questions)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

Explanation: The alter table statement rebuilds one or all partitions. You can specify a single partition to rebuild, or you can specify multiple partitions. If you specify rebuild partition = all, you can rebuild the table on all partitions. The following code rebuilds all partitions for the Orders table on partitions. Partitions 1, 2 and 3 are rebuilt with page-level compression. Partitions 4, 5, and 6 are rebuilt with row-level compression. ALTER TABLE Orders REBUILD PARTITION = ALL WITH (DATA_COMPRESSION = PAGE ON PARTITIONS (1 TO 3), DATA_COMPRESSION = ROW ON PARTITIONS (4 TO 6) )

tua

lTe

sts

.co

175

Microsoft 70-450: Practice Exam QUESTION NO: 181 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named TESTDATA. During routine monitoring you discover that TESTDATA is experiencing high volumes of queries and transactions that affect the performance of the processor. You send a proposal to management outlining your plans to implement an incremental backup strategy for TESTDATA as well as using backup compression. It is important that you make sure that the backup jobs have a little effect on the performance of CERTKILLER-DB01. What should you do?

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you discovered that the high-priority application used with the database performs poorly when run at the same time with lower-priority resource intensive applications on CERTKILLER-DB01. CertKiller.com wants you to configure the Resource Governor. What should you do? (Choose all that apply) A. You should consider creating a trace log B. You should consider creating a counter log C. You should consider creating a workload file. D. You should consider creating a workload group. E. You should consider creating a classifier function. F. You should consider creating a resource pool. "Pass Any Exam. Any Time." - www.actualtests.com 176

Ac

tua

QUESTION NO: 182

lTe

Answer: D

sts

A. This can be accomplished by using a resource-allocation policy. B. This can be accomplished by configure Background Intelligent Transfer Service (BITS) server extensions. C. This can be accomplished by configure the Distributed File System (DFS). D. This can be accomplished by ensuring that the Resource Governor is used.

.co

Microsoft 70-450: Practice Exam Answer: D,E,F Explanation: You should perform the following steps in this order: Create a resource pool. Create a workload group. Define a classifier function. To control resources effectively, applications can be grouped by priority into resource pools using the Resource Governor. Resource Governor must first be enabled. After the Resource Governor has been enabled, you can create a resource pool to set limits on resource usage. You can then limit the resource usage by application pool to prevent the lower-priority applications from taking resources from high-priority applications. You should create a workload group for the resource pool to specify limits and policies. After creating the workload group, you should then create a classifier function. The classifier function groups applications into workload groups so that limits can be applied to the workload groups for their resource usage. Incorrect Answers: A: You should not create a trace log or a counter log. Trace logs and counter logs are not configured in the Resource Governor. B: You should not create a trace log or a counter log. Trace logs and counter logs are not configured in the Resource Governor. C: You should not create a workload file. A workload file can be used by the database engine tuning advisor to determine the usefulness of indexes. You do not need a workload file to configure the Resource Governor. Part 3: Design policies by using Policy-Based Management (10 Questions)

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2003 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01. You have received instruction from the CIO to add the Policy-Based Management policies below on CERTKILLER-DB01:All the tables in the user databases must have an index.All the stored procedures in the user databases must begin with DS_Disabling Database Mail on CERTKILLERDB01.Only encrypted views must be created on the user databases. It has come to your attention that transactional replication fails between CERTKILLER-DB01 and several other SQL servers after the policies were implemented. You need to determine a way to solve the problem. "Pass Any Exam. Any Time." - www.actualtests.com 177

Ac

QUESTION NO: 183

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam What should you do? A. You should consider disabling the policy that disables Database Mail on CERTKILLER-DB01. B. You should consider disabling the policy that only permits encrypted views on the user databases. C. You should consider disabling the policy that indicates that the stored procedures in user databases must begin with DS_. D. You should consider disabling the policy that indicates that all tables in the user databases must have an index. Answer: D Explanation: When Policy-Based Management is applied on a SQL Server instance, the policies can affect the functionality of the server. In this scenario, the policy that forces every table to have an index will cause a problem with transactional replication. Transactional replication uses the systtanschemas table. This table does not have an index. The policy that forces all tables to have an index will conflict with the systranschemas table and cause transactional replication to fail. No other policies will cause problems with transactional replication. Incorrect Answers: A: Disabling Database Mail will not cause transaction replication to fail. Transactional replication relies on the publication database, distribution database, subscription database, and the log reader agent. Database Mail is not a part of transactional replication. B: Specifying that encrypted views must only be created in a database or specifying a stored procedure must be named a certain way will not conflict with transactional replication. You can replicate both views and stored procedures in transactional replication. C: Specifying that encrypted views must only be created in a database or specifying a stored procedure must be named a certain way will not conflict with transactional replication. You can replicate both views and stored procedures in transactional replication.

QUESTION NO: 184

You work as a database administrator at CertKiller.com. CertKiller.com has headquarters in London and branch offices in Paris, Berlin, Milan, Madrid, Stockholm, Warsaw, and Athens. You are responsible for administering a SQL Server 2008 infrastructure. The branch offices of CertKiller.com store information regarding their clients in SQL Server 2008 databases. A CertKiller.com security policy states that client information stored across numerous database instances should be security compliant. You make use of the Policy Based Management feature to design a strategy for the custom policies that are in XML format. You have to make sure that the strategy allows custom policies to be distributed to all instances "Pass Any Exam. Any Time." - www.actualtests.com 178

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam and that the policies are implemented on all the instances. You need to accomplish this with the minimum of administrative effort. What should you do? A. Your best option would be to make use of IPsec domain isolation. B. Your best option would be to make use of a configuration server. C. Your best option would be to make use of multiple downstream servers. D. Your best option would be to make use of cluster quorum drive. Answer: B

QUESTION NO: 185

Answer: D

QUESTION NO: 186 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01. Due to company growth CertKiller.com acquired another company named Courseware Publishers. Prior to acquiring the company you created a Policy-Based Management policy on CERTKILLERDB01. You receive an instruction from the CIO to apply the policy to the SQL 2008 servers in the courseware.com domain. "Pass Any Exam. Any Time." - www.actualtests.com 179

Ac

A. Your best option would be to execute the DBCC CHECKDB command on the SSMS. B. Your best option would be to use the varbinary(MAX) data type with FILESTREAM storage of the DDL triggers. C. Your best option would be to make use of Event Viewer tasks. D. Your best option would be to create Policy-Based Management policies. Thereafter you should use the configuration server and distribute the policies.

tua

lTe

What should you do?

sts

You receive an instruction from management to enforce naming standards for the database objects. You thus decide to implement a way to enforce naming standards. Due to the lack of staff you need to accomplish this with the least amount of programming and administrative efforts.

.co

You work as a database administrator at CertKiller.com. Your duties include administering the SQL Server 2008 infrastructure.

Microsoft 70-450: Practice Exam What should you do? (Choose all that apply.) A. This can be accomplished by evaluating the policy against all the instances of SQL Server in the server group. B. This can be accomplished by importing the policy to the courseware.com domain using the Group Policy Management console. C. This can be accomplished by creating a two-way trust between the courseware.com domain and CertKiller.com domain. D. This can be accomplished by creating a Central Management Server group that will include the instances of the SQL Servers in the CertKiller.com domain as well as the courseware.com domain. E. This can be accomplished by forcing replication between the domains. F. This can be accomplished by exporting the Policy-Based Management policy from CERTKILLER-DB01 to an XML file. G. This can be accomplished by creating a Central Management Server group that will hold the instances of the SQL Servers in the courseware.com domain. Answer: A,D,F Incorrect Answers: B: You should not use the Group Policy Management console to import the policy to the courseware.com domain. A Policy-Based Management policy is not active directory based like a group policy object (GPO). You should use the SQL Server Management Studio to import the policy, not the Group Policy Management console. C: Policy-Based Management policy is not based on active directory thus you do not need a trust between the domains. E: You do not have to create a two-way trust between the courseware.com domain and the CertKiller.com domain and you do not have to force replication between the domains. G: You should not create a Central Management Server group that contains only instances of the SQL servers in the courseware.com domain. The Central Management Server group can contain server instances from different domains or workgroups. You should have servers in both domains in the Central Management Server group.

QUESTION NO: 187 CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently makes use of Microsoft SQL Server 2008. You are responsible for administering a database server named CERTKILLER-DB01. You receive an instruction from the CIO to create a policy that requires all databases on CERTKILLER-DB01 have the full recovery model and the Trustworthy property set. You decide to create a condition for the Policy-Based Management policy. "Pass Any Exam. Any Time." - www.actualtests.com 180

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam What should you do? What facet must you use to? . A. You should consider using the Surface Area Configuration facet. B. You should consider using the Schema facet. C. You should consider using Database Maintenance facet. D. You should consider using Database Options facet. Answer: D Explanation: The Database Options facet specifies options that can be set with the sp_dboptions stored procedure as well as by configuring the Trustworthy property on the database and the recovery model of the database. Incorrect Answers: A: You should not use the Surface Area Configuration. This facet allows you to enable support for the OPENROWSET and OPENDATASOURCE functions, CLR integration, Database Mail or SQL Mail, and the xp_cmdshell. The facet does not contain properties for the recovery model of the database or the Trustworthy property of the database. B: You should not use the Schema facet. This facet contains property for the name, ID, and owner of the schema. The facet does not contain properties for the recovery model of the database or the Trustworthy property of the database. C: You should not use the Database Maintenance facet. This facet includes the property for the recovery model but does not allow you to set the Trustworthy property on the database.

QUESTION NO: 188

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to institute a naming convention which requires all stored procedures in the CK_SALES database to start with the letters KING. You have decided to have a user named Rory Allen create and test the policy. CertKiller.com wants to know which membership role would be required to create the policy. What would your reply be? A. Rory Allen should have the dc_admin role in the master database. B. Rory Allen should have the dc_admin role in the msdb database. "Pass Any Exam. Any Time." - www.actualtests.com 181

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam C. Rory Allen should have the PolicyAdministratorRole role in the master database. D. Rory Allen should have the PolicyAdministratorRole role in the msdb database. Answer: D Explanation: Members of this role can create and test a policy for Policy-Based Management, as well as perform all configuration and maintenance activities on Policy-Based Management policies and the conditions associated with the polices. Incorrect Answers: A: You cannot add the user to the dc_admin role in the master database. The dc_admin role only exists in the msdb database. B: You should not add the user to the dc_admin role in the msdb database. Members of this role can use, maintain, and administer the data collector for the SQL Server 2008 server instance. This role cannot be used to manage policies in Policy-Based Management. C: You cannot add the user to the PolicyAdministratorRole role in the master database. The PolicyAdministratorRole role only exists in the msdb database, where policies are stored.

You later made use of the Policy-Based Management for creating and testing a policy on CERTKILLER-DB01. After testing the policy you decided to have the policy applied to CERTKILLER-DB01 and new servers CERTKILLER-DB02, CERTKILLER-DB03 and CERTKILLER-DB04. CertKiller.com wants you to ensure that the naming convention policy from CERTKILLER-DB01 applies to all the database servers by taking the action below: You have set CERTKILLER-DB01 as the Central Management Server.You have added CERTKILLER-DB02, CERTKILLER-DB03 and CERTKILLER-DB03 as part of the Central Management Server group. CertKiller.com additionally wants you to ensure that the policy applies to all SQL Servers. What should you do? A. You should consider having the policy exported from CERTKILLER-DB01 and use DFS to replicate the policy file to every server in the group. "Pass Any Exam. Any Time." - www.actualtests.com 182

Ac

tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to enforce a naming convention policy which has all tables beginning with the name CK and all views beginning with the name CKing.

lTe

sts

QUESTION NO: 189

.co

Microsoft 70-450: Practice Exam B. You should consider having the policy exported from CERTKILLER-DB01. You should then have a GPO created that will apply all the naming convention policy to all the servers in the group. C. You should consider having the Back up the msdb database from CERTKILLER-DB01 backed up and restore the database on all the other SQL servers. D. You should consider having the Export the policy exported from CERTKILLER-DB01. You should then select the exported policy and then evaluate the policy against all servers in the group on the server group. Answer: D

QUESTION NO: 190 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com hires a new assistant administrator named Rory Allen to assist you. You want to allow Rory Allen to be able to disable any Policy-Based Management policies that he thinks should not be applied. What should you do?

Answer: C

Explanation: A member of the PolicyAdministratorRole role can create, enable, and disable Policy-Based Management policies on the SQL server. Incorrect Answers: A: The db_owner role specifies the owner of the database. Making a user a member of the db_owner role will not give a user the ability to add, create, enable, or disable Policy-Based Management policies. The user needs to be a member of the PolicyAdministratorRole to perform this function. B: Members of the db_securityadmin role can modify database role memberships and manage permissions. This role does not give a user the ability to add, create, enable, or disable PolicyBased Management policies. D: Members of the sysadmin role have full access to all system and user databases. This role is a "Pass Any Exam. Any Time." - www.actualtests.com 183

Ac

tua

A. You should consider having Rory Allen added to the db_owner role in the master database. B. You should consider having Rory Allen added to the db_securityadmin role in the master database. C. You should consider having Rory Allen added to the PolicyAdministratorRole in the msdb database. D. You should consider having Rory Allen added to the sysadmin role in the model database.

lTe

sts

.co

Microsoft 70-450: Practice Exam server role and not a database role. Also, there is not a sysadmin role in the model database. This role is only on the server.

QUESTION NO: 191 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to have a policy to prohibit the enabling of Database Mail on CERTKILLER-DB01. What should you do? (Choose all that apply) A. You should consider having a facet created that uses the Surface Area Configuration condition. B. You should consider having the expression as @DatabaseMailEnabled=False set in the facet. C. You should consider having a policy named DBMail created to include the RestrictDBmail facet. D. You should consider having the expression as @DatabaseMailEnabled=True set in the condition. E. You should consider having a policy named DBMail created to include the RestrictDBmail condition. F. You should consider having a condition created that uses the Surface Area Configuration facet. Answer: D,E,F

You should use the Surface Area Configuration facet to configure whether database mail is enabled. You should specify the condition to use the Surface Area Configuration facet. In the following example, the RestrictDBmail condition uses the Surface Area Configuration facet and forces Database Mail to be disabled on a server. Once the RestrictDBmail condition has been created, you can create a policy to use the condition. The following screenshot shows a policy named DBMail using the condition of RestrictDBmail . There is no server restriction set on the policy. Incorrect Answers: A: You should not create a facet that uses the Surface Area Configuration condition. You create conditions from facets. You do not create a facet from a condition. B: You should not set the expression as @DatabaseMailEnabled=False in the facet. In the "Pass Any Exam. Any Time." - www.actualtests.com 184

Ac

Explanation: You should create and configure the policy in this manner: Create a condition that uses the Surface Area Configuration facet. In this scenario, the condition is called RestrictDBmail . In the condition, set the expression as @ DatabaseMailEnabled =True. Create a policy named DBMail to include the RestrictDBmail condition.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam condition, you should pick the property of the facet and set the expression. You should not do this in the facet. In this scenario, you should pick the DatabaseMailEnabled property of the Surface Area Condition facet. You should set the expression as @DatabaseMailEnabled=False in the condition. C: You should not create a policy named DBMail to include the RestrictDBmail facet. Policies do not include facets. Policies include conditions, and conditions are derived from facets.

QUESTION NO: 192 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. During the course of the day you receive instruction from CertKiller.com to create a policy that will require all tables in the CK_DATA database to use the prefix CK_. The policy must be implemented and should take effect immediately. You decide to complete the tasks listed below: You have decided to create a condition called CK_Table which includes the facet of Multipart Name with the expression of @Name like 'CK_'.You additionally decided to create a condition called CK_DATA Database which includes the facet of Database with the expression of @Name='CK_DATA'. You have created the policy named CK_DATA names which included both of the conditions. CertKiller.com wants you to decide which execution mode should be set. What should you do?

Answer: B Explanation: You can specify the execution mode of a policy as follows: On Demand: When you choose this execution mode, the policy will be evaluated when the user manually runs the policy. Except for this policy execution mode, all other policy execution modes are automated. On Schedule: Choosing this execution mode allows you to define a schedule when the policy will be evaluated automatically. The automatic evaluation of the policy is carried out by a SQL Server Agent job. This mode is an automated mode and logs any violations of the policy in the Windows Event log. "Pass Any Exam. Any Time." - www.actualtests.com 185

Ac

A. You should consider making use of the Now execution mode. B. You should consider making use of the On Change -Prevent execution mode. C. You should consider making use of the On Demand execution mode. D. You should consider making use of the On Schedule execution mode.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam On Change -Log Only: With this mode, the policy is evaluated only when a relevant change occurs. This mode is also automated and logs any violations of the policy. On Change -Prevent: With this mode, the policy is evaluated when a relevant change occurs in the associated target entity. This mode also prevents policy violations by using DDL triggers. This mode is also an automated mode. In this scenario, the evaluation mode of On Change -Prevent will create a database trigger on the CK_DATA database to prevent a table from being named anything that does not begin with 'CK_'. Incorrect Answers: A: You cannot specify the evaluation mode Now. This is not a valid evaluation mode. C: The On Demand evaluation mode will result in an error stating "Exception of type'Microsoft.SqlServer.Management.Dmf.ConflictingPropertyValuesException' was thrown. Execution Mode 'On Demand' does not support Enabled 'True'". D: The On Schedule evaluation mode requires that a schedule should be defined. In this scenario, you wanted the policy to be applied immediately and not on a schedule. Part 4: Design a data compression (6 Questions)

QUESTION NO: 193

You are the newly appointed database administrator at CertKiller.com. Your job function includes administering a SQL Server 2008 instance. You deploy a new database named CK_RESEARCH that will be used to administer large documents. These documents will be revised from time to time. You receive an instruction from the CIO to implement a table structure that will enable fast read access. It is important that you reduce the storage space requirement.

A. This can be accomplished by utilizing the resource-allocation policy for process-based management. B. This can be accomplished by utilizing the varbinary(MAX) data type with FILESTREAM storage. C. This can be accomplished by utilizing the NTFS file system compression on the volume. D. This can be accomplished by utilizing caching on the shared folder. Answer: B,C

QUESTION NO: 194 CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are the administrating a SQL Server 2008 infrastructure. "Pass Any Exam. Any Time." - www.actualtests.com 186

Ac

What should you do? (Choose all that apply.)

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam An instance on the infrastructure contains a database. The database in turn includes a table named KINGDATA which has a column named CK_SALES. Microsoft Office Word 2003 documents is stored in CK_SALES. Management wants you to decrease the space taken by CK_SALES. However, average performance is needed sot be kept when the CertKiller.com users retrieve the data in the column. What should you do? A. This can be accomplished by using the vardecimal() data type. B. This can be accomplished by ensuring that CK_SALES is stored using filestream storage. Thereafter the NTFS file system compression should be used. C. This can be accomplished by using folder redirection. D. This can be accomplished using the Job Activity Monitor tool for KINGDATA. Answer: B

QUESTION NO: 195

What should you do? (Choose all that apply.) A. Your best option would be to use the Database Engine Tuning Advisor tool. B. Your best option would be to use the Windows System Monitoring tool. C. Your best option would be to enable individual node. D. Your best option would be for the first two partitions to enable PAGE compression. E. Your best option would be for the third partition to enable ROW compression. Answer: D,E

QUESTION NO: 196 "Pass Any Exam. Any Time." - www.actualtests.com 187

Ac

You have received instruction from the CIO to minimize the disk space of the table. You have to make sure that this action does not have a great impact on the query performance.

tua

You partition this table into four equal parts. During routine monitoring you discover that:The first partition is hardly ever queried.The second partition is hardly ever queried.The third partition is often queried by several reports.The fourth partition is heavily queried and repeatedly modified

lTe

CertKiller.com has hired you as a database administrator for their network. Your duties include administrating the SQL Server 2008 infrastructure. You are in the process of partitioning the biggest table in a database.

sts

.co

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a new database named CK_PRODUCTS which will occasionally require having large documents revised. CertKiller.com wants you to design a table structure allowing for fast read access whilst minimizing the storage requirements. What should you do? (Choose two) A. You should consider making use of row-level compression on the document table. B. You should consider making use of the varbinary(MAX) data type with FILESTREAM storage. C. You should consider making use of row-level compression on all columns that use the vardecimal() data type. D. You should consider making use of the NTFS file system compression on the volume. Answer: B,D

During routine monitoring you detect the subsequent performance errors on CK_SALES:Performance of the application queries is poor against Stock.Maintenance tasks against the database take a very long.Index defragmentation takes very long. You receive an instruction from the CIO to ensure performance without affecting the performance of CERTKILLER-DB06. What should you do? A. Your best option would be to use the sys.dm_exec_sessions dynamic management view. Thereafter another table named StockHistory should be created for data older than two months. B. Your best option would be to use the sys.dm_exec_requests dynamic management view another table older than two months and shift the information.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

You are assigned a database server named CERTKILLER-DB06 with an instance that hosts a database named CK_SALES. CK_SALES includes a table named Stock. At present DML statements on the last two months data is executed by the application queries. Administrative audits on data older than two months are conducted on a monthly basis.

lTe

You work as a database administrator at CertKiller.com. Your duties include administrating the SQL Server 2008 infrastructure of the organization.

sts

QUESTION NO: 197

.co

188

Microsoft 70-450: Practice Exam C. Your best option would be to use the sys.dm_exec_query_stats dynamic management view to shift the information older than two months to the StockHistory. D. Your best option would be to create another table named StockHistory for information that is older than two months. You should also use the OrderDate column and partitioned Stock and StockHistory in two parts. Thereafter a SQL Server Agent job should be created that runs monthly and uses the ALTER TABLE...SWITCH Transact-SQL statement to shift the information older than two months to the StockHistory. Answer: D

QUESTION NO: 198 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to implement either row compression or page compression depending which method yields the most free space recovered. What should you do?

Answer: A Explanation: This stored procedure can determine which level of compression will give you the most space before actually implementing compression. You can also use the Data Compression Wizard in the SQL Server Management studio. Row compression does not take any disk space for zero or null values. It takes into account variable data type structures in a row. Page compression looks at redundant data in one or many rows on a given page. Page compression occurs when the page is full. Incorrect Answers: B: You should not use sys.sp_clean_db_free_space. This stored procedure removes residual information left on database pages on a database when a data modification has been completed. "Pass Any Exam. Any Time." - www.actualtests.com 189

Ac

A. You should consider making use of the stored procedure: sys.sp_estimate_data_compression_savings. B. You should consider making use of the stored procedure: sys.sp_clean_db_free_space. C. You should consider making use of the stored procedure: sys.sp_autostats. D. You should consider making use of the stored procedure: sys.sp_clean_db_file_free_space.

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam This stored procedure is similar to sys.sp_clean_db_file_free_space, but it removes residual information left on database pages for the entire database, not just a particular database file. C: You should not use sys.sp_autostats. This stored procedure displays or changes the UPDATE STATISTICS setting for an index or all indexes on a table. D: You should not use sys.sp_clean_db_file_free_space. This stored procedure removes residual information left on database pages on a database file when a data modification has been completed. Part 5: Design a management automation strategy (4 Questions)

QUESTION NO: 199 You work as a database administrator at CertKiller.com. Your duties include administrating a SQL Server 2008 instance named CERTKILLER-DB01. CERTKILLER-DB01 will be used to host the new database application. You are in the process of implementing the security applications for the new database application. The CertKiller.com users all have their own unique login to CERTKILLER-DB01. The database application will hold the stored procedures required to perform stored procedures in the MSDB database.

What should you do?

A. This can be achieved by using the TRUSTWORTHY option on the new database. Thereafter the CertKiller.com users should be added to the MSDB database. B. This can be achieved by configuring the resource database and add the users to the MSDB database. C. This can be achieved by setting the appropriate trace flags as a startup parameter in the MSDB database. D. This can be achieved by using varbinary(MAX) data type in the MSDB database. Answer: A

QUESTION NO: 200 You work as a database administrator at CertKiller.com. Your duties at CertKiller.com include administering a SQL Server 2880 instance. You receive numerous complaints from CertKiller.com users regarding server's slow performance after a process was implemented on the instance. You check whether there are any long running "Pass Any Exam. Any Time." - www.actualtests.com 190

Ac

tua

lTe

sts

SQL Agent jobs will be scheduled by the stored procedures in the MSDB database. You have to make sure that the stored procedures is performed using the security context of the application user.

.co

Microsoft 70-450: Practice Exam queries. You do this using the Dynamic Management Views to confirm that no long queries are running. You decide to compare the performance data of the OS with the query execution trace. You need to do this with the least amount of administrative effort. What should you do? A. Your best option would be to make use of the Transaction Logs. B. Your best option would be to make use of SQL Server Profiler as well as System Monitor. C. Your best option would be to make use the VIEWDELETE log. D. Your best option would be to make use of the ServerManagerCMD utility. Answer: B

QUESTION NO: 201 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for managing a 32-bit edition of SQL Server 2008 You are in the process of executing a 32-bit package. To achieve this you make use of the Execute Package Utility (dtexecui.exe). You need to use the same package on a 64-bit edition of SQL Server 2008. What should you do?

A. You should consider using the dtexec utility or the SQL Server Agent in order to run the package. B. You should consider upgrading the package to 64-bit thereafter you can run it using the Execute Package Utility. C. You should consider using the SQL Server Agent in order to run the package. D. You should consider using the Execute Package Utility in order to run the package. Answer: A Explanation: To execute the package on a 64-bit version of SQL Server 2008, you can use either the dtexec utility or the SQL Server Agent. The SQL Server Agent is available in 64-bit editions of SQL Server 2008, but you must install Integration Services to have a 64-bit version of the dtexec utility. Incorrect Answers: B: You do not have to upgrade the package to 64-bit and run it using the Execute Package Utility. This utility can run packages only in 32-bit mode. On a 64-bit version of SQL Server 2008, you can run the package using either the dtexec utility or the SQL Server Agent. C: You do not have to run the package using the SQL Server Agent only. You can also use the "Pass Any Exam. Any Time." - www.actualtests.com 191

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam dtexec utility to run this package. D: You cannot run this package in 64-bit mode using the Execute Package Utility (dtexecui.exe). This utility can run packages only in 32-bit mode.

QUESTION NO: 202 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to have the network user Rory Allen e-mailed when another user has created or deleted a view in the CK_SALES database whilst ensuring the mechanism is processed in the local server and can be rolled back. What should you do?

A CertKiller.com employee named Rory Allen works as an application developer. Rory Allen creates the SQL Server 2008 Integration Services (SSIS) packages on the test server residing in the Test Lab. The SQL Server 2008 Integration Services (SSIS) packages are in a shared project. However, you need to use a fixed cache file on one of the packages. The packages will be deployed to the production server as soon as the development is completed. You need to make sure that Rory Allen is able to install the project to the production server. What should you do? A. Your best option would be to use the Hyper-V feature on the server and install the project. B. Your best option would be to use the Windows Deployment Services (WDS) for all packages. C. Your best option would be to use the Microsoft Multipath I/O to save the packages. "Pass Any Exam. Any Time." - www.actualtests.com 192

Ac

You are the newly appointed database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a SQL Server 2008 instance.

tua

QUESTION NO: 203

lTe

Answer: D

sts

A. You should consider making use of Event Nitifications. B. You should consider making use of sys.sp_cdc_enable_db stored procedure. C. You should consider making use of DML triggers. D. You should consider making use of DDL triggers.

.co

Microsoft 70-450: Practice Exam D. Your best option would be to ensure that an installation utility is set up for the SSIS project. Answer: D

QUESTION NO: 204 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to automate the execution of an SQL Server Integration Services (SSIS) package by making use of SQL Server Agent. CertKiller.com wants you to run the package in 32-bit mode. What should you do? (Choose two) A. You should consider making use of the 32-bit version of the dtexec utility on CERTKILLERDB01. B. You should consider having the package converted to 64-bit. C. You should consider making use of the 32-bit runtime on the Execution options tab of the New Job Setup dialog box. D. You should consider making use of the 32-bit Execution Package Utility. Answer: A,C

Explanation: To meet the required goal in the scenario, you can select Use 32 bit runtime on the Execution options tab of the New Job Step dialog box. Without enabling this option, you will not be able to run the 32-bit package on a 64-bit edition of SQL Server 2008. You also can use 32-bit version of the dtexec utility installed on CERTKILLER-DB01. For 32-bit packages, you will need to install it using Client Tools or Business Intelligence Development Studio when you are setting up SQL Server. Incorrect Answers: B: You do not have to convert the package to a 64-bit version. On a 64-bit version of SQL Server 2008, you can simply run the package in 32-bit mode by selecting the Use 32 bit runtime option on the Execution options tab of the New Job Step dialog box. D: You cannot select the 32-bit Execute Package Utility because it is available only in the 32-bit version of SQL Server 2008. This utility would not be available on CERTKILLER-DB01 because it is running the SQL Server 2008 64-bit edition. You could use the 32-bit Execute Package Utility from a SQL Server instance that is using the 32-bit edition of SQL Server 2008.

QUESTION NO: 205 "Pass Any Exam. Any Time." - www.actualtests.com 193

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a new SQL Server Integration Services (SSIS) package which should make use of an event handler when the package fails to execute. What should you do? A. You should consider making use of the OnError event handler. B. You should consider making use of the Onlnformation event handler. C. You should consider making use of the OnPreExecute event handler. D. You should consider making use of the OnTaskFailed event handler. Answer: A Explanation: When you attempt to execute a package and an error occurs, the OnError event handler will be triggered. An event handler is comprised of tasks and containers that form a sequence of execution. If a specific event handler is defined for an event, such as OnError event handler for failure of execution of a package, a series of tasks are performed. You can use the OnError event handler for logging the error condition that caused the package execution to fail. You can execute OnError to detail the problems related to the package execution. Incorrect Answers: B: The Onlnformation event handler is an incorrect option. This type of event handler is executed in the validation and execution stages of the package. This event handler is meant only to report information regarding the validation and execution. C: The OnPreExecute event handler is an incorrect option. This type of event handler is executed before the package is executed. D: The OnTaskFailed event handler is an incorrect option. This type of event handler is executed when a task is failed. Part 2: Design a strategy to use linked servers (3 Questions)

QUESTION NO: 206 CertKiller.com has hired you as a database administrator for their network. Your duties include administering the SQL Server 2008 infrastructure as well as two instances named CK_PRODUCT and CK_FINANCE. CK_PRODUCT contains the Exams database and CK_FINANCE the Sales database. A procedure in the Exams database starts a transaction. CertKiller.com is using a linked server to update Exams.dbo.Order table as well as the Sales.dbo.OrderHistory table. You receive an instruction from the CIO to make sure that a two-phase commit in used in the transaction. "Pass Any Exam. Any Time." - www.actualtests.com 194

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam What should you do? A. This can be achieved by using the Windows System Resource Manager (WSRM) for delegation. B. This can be achieved by having a linked server configured in order to make use of distributed transactions. C. This can be achieved by using the VPN solution. D. This can be achieved by using the Delegation of Control Wizard to enable the correct transaction control. Answer: B

QUESTION NO: 207 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you issue a begin distributed transaction statement on CERTKILLER-DB01. The session which is initiated connects with stored procedures located on CERTKILLER-DB02 and CERTKILLER-DB03. CertKiller.com is aware that the stored procedure on CERTKILLER-DB02 triggers a distributed query for CERTKILLER-DB04 and the stored procedure on CERTKILLER-SR03 triggers a distributed query on CERTKILLER-DB05. CertKiller.com wants to know which server is acting as the transaction originator in this scenario? A. CERTKILLER-DB04 B. CERTKILLER-DB03 C. CERTKILLER-DB05 D. CERTKILLER-DB02 E. CERTKILLER-DB01 Answer: E Explanation: In a distributed transaction scenario, any server that executes the query containing the begin distributed transaction statement will be the transaction originator. The server issuing the begin distributed transaction statement is always in command of the entire transaction. Upon the completion of the transaction, which can be either a commit transaction or a rollback transaction, the transaction originator uses Microsoft Distributed Transaction Coordinator (MS DTC) to complete the transaction on all the servers that are involved in the transaction. A series of steps are performed in the distributed transaction process. These steps are as follows: In the initial stage, a Transact-SQL script or an application connect uses a statement, which is a "Pass Any Exam. Any Time." - www.actualtests.com 195

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam Transact-SQL statement, to initiate a distributed transaction. The SQL Server Database Engine that executes the statement becomes the controlling server or the transaction originator. This is the second step of the distributed transaction. In this step, the server that is executing the statements is considered the controlling server in the distributed transaction. The distributed query is executed against linked server. This is the third step, in which either distributed queries or the remote stored procedures are executed. Distributed queries are executed against the linked servers and remote procedures are executed against the remote servers. The controlling server calls MS DTC. Depending on distributed queries and remote procedures execution, MS DTC is called by the controlling server. In this step, the remote and linked servers are listed. The controlling instance uses MS DTC to perform a two-phase commit. In this step, a commit or rollback statement is issued using the script. MS DTC is used to complete the two-phase commit process or rollback transactions.

QUESTION NO: 208 CORRECT TEXT

What should you do? (Click and drag the required steps from the left column in the correct order on the column to the left)

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to setup multiple linked SQL Servers. CertKiller.com additionally requested that you initiate distributed transactions making use of the linked servers.

sts

.co

196

Microsoft 70-450: Practice Exam Answer:

QUESTION NO: 209 CertKiller.com has employed you as a database administrator. You are responsible for administering a SQL Server 2008 database server named CERTKILLER-DB01. CERTKILLER-DB01 is in a peer-to-peer transactional replication topology with three other servers. The publication contains a table named CK_SALES. In turn CK_SALES encompasses of 200 GB of information across several partitions. From time to time a batch process bulk loads 10 GB of information to CK_SALES. You receive an instruction from the CIO to implement a replication strategy in order to reduce latency. What should you do?

Answer: A

QUESTION NO: 210

You work as a database administrator at CertKiller.com. CertKiller.com has its headquarters in London and branch offices in Paris and Athens. You are responsible for administering the SQL Server 2008 infrastructure. You are located at the London office and are assigned a SQL Server 2008 instance named CK_MARKETING. The Tele-marketing team makes use of notebook computers to update customer orders in a local database. You need to make sure that the local database is able to synchronize with CK_MARKETING when the notebook computers connect to the London office. You decide to set up the creation of a replication model that will be used to copy the local database to CK_MARKETING. You need to make sure that the replication model has the following criteria:The Tele-marketing team must be able to synchronize data at scheduled times as well as on demand.The Telemarketing team must not be able to update confidential information.The model must be able to "Pass Any Exam. Any Time." - www.actualtests.com 197

Ac

tua

lTe

A. This can be accomplished by using the BULK INSERT command in multiple staging tables. Thereafter the partitions should be changed into CK_SALES. B. This can be accomplished by create an ADMX file that should be used in CK_SALES and the publication reinitialized. C. This can be accomplished by configuring the File Server Resource Manager (FSRM). D. This can be accomplished by configuring the resource-allocation policy for process-based management.

sts

.co

Microsoft 70-450: Practice Exam handle data conflicts when quite a few users update the same data. You thus need to use the best type to replicate the information. This needs to be accomplished with the least amount of development efforts. What should you do? A. You should consider using the LUN Management settings with the SSIS packages. B. You should consider setting up the notebook computers as a subscriber and use merge replication. C. You should consider setting up caching on the shared folder. D. You should consider using folder redirection with the notebook computers. Answer: B

You thus need to determine the appropriate replication type that will meet the requirements. What should you do?

A. You should consider using Transactional replication. B. You should consider using Snapshot replication. C. You should consider using Peer-to-peer replication. D. You should consider using Merge replication. Answer: D Explanation: In this scenario, merge replication would be able to meet the required goal. You use merge replication typically when you need to meet the following requirements: Allow subscribers to modify information in an offline state and then replicate it back to the publisher. A subscriber can also replicate information to other subscribers. Provide data filtering. In data filtering, you can filter different updates to different subscribers at "Pass Any Exam. Any Time." - www.actualtests.com 198

Ac

tua

lTe

You receive the subsequent instructions from the CIO to:Configure replication whereby you are able to send different updates to different subscribers at different locations.Replicate a certain set of information to one subscriber as well as another set to another subscriber.Ensure that subscribers are able to work offline and later synchronize the modifications with the publisher.

sts

You work as a database administrator at CertKiller.com. You are responsible for administering multiple SQL Server 2008 servers that hosts a multiple databases. These databases contain the networks critical information.

.co

QUESTION NO: 211

Microsoft 70-450: Practice Exam different locations. Allow information to be replicated to users who are mobile and are not always connected to the SQL Server. Provide the ability to resolve conflicts that occur during replication. Incorrect Answers: A: You should not use transactional replication. You would typically use this type of replication to propagate incremental changes to from one server to another server immediately. As soon as a change occurs in a database, the data is replicated immediately to its partners. For instance, if there is a row value that changes multiple times, every change will be replicated to its partner. In this type of replication, there are typically fewer subscribers keeping the read-only copy of replicated data. This type of replication does not have the ability to allow subscribers to work offline and then replicate changes when they are back online. This replication also does not have the flexibility to filter data during replication. B: You should not use snapshot replication. This type of replication is used when you need to replicate a large volume of information. This type of replication does not have the ability to allow subscribers to work offline and then replicate changes when they are back online. This replication also does not have the flexibility to filter data during replication. C: You should not use peer-to-peer replication. This type of replication is typically used when you need high availability and scalability. This type of replication does not have the ability to allow subscribers to work offline and then replicate changes when they are back online. This replication also does not have the flexibility to filter data during replication.

QUESTION NO: 212

CertKiller.com has hired you as a database administrator for their network. CertKiller.com has its headquarters in Paris and branch offices in London, Berlin and Milan. All the servers in the environment are configured to run Microsoft SQL Server 2008. You have received instruction from the CIO to configure data replication. You need to make sure that the data replication offers the network high availability and scalability with the minimum of latency. You should thus determine the type of transactional replication that will accomplish this. What should you do? A. You should make use of Peer-to-peer transactional replication. B. You should make use of Standard transactional publication transactional replication. C. You should make use of Merge transactional replication. D. You should make use of Snapshot transactional replication. Answer: A

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

199

Microsoft 70-450: Practice Exam Explanation: This type of replication is based on transaction publication, and typically is used when you need high availability and scalability. Peer-to-peer replication provides redundancy because data is maintained across multiple nodes. Queries and other reads from Web applications can be spread across the multiple nodes. If a node failure occurs, the request is redirected by the application layer to another node. Peer- topeer replication does not have the ability to resolve conflicts during replication updates, but it can detect replication conflicts. You typically require minimal latency for peer-to-peer replication. Incorrect Answers: B: You should not use standard transactional publication. In this type of replication, fewer Subscribers keep the read-only copy of the replicated data. This type of replication is not used for high availability and scalability, as the Subscribers keep read-only data. Therefore, you should not use this replication in this scenario. C: You should not use merge replication in this scenario. Merge replication is not a type of transactional replication. Merge replication has the ability to resolve conflicts that may occur during the replication. You use merge replication typically when you need information to be replicated to users who are mobile and are not always connected to the SQL Server. You can also use this replication when there is a requirement of data filtering. In data filtering, you can filter different updates to different Subscribers at different locations. In merge replication, data is replicated more frequently to the Subscriber and therefore requires high latency. Therefore, in this scenario, this type of replication will not be useful. D: You should not use snapshot replication. Snapshot replication is not a type of transactional replication. This type of replication is used when you need to replicate large volume of information. This type of replication will not be useful in this scenario because you need high availability and scalability with minimal latency. Snapshot replication is very infrequent, which will not provide high availability and scalability because the changes are replicated rarely, and the replicated data may be outdated. Therefore, this replication will not be suitable in this scenario.

QUESTION NO: 213

You work as a database administrator at CertKiller.com. You are responsible for administering numerous Microsoft SQL Server 2008 servers that hosts multiple databases. The databases hold the companies critical information. You have received instruction from the CIO to configure a replication solution for these servers in order to replicate database information to each other. The replication solution should be configured so that the slightest change will trigger instant replication to the replicated copy. What should you do? Which replication strategy should you use in this situation? A. You should consider using Peer-to-Peer Replication. "Pass Any Exam. Any Time." - www.actualtests.com 200

Ac

tua

lTe

sts

.co

Microsoft 70-450: Practice Exam B. You should consider using Merge Replication. C. You should consider using Snapshot Replication. D. You should consider using Transactional Replication. Answer: D Explanation: You would typically use this type of replication when you need to propagate incremental changes to from one server to another server immediately. As soon as a change occurs in a database, the data is replicated to its partners. For instance, if there is a row value that changes multiple times, every change will be replicated to its partner. In this type of replication, there are typically fewer subscribers keeping the read-only copy of replicated data. This type of replication does not have the ability to resolve conflicts during replication updates. Incorrect Answers: A: You should not use peer-to-peer replication. This type of replication is typically used when you need high availability and scalability. This type of replication does not have the ability to replicate all updates to its partners. B: You should not use merge replication. In this type of replication, only the last updated value will be replicated to the partners. In merge replication, subscribers make changes to the data and later synchronize the changes with the publisher. For instance, if there are ten value changes to a field in a row at the subscriber before synchronizing with the publisher, only the tenth value will be replicated, not all ten values. Merge replication has the ability to resolve conflicts that may occur during the replication. You use merge replication typically when you need information to be replicated to users who are mobile and are not always connected to the SQL Server. You should also use this replication when you need the ability to resolve conflicts that occur during replication. C: You should not use snapshot replication. This type of replication is used when you need to replicate a large volume of information. This type of replication does not have the ability to replicate all updates to its partners.

QUESTION NO: 214

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day CertKiller.com implemented an additional server named CERTKILLER-DB02 in a peer-to-peer transactional replication topology. CertKiller.com additionally wants you to add a new node to the peer-to-peer transactional replication whilst ensuring all relevant transactions are replicated to the new node. What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

201

Microsoft 70-450: Practice Exam A. You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: automatic. B. You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: replication support only. C. You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: initialize with backup. D. You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: initialize from Isn. Answer: D

Answer: D

QUESTION NO: 216 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com recently deployed an additional three servers to the network named CERTKILLER-DB02, CERTKILLER-DB03 and CERTKILLER-DB04. CertKiller.com wants you to configure peer-to-peer replication between the servers whilst having conflict detection enabled on the servers. "Pass Any Exam. Any Time." - www.actualtests.com 202

Ac

A. You should consider making use of merge replication. B. You should consider making use of transactional replication. C. You should consider making use of peer-to-peer replication. D. You should consider making use of snapshot replication.

tua

What should you do?

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering multiple database servers hosting multiple databases containing company sensitive data. During the course of the day you receive instruction from CertKiller.com to configure a replication solution for the databases to replicate with each other. CertKiller.com wants to have the information replicated so the smallest change will trigger immediate replication to the replicated copy.

sts

.co

QUESTION NO: 215

Microsoft 70-450: Practice Exam What should you do? A. You should make use of the sp_help_peerconflictdetection stored procedure. B. You should make use of the sp_addpublication stored procedure. C. You should make use of the sp_addsubscriber stored procedure. D. You should make use of the sp_configure_peerconflictdetection stored procedure. Answer: B,D Explanation: Peer-to-peer transactional replication allows you insert, update, or delete data at any node in a topology and have data changes propagated to the other nodes. Because you can change data at any node, data changes at different nodes could conflict with each other. In SQL Server 2008, peer-to-peer replication introduces the option to enable conflict detection across a peer-to-peer topology. This option helps you prevent the issues that are caused by undetected conflicts. When you enable conflict detection, a conflicting change is considered a critical error that causes the Distribution Agent to fail. In the event of a conflict, the topology remains in an inconsistent state until the conflict is resolved and the data is made consistent across the topology. To use conflict detection, all nodes must be running SQL Server 2008 or a later version, and detection must be enabled for all nodes. You can enable and disable detection in Management Studio either by using the Subscription Options page of the Publication Properties dialog box or the Configure Topology page of the Configure Peer-to-Peer Topology Wizard. You can also enable and disable conflict detection by using the sp_addpublication or sp_configure_peerconflictdetection stored procedures.

Incorrect Answer: A: The sp_help_peerconflictdetection stored procedure returns information about the conflict detection settings for a publication that is involved in a peer-to-peer transactional replication topology. C: You cannot use the sp_addsubscriber stored procedure or the sp_help_peerconflictdetection stored procedure because these stored procedures cannot be used to enable conflict detection. The sp_addsubscriber stored procedure is used to add a new subscriber to a publisher, enabling it to receive publications.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

203

You might also like