Microsoft 70-450

70-450 PRO: Designing, Optimizing and Maintaining a Database Administrative Solution Using Microsoft SQL Server 2008

Practice Test
Version 10.0

Microsoft 70-450: Practice Exam QUESTION NO: 1 CertKiller.com has hired you as a database administrator for their network. Your duties include administering the SQL Server 2008 servers. You receive an instruction from the CIO to implement page compression on numerous partitions in order to save space. You need to determine what effect implementing compression will have on the SQL Server components. What should you identify? (Choose all that apply.) A. Restore operations will not be affected by implementing page compression. B. Backup operations will not be affected by implementing page compression. C. Bulk export operations will not be affected by implementing page compression. D. Bulk import operations will not be affected by implementing page compression. E. Existing query plans will not be affected by implementing page compression. F. Log shipping will not be affected by implementing page compression. Answer: A,B,F

QUESTION NO: 2

You work as a database administrator at CertKiller.com. You are responsible for administering a SQL Server 2008 instance. You are currently planning the deployment of a new database. The database will have the subsequent capacity requirements:45 GB for the transaction log file280 GB for the database data file There are approximately six 120 GB disk drives available for the database in the storage array. CertKiller.com contains a RAID controller that supports RAID levels 0, 1, 5 and 10. The disks are on the RAID controller. You receive an instruction from the CIO that is as follows:The transaction log's write performance should be maximized.In the event of a drive failure, it is expected that the "Pass Any Exam. Any Time." - www.actualtests.com 2

Ac

tua

Explanation: Page level or row level compression does not affect backup operations, restore operations, or log shipping operations. These operations simply read the data or write the data to the disk. Reading and writing functions are not affected by page level or row level compression. Incorrect Answers: E: Existing query plans that are used to view data on partitions will be affected by compression. When row compression or data compression is enabled, data will be stored in different numbers of pages and number of rows. The query plans would need to be re-optimized after compression is implemented.

lTe

sts

.co

m

Microsoft 70-450: Practice Exam database and transaction log files is protected. You then decide to plan a storage system. You need to determine the storage configuration that will accomplish this. What should you identify? A. You should consider using a RAID 1 volume as well as a RAID 5 volume. B. You should consider using a RAID 1 volume as well as a RAID 10 volume. C. You should consider using a RAID 3 volume as well as a RAID 5 volume. D. You should consider using a RAID 1 volume as well as a RAID 3 volume. Answer: A

QUESTION NO: 3

You work as a database administrator at CertKiller.com. You are responsible for administering the SQL Server 2008 infrastructure for CertKiller.com. During routine monitoring you discover that the instance experiences a low number of CXPACKET waits as well as a large number of lazy writer waits. To ensure productivity you need to better the performance of the instance. What should you do?

Answer: D

QUESTION NO: 4 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You receive an instruction from management to make sure that your department is prepared in the event of a natural disaster. You thus decide to create a disaster readiness plan. You need to determine the appropriate actions that should be included in your disaster readiness plan.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

A. You should consider setting up the Windows System Monitoring tool to better the performance. B. You should consider setting up the Asynchronous database mirroring to better the performance. C. You should consider using the SQLAGENT.OUT log to better the performance. D. You should consider setting up the software non-uniform memory access (soft-NUMA) to better the performance.

tua

lTe

sts

.co

m

3

Microsoft 70-450: Practice Exam What should you do? (Choose all that apply.) A. You should consider testing and using RAID 5 for the volume that contains the database files. B. You should consider testing and using RAID 1 for the volume that has the operating system. C. You should consider maintaining the system logs in a secure manner. D. You should consider performing the recovery of a database(s) on another SQL server. E. You should consider testing and using RAID 5 for the volume that has the operating system. F. You should consider testing and using RAID 1 for the volume that contains the database files. Answer: C,D Explanation: To ensure disaster readiness, you should maintain system logs in a secure manner and perform recovery of a database on another SQL server. The full set of recommendations for disaster readiness is as follows: Ensure that your personnel are trained in restoring a database or server. Have your staff test the backups and recovery sets. Ensure that the regular database and transaction log backups are performed frequently. Maintain system logs in a secure manner. Keep detailed records of what service packs were installed and when. Keep records of the SQL server configuration. Perform and document the restoration of a server or database to another server. Maintain a base-functionality script that may execute insert, update, and delete statements or a batch of stored procedures to determine if everything is working correctly after a restore.

QUESTION NO: 5

CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01. You are in the process of enabling FILESTREAM on a volume on CERTKILLER-DB01. You have received instruction from the CIO to ensure that the volume store documents in compressed form. You notice that volume F:\ is not formatted. You need to make sure that the volume will be able to store documents in a compressed form. What should you do? A. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:8192 /C command. B. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:8192 command. C. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:4096 command. "Pass Any Exam. Any Time." - www.actualtests.com 4

Ac

tua

lTe

sts

.co

m

C. There are a number of benefits to storing the data on the file system. During the course of the day you receive instruction from CertKiller.Microsoft 70-450: Practice Exam D. you can store it on a compressed or a non-compressed volume. only /A: drive will be formatted as a NTFS volume with a 4096 cluster size but without any compression. You should consider making use of a RAID 0 solution. Answer: D Explanation: This command will format the volume. When the data is stored. This command will also set the NTFS cluster size to 4096. When you are storing the FILESTREAM data.com Ac tua lTe QUESTION NO: 6 sts . CertKiller. you will be able to compress data with the NTFS compression capabilities.co m 5 .actualtests. convert it to NTFS and then label it as BLOBContainer . Any Time.com wants you to make use of the existing resources as funds are tied to other projects. CertKiller.com. The data in FILESTREAM is actually stored on the file system. You should consider making use of a RAID 1 solution.www. You should consider making use of a RAID 5 solution.com wants you to ensure that the I/O performance of CERTKILLER-DB01 is improved whilst ensuring that there is fault tolerance for the database. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. For instance. it is in compressed form and when the data is retrieved.com currently makes use of Microsoft SQL Server 2008 for hosting databases." . B. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:4096 /C command. With the execution of this command. Incorrect Answers: A: The commands format B: The commands format C: The command format F: /FS:NTFS /V:BLOBContainer /A:4096 will not work in this scenario.com to design a RAID solution for the CK_DATA database which has high read/write activity. it is decompressed. What should you do? A. This command does not use the /c switch that is required to enable compression. Finally. It is important to note that the cluster size must be 4096 or smaller for compression to be enabled for a volume. You should consider making use of a RAID 10 solution. the /c parameter will compress the volume. Answer: A Explanation: "Pass Any Exam. D. CertKiller. You work as a database administrator at CertKiller.

actualtests. QUESTION NO: 7 You work as a database administrator at CertKiller. However.com currently makes use of Microsoft SQL Server 2008 for hosting databases. you should have a combination of RAID 1 and RAID 5. this RAID level will not be a suitable solution for CK_DATA database. You should first mirror disks and then create a stripe set of mirrored disks. "Pass Any Exam. Incorrect Answers: B: You should not use RAID 10 in this scenario. CertKiller. which is known as striping with mirroring.Microsoft 70-450: Practice Exam In this scenario. RAID 0 is known as disk striping. B. During the course of the day you receive instruction from CertKiller. The SQL Server files and filegroups should be placed on a RAID 5. C: You should not use RAID 1 in this scenario. but the scenario states that you have financial constraints. This provides high fault tolerance for data and excellent throughput performance. You need a minimum of two disks to form a RAID 1 array. Therefore. Any Time. it is not a suitable solution. You should mirror the operating system using RAID 1.com. This RAID level offers better read performance but slower write performance. You should consider making use of the format E: /A:4096 /V:Data command. CertKiller." . RAID 10 is a better choice than RAID 5. RAID 10 is a combination of RAID 0+1. the data stored on the disk will be lost. offering better throughput on the read/write operations. One primary disk is used for read/write operations and the data is replicated to the second disk.com to change the default size of the allocation unit which is set at 4096 bytes. What should you do? A. RAID 1 is known as disk mirroring. because you get best performance throughput by placing database files on RAID 5 disk array. For an ideal SQL Server configuration.co m . If one disk fails. RAID 5 will provide good performance throughput and prevent data loss if there is a disk failure.com 6 Ac tua lTe sts . you should use RAID 5 for CK_DATA. The transaction log files can be used for rollback and roll forward of information from a SQL Server database. You should consider making use of the format E: /A:4K /V:Data command. there is no data protection offered in this RAID level. This RAID level stripes data across disks in the array. RAID 10 would be more expensive than RAID 5. and therefore RAID 5 will be a better choice when compared to RAID 0 and RAID 1 in terms of data availability and data protection.www. D: You should not use RAID 0 in this scenario. Therefore.com wants you to accomplish the task which having the RAID 5 volume data assigned to Drive E: to retain is existing volume name. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_STAFF which is hosted on a RAID 5 volume. CK_DATA has high read/write activity. SQL Server writes data to the transaction logs and maintains serial information of all modifications that occurred in a SQL database. and place transaction logs on a RAID 1 that is separate from the RAID 1 that hosts the operating system.

You should consider making use of the format E: /A: 64K /V:Data command.com wants to have the databases available even when the operating system (OS) disk fails. QUESTION NO: 8 You work as a database administrator at CertKiller. and /V: is the volume name. To keep the default allocation unit size. The portal is expected to receive large numbers of queries which will require high availability for the data. for instance.co m 7 . D: The format E: /A:65536 /V: Data command will not work. You would be prompted with Invalid parameter -/A:4K error.com Ac tua lTe sts . which is 64 KB in this scenario." . 8192 for 8 KB. 8192 for 8 KB./A:65536 error upon executing this command. you need to format it to ensure that it is usable for storing data. Answer: C Explanation: When you create a RAID 5 volume.Microsoft 70-450: Practice Exam C.www. the allocation unit for a logical unit number (LUN) is 4096 bytes (4 KB) on an NTFS partition. You should consider making use of the format E /A:65536 /V:Data command. CertKiller. you would need to provide the volume letter. you will be able to format the RAID 5 disk with a new allocation unit. You must provide the size of the allocation unit in KB for 16. 32. you should change the allocation unit to 64 KB. Any Time. For allocation unit sized at 16 KB and above. which is 4096 bytes. What should you do? "Pass Any Exam. You would be prompted with Invalid parameter . You must provide the size of the allocation unit in bytes if the allocation unit size is below 16 KB. the /A :size clause defines the allocation unit size.CertKiller.com wants to have the SQL Server 2008 configuration optimized to ensure the database remains intact even when a hard disk fails. D.com wants you to meet the company requirements below: CertKiller. For the value below 16 KB.actualtests. Incorrect Answers: A: The format E: /A:4096 /V:Data command will work in this scenario but will result in retaining the default allocation unit size. By default. such as 16 KB. which is 65536 bytes. B: The format E: /A:4K /V:Data command will not work in this scenario. for instance. When you are storing data with large files on a RAID 5 volume.com. and 64 KB. In this command. When you run execute the command format f: / A : 64K /V: Data.com wants to have the data recovery method to be reliable and provide faster recovery if a hard disk fails whilst ensuring database performance is optimized.com currently makes use of Microsoft SQL Server 2008 for hosting databases. CertKiller. you can simply run the format command without specifying the allocation unit size.CertKiller. which is f: in this case. the value must be written in K. you must write the value in bytes. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA which is used by an online portal for storing data.

Using RAID 1. Answer: A Explanation: You should configure your SQL Server 2008 implementation in the following manner: SQL Server files: RAID 5 Operating System files: RAID 1 Transaction files: RAID 1 To meet varying requirements for response time. you must have the operating system files on RAID 1. but slower write performance than RAID 0. you will mirror the operating system so that even if a disk fails. Incorrect Answers: "Pass Any Exam. and RAID 5 for the SQL Server files and filegroups. and performance. there is no data protection offered in this RAID level. the data stored on the disk will be lost.www. the read performance is degraded. This RAID level offers better read performance and fault tolerance. However. To enhance the performance of SQL databases. These RAID levels are: RAID 5: Known as Striping with Parity. and the data is replicated to the second disk. RAID 1: Known as Disk Mirroring. To meet this goal. D. SQL Server writes data to the transaction logs and maintains serial information of all the modifications that occurred in a SQL database. C. You should consider making use of the same RAID 1 for the operating system and Transaction Logs. you should place the transaction log files on a dedicated RAID 1. If one disk fails. B. You should consider making use of RAID 0 for the operating system and Transaction Logs.Microsoft 70-450: Practice Exam A. This RAID level offers better read/write performance as long as all disks in the RAID 5 are present. RAID 5 stripes data across all disks in the array. offering better throughput on the read/ write operations. and RAID 5 for the SQL Server files and filegroups.com Ac tua lTe sts . the operating system will function. You should consider making use of RAID 1 for the operating system and Transaction Logs. One primary disk is used for read/write operations. The transaction logs should be placed on a separate RAID 1 array. and RAID5 for the SQL Server files and filegroups. Finally. the SQL Server files and filegroups should be placed on a RAID 5 array to achieve the best performance throughput. RAID 1 for the Transaction Logs.co m 8 . You need minimum of two disks to form a RAID 1 array. You should consider making use of RAID 0 for the operating system.actualtests. The parity information is written across all disks in the array. This RAID level stripes the data across disks in the array. The transaction log files can be used for rollback and roll forward operations from a SQL Server database." . Any Time. data reliability. If one disk is missing. RAID 0: Known as Disk Striping. and RAID 5 for the SQL Server files and filegroups. You need minimum of three disks to form a RAID 5 array. you typically use different RAID levels depending on how you are designing the SQL Server deployment. The scenario states that the database must be functional even if a drive fails in the system.

com currently makes use of Microsoft SQL Server 2008 for hosting databases. However. B. CertKiller.com to reconfigure the CK_SALES database for placement on the disk subsystem. You are responsible for administering a "Pass Any Exam. then the transaction log performance is degraded. Any Time.com 9 Ac tua You work as a database administrator at CertKiller. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. QUESTION NO: 9 What should you do? A. D. placing the transaction logs and SQL Server files and filegroups on RAID 1 and RAID 5 is appropriate. it is always recommended that you place transaction logs on a separate RAID 1. which is contrary to the goal stated in the scenario. placing the transaction logs and SQL Server files and filegroups on RAID 1 and RAID 5 is appropriate. the database will no longer be online. You should consider placing the CK_SALES database on the same RAID 1 disk as the operating system. This provides better I/O performance and throughput because the transactions are continuously written to the transaction logs. You should consider placing the CK_SALES database on a separate RAID 0 solution.com. lTe sts .com. Answer: D QUESTION NO: 10 You work as a database administrator at CertKiller. you should place the operating system and transaction logs on separate RAID 1 arrays. D: You should not use this configuration. CertKiller. C: This configuration uses RAID 0 or disk striping for the operating system. If one disk fails in a RAID 0 array.actualtests.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com wants you to place the database on the fastest I/O subsystem whilst ensuring user data is not lost when a disk failure occurs.Microsoft 70-450: Practice Exam B: This configuration uses RAID 0 or disk striping for the operating system. the database will no longer be online. However.www. If there are continuous read/write operations by the operating system on the same RAID 1. which is contrary to the goal stated in the scenario. C. If one disk fails in a RAID 0 array.co m . During the course of the day you receive instruction from CertKiller." . It places the operating system and transaction logs on the same RAID 1 disk array. CertKiller. and places the SQL Server files and filegroups on RAID 5. You should consider placing the CK_SALES database on a separate RAID 5 solution. For an appropriate configuration. You should consider placing the CK_SALES database on the same RAID 0 disk as the operating system. Therefore.

CERTKILLER-DB01 will require 60 GB for the transaction log. C. 1.CERTKILLER-DB01 has 128-GB RAM.com Ac tua You work as a database administrator at CertKiller. CERTKILLER-DB01 hardware configuration is shown below: CERTKILLER-DB01 has eight quad-core processors. lTe sts . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. D.Microsoft 70-450: Practice Exam database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com to deploy a new CK_PRODUCTS database which should meet the capacity requirements set below: CERTKILLER-DB01 will require 175 GB for the database data file. D. You should consider having the Resource Governor configured. B.co m 10 . Any Time. C. You should consider making use of a RAID 1 volume and RAID 5 volume.com.actualtests.www. What should you do? A. You should consider having the software non-uniform memory access (soft-NUMA) configured. You should consider having an increase configured in the maximum degree of parallelism option. You should consider making use of a single RAID 10 volume. During the course of the day you receive instruction from CertKiller. You should consider making use of a RAID 0 volume and RAID 5 volume. CertKiller.com wants you to optimize the performance of CERTKILLER-DB01. Answer: B QUESTION NO: 11 During the course of the day you discover that CERTKILLER-DB01 is experiencing a low number of CXPACKET waits whilst experiencing a large number of lazy writer waits. You should consider making use of a single RAID 5 volume. B.com wants to have the write performance of the transaction log maximized whilst having the database and transaction log protected from drive failure by designing the storage system. You should consider having the Windows System Resource Manager configured." . The CERTKILLER-DB01 storage array has six 200 GB disk drives available for the database which are attached to a RAID controller supporting RAID levels 0. What should you do? A. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. CertKiller. Answer: A "Pass Any Exam. 5 and 10.

if a server has four processors and you want to use only three for parallelism. all databases on CERTKILLER-DB01 will use only two processors.com 11 Ac tua lTe A. This can be accomplished using MAXDOP with the default value. sts .actualtests. you can limit the use of processors by configuring the processor value to a lower number than the actual number of processors installed. Any Time. This can be accomplished using the max degree of parallelism option and setting the value to 4. D. you can use the MAXDOP query hint or index option to provide better control. (7 Questions) QUESTION NO: 12 You are employed as a database administrator at CertKiller. You can use "Pass Any Exam. CERTKILLER-DB01 contains numerous databases which include the databases named CK_PRODUCTS and CK_RESEARCH. The subsequent rules are applied CERTKILLERDB01:Four processors should be used for operations on CK_PRODUCTS. The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint or index option. you want to use four processors for any operations used by CK_PRODUCTS and in any other database. This can be accomplished using the max degree of parallelism option and setting the value to 2." . What should you do? (Choose all that apply) Answer: B. then you should set the max degree of parallelism option to 3. You are responsible for administering a SQL Server 2008 database server named CERTKILLER-DB01 that consists of four processors. exports. When you want to use a specific number of processors for an individual query or index operation. queries or operations on the other databases located on CERTKILLER-DB01. not four as required in the scenario. B. This can be accomplished using MAXDOP in order to set the processor number to two.C Explanation: If you do not want to use all of the installed processors in your SQL Server operations. E.co m .com. This can be accomplished using MAXDOP in order to set the processor number to four.Four processors should be used for all imports. In this scenario.Microsoft 70-450: Practice Exam Explanation: Part 2: Design SQL Server instances. Incorrect Answer: A: If you set the max degree of parallelism option to 2. For instance. C.www. MAXDOP overrides the settings defined in the max degree of parallelism option.Two processors should be used by the CK_App application for queries on the tables in CK_RESEARCH.

www. which by default is set to 0. What should you identify? A." . E: If you use MAXDOP to set the processor number to four.co m . You thus set the Show Advanced Options to 1. In this "Pass Any Exam.Microsoft 70-450: Practice Exam the following script to set CERTKILLER-DB01 to use four processors.com. all four processors will be used by the query. sp_configure 'max degree of parallelism1. GO D: MAXDOP does not have a default value.com currently makes use of Microsoft SQL Server 2008 for hosting databases. It will result in three processors being used. It will result in four processors being used.com 12 Ac tua lTe sts . Answer: C Explanation: When you are using the maximum degree of parallelism. 6. which was already done in the scenario. 0. The default option. C. The max degree of parallelism option has a default value of 0.actualtests. D. CertKiller. If you specify more processors than are installed in the system. GO RECONFIGURE WITH OVERRIDE. GO RECONFIGURE WITH OVERRIDE. QUESTION NO: 13 You are employed as a database administrator at CertKiller. CERTKILLER-DB01 contains two processors. GO You need to determine what the result will be when you execute the code above. It will result in two processors being used. Any Time. uses the actual number of processors installed in the system for the parallel execution plans of queries and index operations. you must first set the Show Advanced Options to 1. You then write the subsequent code: sp_configure 'max degree of parallelism'. It will result in one processor being used. You have received instruction from the CIO to make use of more than one processor for parallelism. You are responsible for administering a database server named CERTKILLER-DB01 hosts five databases. 4. B. which defines the actual number of processors installed in the system for parallel execution of queries and indexes. Any non-zero numeric value indicates the exact number of processors being used. As stated earlier. the use of MAXDOP is limited to the execution of query that contains the MAXDOP query hint or index. then it will use all available processors and not return an error. The number of processors that can be used for all query and index operations is configured with the max degree of parallelism option.

Microsoft 70-450: Practice Exam scenario, the server only has two processors. You configured the max degree of parallelism option to use 6 processors. Since you do not have 6 processors, only two will be used. If you do not want to use all of the installed processors for SQL Server, you can configure the max degree of parallelism option to the value equal to the number of processors you wish to use. For instance, if the server has four processors and you want to use only three for parallelism, you should set the max degree of parallelism option to 3. When you want to use a specific number of processors for an individual query or index operation, you can use the MAXDOP query hint or index option to provide better control over operations than the max degree of parallelism option. MAXDOP overrides the settings defined in the max degree of parallelism option. The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint or index. For instance, if you have a query for which you want to utilize all processors installed in the system, then you can use MAXDOP to override the max degree of parallelism option. SQL Server will use more than one processor, but only use the maximum of 2 processors even though the max degree of parallelism option is set to 6. You cannot three or four processors because the server only has two processors.

QUESTION NO: 14

What should you do?

A. You should consider making use of the sys.dm_os_memory_nodes dynamic management view. B. You should consider making use of the sys.dm_os_sys_info dynamic management view. C. You should consider making use of the sys.dm_os_stacks dynamic management view. D. You should consider making use of the sys.dm_os_process_memory dynamic management view. Answer: B Explanation: This dynamic management view was introduced in SQL Server 2008. The sys.dm_os_sys_info view provides rather simple display of physical and virtual memory available with the operating system. This view also provides information regarding the system resources available and consumed by SQL Server. You can also use the sys.dm_os_sys_memory view to see a detailed view of physical memory and memory-resource notification bits, which provide the state of the "Pass Any Exam. Any Time." - www.actualtests.com 13

Ac

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com requires information about the system resources like the amount of memory available and consumed by CERTKILLER-DB01.

sts

.co

m

Microsoft 70-450: Practice Exam memory resource. The sys.dm_os_sys_memory view displays the memory usage in ten columns. Some of the columns are total_phys . avail_phys ,sys _cache , and sys_hi_signal . Incorrect Answers: A: You should not use the sys.dm_os_memory_nodes view. This view displays information regarding the memory nodes and the amount of physical memory reserved by SQL Server. C: You should not use the sys.dm_os_stacks view. This view keeps track of debug data such as outstanding allocations. D: You should not use the sys.dm_os_process_memory view. This view is used to display memory allocations for the SQL Server process space. For instance, you can use it to track the number of page fault count incurred by the SQL Server process.

QUESTION NO: 15 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to select what the recommended size of the allocation unit should be when your database is expected to have a high number of transactions. What should you do?

Answer: A

Explanation: By default, the allocation unit for a logical unit number (LUN) is 4096 bytes on an NTFS partition. When you are storing data with large files on a RAID 5 volume, you should change the allocation unit to 64 KB, which is 65536 bytes. The format f: / A : 64K /V: Data command will allow you to format the RAID 5 disk with a new allocation unit. In this command, you would need to provide the volume letter, which is f: in this case. The /A :size clause defines the allocation unit size, which is 64 KB in this scenario, and /V: is the volume name. Incorrect Answers: B: 8192 and 32 KB are incorrect because these are not recommended options for storing large databases with high transaction rates. However, if required, you can set the allocation unit to these values. C: The allocation unit size 4096 is the default size assigned to a RAID 5 volume. To be able to change this value, you need to format the volume with a new allocation unit size. "Pass Any Exam. Any Time." - www.actualtests.com 14

Ac

tua

A. You should consider having the allocation unit size 64 K. B. You should consider having the allocation unit size 32 K. C. You should consider having the allocation unit size 4096. D. You should consider having the allocation unit size 8192.

lTe

sts

.co

m

Microsoft 70-450: Practice Exam D: 8192 and 32 KB are incorrect because these are not recommended options for storing large databases with high transaction rates. However, if required, you can set the allocation unit to these values.

QUESTION NO: 16 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 containing four processors with an instance that hosts a database named CK_SALES. During the course of the day CertKiller.com decided to configure the MAX Degree of Parallelism option set to 2. You have later created an index making use of the MAXDOP option and set the number of processors to 3. CertKiller.com wants you to determine what the results would be? A. The current configuration would make use of one processor only. B. The current configuration would make use of two processors by the default setting of Max Degree of Parallelism option overriding the MAXDOP option. C. The current configuration would make use of four processors only. D. The current configuration would make use of three processors only. Answer: D

Explanation: The option stating that three processors will be used for index creation is correct. The number of processors that can be used for all query and index operations are set using the Max Degree of Parallelism option, which by default is set to 0. The default option, 0, uses the actual number of processors installed in the system for parallel execution plans for queries and index operations. When you want to use a specific number of processors for an individual query or index operation, you can use the MAXDOP query hint or index option to provide better control. The MAXDOP query hint overrides the settings defined in the Max Degree of Parallelism option. The use of the MAXDOP query hint is limited to the execution of query that contains the MAXDOP query hint or index option. This query hint can also be used with online index creation, and allows you to restrict the number of processors in the SQL Server 2008 server to be used in the online index creation. During online index creation, the MAXDOP setting overrides the Max Degree of Parallelism option. Incorrect Answers: A: Only one processor will not be used. One processor can be used only under two conditions, either using a MAXDOP value that overrides the Max Degree of Parallelism option, or by setting the Max Degree of Parallelism option to 1 when MAXDOP is not used explicitly used in any of the query or index creatio B: The default setting for the Max Degree of Parallelism option will not override the MAXDOP setting. MAXDOP overrides the default setting of the Max Degree of Parallelism option. Also, the default setting for Max Degree of Parallelism option is 0, not 2 "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

15

Microsoft 70-450: Practice Exam C: The option stating that all four processors will be used for index creation is incorrect. As stated in the scenario. MAXDOP is set to use three processors.

QUESTION NO: 17 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 containing multiple processors and has an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com to create a large volume of indexes and delete older indexes whilst optimizing CPU performance on CERTKILLER-DB01. What should you do? A. You should consider making use of the MAXDOP index option in the index statement. B. You should consider making use of the MAXDOP index option with the ALTER INDEX REORGANIZE statement. C. You should consider setting the Max Degree of Parallelism option to 0. D. You should consider setting the Max Degree of Parallelism option to 1. Answer: A

Explanation: You should use the MAXDOP index option in the index statement to optimize the CPI performance on SQL Server 2008. The number of processors that can be used for all query and index operations is set using the Max Degree of Parallelism option, which by default is set to 0. The default option, 0, uses the actual number of processors installed in the system for parallel execution plans for queries and index operations. When you want to use a specific number of processors for an individual query or index operation, you can use the MAXDOP query hint or index option to provide better control. MAXDOP overrides the settings defined in the Max Degree of Parallelism option. The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint or index option. MAXDOP can also be used with online index creation, and allows you to restrict the number of processors in the SQL Server 2008 server to be used in the online index creation. MAXDOP overrides the Max Degree of Parallelism option with index creation as well. Incorrect Answers: B: You should not set the Max Degree of Parallelism option to 1. When you set the Max Degree of Parallelism option to 1, the parallel plan generation is suppressed. The query execution is no longer executed in parallel, and is executed in serial. You cannot use the MAXDOP index option with the ALTER INDEX REORGANIZE statement. C: You should not set the Max Degree of Parallelism option to 0. This is the default value defined for this setting. With the default value as 0, this option uses the actual number of processors "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

16

com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are currently planning to deploy a new database named CK_Data to the 2008 instance. What should you do? Answer: A QUESTION NO: 19 You work as a database administrator at CertKiller. such as CREATE INDEX. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You have received instructions from the management to set up a physical database structure to optimize the backup performance. During the course of the day you receive an instruction from the CIO to make sure that the online index rebuilds does not utilize all thye CPU cycles that are available. What should you do? "Pass Any Exam.com. and DROP INDEX.com.actualtests. used for clustered indexes. B. Your duties include administrating a SQL Server 2008 instance. which resides on CERTKILLER-DB01.com 17 Ac Explanation: Part 3: Design physical database and object placement. A large amount of read-only reference information will be hosted on one of the schemas. The users at CertKiller. ALTER INDEX REBUILD. CK_Data will have multiple schemas as well as being subjected to regular inserts and updates. C. (15 Questions) tua lTe A. You should consider using the Hyper-V feature on the quad-core servers. You should consider having the max degree of parallelism option configured. QUESTION NO: 18 You work as a database administrator at CertKiller.com use the large mission critical database frequently. and ALTER TABLE DROP CONSTRAINT. sts . You should consider configuring the Background Intelligent Transfer Service (BITS) server extensions. D: You can use the MAXDOP index option with SQL statements. Any Time. D. used for clustered index. ALTER TABLE ADD (index) CONSTRAINT." . CertKiller.Microsoft 70-450: Practice Exam installed in the system for parallel execution plans for queries and index operations. You should consider running the Netsh utility.www.co m . CERTKILLER-DB01 has four quad-core processors and regularly experiences CPU pressure.

This can be accomplished by using multiple filegroups and a single log file to set up the database. Your best option would be to add a new processor to CERTKILLER-DB01. You have received instruction from the CIO to optimize the performance of CK_DATA.co m .com currently makes use of Microsoft SQL Server 2008 for hosting databases. you place the data files and log files on different hard drives dedicated to these files. You notice that the performance of CK_DATA has degraded. C. "Pass Any Exam. B. If you place all of them in the same hard drive. As a recommended practice. This can be accomplished by using the Database Engine Tuning Advisor tool to create the database. During routine monitoring you discover that the hard drive has only 2 GB of free space available. you should separate the database files and transaction log files on different disks. CERTKILLER-DB01 hosts a database named CK_DATA. Answer: A QUESTION NO: 20 You are employed as the database administrator at CertKiller. CK_DATA contains: One primary data fileTwo secondary data filesOne transaction log file. 80 GB system drive with SQL Server installed as well as a single Core2 Duo 1. B. You are responsible for administering a database server named CERTKILLER-DB01. there is going to be a performance bottleneck. you would need to add more hard drives in the system and move the data files and transaction logs on separate new hard drives. As stated in the scenario. What should you do? A. Your best option would be to increase the memory to 2048 MB. you have 2 GB space left in the drive that contains data and log files. To meet the required goal.com 18 Ac tua lTe sts . D.com.6 GHz processor. Your best option would be to compress the hard drive in order to create more space. C. Any Time.Microsoft 70-450: Practice Exam A. This can be accomplished by using caching on the multiple data files." . CERTKILLER-DB01 is configured with 1024 MB of RAM. Answer: B Explanation: It is highly recommended that for better disk I/O usage. D.actualtests. CertKiller. This can be accomplished by using multiple downstream servers to create the database. Your best option would be to add additional hard drives as well as moving the database files across the hard drives. preferably disks attached to different disk controllers.www.

FILESTREAM data must use a datatype of varbinary ( max). You should consider configuring the varchar(max) data using FILESTREAM storage on an NTFS partition. You should consider configuring the varbinary(max) data using FILESTREAM storage on an NTFS partition.com Ac tua lTe A. CertKiller. You should consider configuring the varbinary(max) data that is stored in CK_DATA. QUESTION NO: 21 You work as a database administrator at CertKiller.com. D.co m 19 . The additional tables will BLOBs that is greater than 1 MB. C: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage. Incorrect Answers: A: You should not store BLOBS in the database if the objects are larger than 1 MB and fast read access is important. QUESTION NO: 22 "Pass Any Exam. FILESTREAM data can take advantage of the NTFS file system and disk subsystem for the operating system to maximize read access. You are responsible for administering a database server named CERTKILLER-DB01 hosts a database named CK_DATA. sts . What should you do? Answer: D Explanation: You should use FILESTREAM data when you are storing BLOBs that are on the average larger than 1MB.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You need to maximize the read access. C. Any Time. FILESTREAM should be used if the applications that you are implementing use a middle tier for application logic. You need to determine the data type that needs to be configured for CK_DATA.www. At present the application makes use of a middle tier for application logic. You are in the process of adding additional tables to CK_DATA in order to support the new application. B. The problem is with the hard drive free space. You should consider configuring the varchar(max) data stored in CK_DATA.actualtests." .Microsoft 70-450: Practice Exam Incorrect Answers: D: Adding new processors or increasing memory will not help in this scenario. B: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage. Adding a new processor or more RAM to the server will not resolve the issue stated in the scenario.

the transaction log file is one of the most used files.actualtests. If you place all of them in the same hard drive. What should you do? A. CERTKILLER-DB01 contains two hard drives named Drive B and Drive C. there is going to be a performance bottleneck. the transaction log file is the file that records this activity.com. As a recommended practice. B. It is highly recommended that for better disk I/O usage. preferably disks attached to different disk controllers. Incorrect Answers: A: You should not install a new SQL Server instance on the computer and move the database to the new SQL Server instance. You receive an instruction from the CIO to optimize performance of the database. Microsoft recommends you have the transaction log on a separate drive. As this file writes every change that occurs in the database.com Ac tua lTe sts . you have 2 GB space left in the drive that contains the data and log files. Even the data files should be stored on separate drives. C: You should not move the biggest data file to Drive B and keep the remaining files in the same "Pass Any Exam. Therefore. Any Time. you should have data files and transaction log on separate drives to achieve better performance throughput of the database. In most SQL Server environments. CERTKILLER-DB01 has one transaction log file and three data files that contain large indexes. The data files as well as the transaction files is stored in currently stored on Drive A. You are responsible for a Microsoft SQL Server 2008 server named CERTKILLER-DB01. you should separate the database files and transaction log files on different disks. Answer: B Explanation: When data is written on to a database. This can be accomplished by placing the transaction log file on Drive B and keeping the database files on the same location.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller. Due to budgetary constraints you are unable to add additional hard drives on CERTKILLER-DB01. This change will not make any difference in the performance of the database in this scenario if the database files and the log files are not separated. D." . Drive A also contains the system drive where CERTKILLER-DB01 is installed. As stated in the scenario.co m 20 . as it keeps writing information based on the transactions that were either committed to the database or rolled back. Both these drives have at least 50 GB of free space available. you should place data files and log files on different hard drives dedicated for these files. C. As a recommended practice. This can be accomplished by moving the largest data file from Drive A to Drive B and leaving the remaining files in the same location.www. This can be accomplished by moving the files to Drive B. it needs more processing power than the data files. This can be accomplished by installing a new SQL Server instance on CERTKILLER-DB01. Thereafter the database should be moved to the new SQL Server instance. Installing a second SQL Server instance will actually slow performance because you will have two instances of SQL Server competing for resources on the same computer.

However. Log Cache Hit Ratio. You should not use the SQL Server: SQL Statistics object to monitor the transaction log activities. or move all four files to Drive B. Answer: C Explanation: The SQL Server: Databases object contains counters that help you monitor backup/restore throughput. You should consider making use of the SQL Server: General Statistics object. Log File(s) Size (KB). B. Log Cache Reads/sec.com currently makes use of Microsoft SQL Server 2008 for hosting databases. "Pass Any Exam. As a recommended practice. However.www. C. this object cannot be used for monitoring the transaction log activities. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which is accessed frequently by network users updating the CK_SALES database records for online users. D: You should not move the biggest data file to Drive B and keep the remaining files in the same location on Drive 0. Incorrect Answers: A: You can also view the number of users who either connect or disconnect with the SQL Server instance. this object cannot be used for monitoring transaction log activities. you can capture information on number of current connections to the SQL Server. this object cannot be used for monitoring the transaction log activities.com Ac tua lTe sts A. CertKiller. There are a number of counters used for monitoring log-related activities. You should consider making use of the SQL Server: SQL Statistics object. However. You should not use the SQL Server: General Statistics object to monitor the transaction log activities. You should consider making use of the SQL Server: Databases object. This object contains counters that monitor the performance of the Resource Governor Workload group. QUESTION NO: 23 You work as a database administrator at CertKiller. and Percent Log Used. or move all four files to Drive B. Any Time. You should consider making use of the SQL Server: Workload Group Stats object. Some of these counters are Log Bytes Flushed/sec. B: You should not use the SQL Server: Workload Group Stats object to monitor the transaction log activities. Log Growths. CertKiller. As a recommended practice.co What should you do? m 21 . This object contains counters used for monitoring the compilation and recompilations of user queries sent to an instance of SQL Server. .Microsoft 70-450: Practice Exam location on Drive 0. and bulk copy operations.com wants you to monitor the transaction log activities being performed on CERTKILLER-DB01. D. you should move the transaction log file to a separate hard drive." . transaction log activities.actualtests. Using this object. you should move the transaction log file to a separate hard drive.com.

The Database Engine Tuning Advisor can work with different types of indexes. QUESTION NO: 24 You work as a database administrator at CertKiller. You should consider making use of the sys." .Microsoft 70-450: Practice Exam D: You can also view the number of users who either connect or disconnect with the SQL Server instance. and to resolve unused or potential index issues. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which is used for an online application generating large volumes of transactions on a daily basis including update and insert operations. If you have a performance-related concern. You should consider making use of the sys. the counter of the index in the view is incremented by one. D. The indexes and data can be part of a specific view or a table.com to make use of a number of indexes for update and insert operations whilst optimizing the indexing operations. Incorrect Answers: A: The sys. This function returns the defragmentation of indexes and data. However. This view is also used for tracking unused indexes.com currently makes use of Microsoft SQL Server 2008 for hosting databases. this object cannot be used for monitoring the transaction log activities.dm_db_index_operational_stats view or function. B. Answer: D Explanation: The sys. CertKiller. sts What should you do? .actualtests. you can track when an index was last used.dm_db_index_physical_stats view or function. This object contains counters used for monitoring the compilation and recompilations of user queries sent to an instance of SQL Server.dm_fts_index_population view or function.dm_db_index_physical_stats function is a replacement of the DBCC SHOWCONTIG statement from the previous version of SQL Server. Every time an index is used for an operation such as an update.dm_db_index_usage_stats view or function.www. you can use the Database Engine Tuning Advisor to recommend indexes for a single or multiple databases. This function will "Pass Any Exam. which typically cause maintenance overhead.dm_db_index_usage_stats dynamic management view allows you to track which index is most frequently used for update and insert operations. However. You should not use the SQL Server: SQL Statistics object to monitor the transaction log activities. During the course of the day you receive instruction from CertKiller. C. this object cannot be used for monitoring transaction log activities.co m 22 .com wants you to additionally locate the indexes which are most frequently used for performing the update and insert operations.com. Using this view.com Ac tua lTe A. Any Time. such as clustered or nonclustered . This view also tracks the type of indexes used for update and insert operations. CertKiller. You should consider making use of the sys. You should consider making use of the sys.

actualtests.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Any Time.Disk Drive 2: 40 GB. It is highly recommended that for better disk "Pass Any Exam." . B: The sys. CertKiller. Answer: B Explanation: To meet the required goal. and therefore should not be used. This function will not be able to track indexes that are most frequently used for update and insert operations.dm_fts_index_population view displays only the full-text indexes that are currently in use. and therefore should not be used. CertKiller. C: The sys.www.com 23 Ac tua lTe sts . the transaction log file on Drive3.co m . You should consider having the primary data files placed on Drive 1 and the transaction log file on Drive 2 with the secondary data file on Drive 3. and the secondary data file on Drive4.Microsoft 70-450: Practice Exam not be able to track indexes that are most frequently used for update and insert operations. During the course of the day you added four disk drives to CERTKILLER-DB01 which configuration are shown below: Disk Drive 1: 40 GB. This view will not be able to track indexes that are most frequently used for update and insert operations. You should consider having the primary data files placed on Drive 2 and the transaction log file on Drive 3 with the secondary data file on Drive 4.Disk Drive 3: 60 GB. What should you do? A. B. you should place the primary data files on Drive2. CertKiller.com wants you to optimize the performance of the database. You should consider having the primary and transaction log files placed on Drive 2 and the secondary data file on Drive 3. and therefore should not be used.Disk Drive 4: 60 GB. Formatted and with 35 GB free.com plans on creating an additional database named CK_PRODUCTS which will have a primary data file and secondary data file with one transaction log file which is expected to have high utilization in the production environment. D. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. System drive with SQL Server installed.com. Formatted with 38 GB free. System drive with SQL Server installed.dm_db_index_operational_stats function can be used to obtain details of a partition of a table or about an index. QUESTION NO: 25 You work as a database administrator at CertKiller. You should consider having the primary and secondary data files placed on Drive 2 and the transaction log file on Drive 3. Any full-text index that is not currently being used is not displayed in this view. C.

all data files and transaction logs should be kept on separate drives for better I/O usage of the hard drive. CertKiller. which will provide the best performance throughput.actualtests.com. QUESTION NO: 26 You work as a database administrator at CertKiller.com Ac tua lTe sts . If you place all of them on the same hard drive. You get better throughput of the hard drive when there are fewer I/O operations. As stated in the correct option. As a recommended practice. you should separate database files and transaction log files on different disks. and the secondary data file on Drive 3. You should group similar I/O characteristics on common spindles. There will be high I/O usage of Drivel. You should avoid placing the data files and transaction log files on the same drive as the system drive.www. SQL Server performance depends heavily on the I/O subsystem. As a recommended practice." . you place data files and log files on different hard drives dedicated to these files. C: You should not place the primary and secondary data files on Drive l and the transaction log file on Drive 2.com wants you to implement a sliding window scenario switching partitions into and out of the table whilst archiving the oldest data to improve performance. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller.com is aware of the partitioning functions which horizontally split tables based on the value in a specific column. if possible. preferably disks attached to different disk controllers.co m 24 . you are placing these files on different hard drives. if possible. and is not recommended by Microsoft. You should not have the Windows operating system and SQL Server overload a disk with I/O traffic. the transaction log file on Drive 2. As a recommended practice. CertKiller. both the Windows operating system and the primary data files can be at risk if appropriate backup solutions are not in place. Placing the primary data files on the drive that contains the Windows operating system (Drivel) will cause a performance bottleneck. You get better throughput of the hard drive when there are fewer I/O operations. Also. D: You should not place primary and transaction log files on Drive l and the secondary data file on Drive 2. will be competing with reads and writes for the operating system.com currently makes use of Microsoft SQL Server 2008 for hosting databases. which will degrade database performance. Incorrect Answers: A: You should not place the primary data files on Drive l. such as reads and writes. there is going to be a performance bottleneck. Any Time. in case of disk failure. "Pass Any Exam. Disk operations for SQL Server. all data files and transaction logs should be kept on separate drives for better I/O usage of the hard drive.Microsoft 70-450: Practice Exam I/O usage. During the course of the day you create a partitioned data fact table which is large requiring data to be stored across several disks.

The following partition function creates partitions: CREATE PARTITION FUNCTION AutoPartsRangePFl ( int )AS RANGE LEFT FOR VALUES (1. Incorrect Answers: B: You cannot use the alter table statement with either split range or merge range.actualtests. You should consider making use of the sp_add_jobserver stored procedure to move the two jobs from CERTKILLER-DB01 to CERTKILLER-DB02.com currently makes use of Microsoft SQL Server 2008 for hosting databases. QUESTION NO: 27 You work as a database administrator at CertKiller. B. You should make use of the statement: ALTER TABLE and SPLIT PARTITION. You are responsible for administering a database server named CERTKILLER-DB01 used to test applications and packages and CERTKILLER-DB02 with an instance that hosts a database named CK_SALES.com 25 Ac tua lTe sts . C: You should not use alter partition function and split range." . Any Time. D. 500.co m .www. CertKiller. 1000). You should make use of the statement: ALTER TABLE and MERGE RANGE. Answer: A Explanation: The alter partition function statement can be used to merge or split a partition based on values. In this scenario. What should you do? (Choose two) A.com is aware that the hardware of both servers is similar.com. CertKiller. This would split one partition of a partitioned table into two partitions. you want to combine two partitions of a partitioned table into one partition. During the course of the day you receive instruction from CertKiller. C. B. You should make use of the statement: ALTER PARTITION FUNCTION and MERGE RANGE. "Pass Any Exam. You should make use of the statement: ALTER PARTITION FUNCTION and SPLIT RANGE. split range or merge range can only be used with the alter partition function statement.GO The following function can merge the partitions between boundary values 1 and 500 and between boundary values 500 and 1000 to create a single partition between boundary values 1 and 1000: ALTER PARTITION FUNCTION AutoPartsRangePF1 ( ) MERGE RANGE (500).com to move the maintenance and backup jobs from CERTKILLER-DB01 running SQL Server 2008 Developer edition to CERTKILLER-DB02 running SQL Server 2008 Enterprise Edition. D: You cannot use the alter table statement with either split range or merge range. You should consider making use of the sp_add_jobstep stored procedure to move the two jobs from CERTKILLER-DB01 to CERTKILLER-DB02.Microsoft 70-450: Practice Exam What should you do? A. split range or merge range can only be used with the alter partition function statement.

You should consider making use of the sp_add_job stored procedure to move the two jobs from CERTKILLER-DB01 to CERTKILLER-DB02. GO EXEC dbo. GO Incorrect Answers: B: You should not use sp_add Jobstep to move the two jobs from CERTKILLER-DB01to CERTKILLER-DB02.D Explanation: You should use Script Job as on the two jobs on CERTKILLER-DB01 and run the scripts on CERTKILLER-DB02. Once you have scripted the job.sp _add_jobserver@job_name = N' BackupJobOrders '. D. Any Time. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore the backup on CERTKILLER-DB02. alerts. You can use sp_add jobserver to move the jobs from CERTKILLER-DB01 to CERTKILLERDB02. If you backup the msdb database from one server and restore it on another server. In this scenario. operators or alerts that currently exist on the destination server. This stored procedure cannot be used to move or copy a job to another server. You can highlight the job and choose Script Job as.www. You must have a target server registered to assign a multiserver job to it. The following code assigns the multiserver job Backup Job Orders to CERTKILLER-DB02: USE msdb . You must register CERTKILLER-DB02 as the target server.Microsoft 70-450: Practice Exam C. This stored procedure is used to create a job. C: You should not back up the msdb database on CERTKILLER-DB01and restore it on CERTKILLER-DB02. you will overwrite any jobs. This stored procedure can be used to assign a job to run on a different server. The msdb database stores jobs. you only wanted to copy two jobs to SQL1. E. You can only restore system databases on the same build and same edition of SQL Server.com Ac tua lTe sts . You should consider making use of a Script Job on the two jobs on CERTKILLER-DB01and run the scripts on CERTKILLER-DB02. operators.actualtests." . You can script the job to a file or to the query window for editing. This stored procedure cannot be used to move or copy a job to another server. You would not be able to restore the msdb database on CERTKILLER-DB02because CERTKILLER-DB01and CERTKILLER-DB02have different builds and different editions of SQL Server. and backup history. You can script a current job by using the SQL Server Management Studio (SSMS).@ server_name = N'CERTKILLER-DB02. This stored procedure is used to add a step to a multistep job.co m 26 . Answer: A. you can run the script to create the jobs on CERTKILLER-DB02. In this scenario. E: You should not use sp_addjob to move the two jobs from CERTKILLER-DB01to CERTKILLERDB02. CERTKILLER-DB01 has the two jobs. The job must exist on a source server. "Pass Any Exam.

each database is capable of having as many full-text indexes as the number of tables it contains. Only an indexed view can have a full-text index. You would only be able to create one full-text index per database. C. full-text catalogs must exist.Microsoft 70-450: Practice Exam QUESTION NO: 28 You work as a database administrator at CertKiller.com. B. A full-text catalog can hold multiple full-text indexes. There can be multiple full-text indexes per database because a database can have multiple tables. An indexed view can only be created if it the view is created with the schehabinding option. CertKiller. Only one full-text index can be created per table or indexed view. You can create an indexed view by using the schehabinding option. It is highly recommended that tables and full-text indexes refer to the same full-text catalog." . G. The encryption option hides the source code of the view from being seen. and each table can have maximum of one full-text index.actualtests.www. You would only be able to create multiple full-text indexes per table. You would only be able to create one full-text index per table. You would only be able to create one full-text index per view created with the encryption option. The encryption option hides the source code of "Pass Any Exam. Incorrect Answers: A: You cannot have multiple full-text indexes per view created with the encryption option. F. You can create an indexed view by using the schehabinding option. CertKiller. not the encryption option. You would only be able to create multiple full-text indexes per view created with the schemabinding option.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com wants to know the amount of full-text indexes will be created in the database. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You would only be able to create multiple full-text indexes per view created with the encryption option. you must have a catalog in the database to store the full-text index.G Explanation: For a full-text index. Therefore. Any Time. What should you do? (Choose two) A.com Ac tua lTe sts . E.com to create a full-text index in the database containing multiple tables. Therefore. You would only be able to create one full-text index per view created with the schemabinding option. not the encryption option. D. During the course of the day you receive instruction from CertKiller. B: You cannot have multiple full-text indexes per view created with the encryption option. Only an indexed view can have a full-text index. Answer: F. Full-text indexes cannot be placed anywhere except in full-text catalogs.co m 27 .

www. and multiple full-text indexes per database. it provides quicker response time and enhanced data performance because less data is scanned. not the encryption option. Therefore. For instance.actualtests. The encryption option hides the source code of the view from being seen. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a number of databases. lTe sts .Microsoft 70-450: Practice Exam the view from being seen. Database performance is enhanced because you are accessing only a specific year's data from an individual table when queries are executed. During the course of the day you receive instruction from CertKiller. one full-test index per indexed view. E: You cannot have multiple full-text indexes per view created with the encryption option. You should consider making use of horizontal partitioning. You should consider making use of normalization partitioning. Incorrect Answers: "Pass Any Exam. What should you do? Answer: C Explanation: You should use the horizontal partitioning method to improve database performance. CertKiller.com. if a table contains data from the last ten years.com Ac tua A.com currently makes use of Microsoft SQL Server 2008 for hosting databases. CertKiller. Only an indexed view can have a full-text index. D. one full-test index per indexed view. You can create an indexed view by using the schehabinding option. You should consider making use of hardware partitioning. B.co m 28 . C: There can be only one full-text index per table.com wants you to make use of partitioning to improve the performance whilst also segregate old data from the existing queries to return faster results. Any Time. You should consider making use of vertical partitioning. CertKiller. C. you can horizontally partition the table into 12 tables. and multiple full-text indexes per database. and you frequently access only the current year's data. QUESTION NO: 29 You work as a database administrator at CertKiller. This method allows you to divide a single large table into multiple smaller tables with fewer rows and an equal number of columns.com wants you to have the table split into multiple tables with fewer rows than parent table and equal number of columns spread across tables. Each table in this method would represent data for a specific year.com to increase the performance of the database containing several large tables." . D: There can be only one full-text index per table. Horizontal partitioning allows you to reduce the table data depending on your requirements.

sts . the number of rows is split across multiple tables but the number of columns remains the same.co m . The current subscription would result in the table having the columns and rows unchanged. which execute multiple threads. B: You should not use normalization. D.actualtests. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com 29 Ac tua lTe You work as a database administrator at CertKiller. B. Any Time. CertKiller. This method does not split the database tables to improve performance." . QUESTION NO: 30 What would the result be? A. Two examples of hardware partitioning are multiprocessors. the number of columns is reduced across the tables when a table is split. The current subscription would result in the table having fewer rows and the columns unchanged. you will be able to split the table into fewer rows and the same number of columns. You gain a performance benefit because you will have fewer rows to work with. This method does not achieve this goal. With horizontal partitioning. there should be fewer rows in the tables with an equal number of columns across tables.Microsoft 70-450: Practice Exam A: You should not use hardware partitioning. D: You should not use vertical partitioning. Normalization is used to remove redundant columns from a table. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs. The CK_SALES database currently has more than 11 million rows and twenty columns. but as stated in the scenario.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com. there are more rows and a reduced number of columns across tables. The secondary tables must be linked with the table from which you are removing redundant columns.com wants you to have the data partitioned horizontally for a transformable subscription and know what the results will be when the subscription is received during replication. In this method. CertKiller.www. This method uses hardware architecture to improve database performance. Answer: A Explanation: When you apply horizontal partitioning on a table that contains a large number of rows. This method is an example of vertical partitioning. The removed columns are moved to secondary tables. C. which stripe data across multiple disks that are part of the RAID array. The current subscription would result in the table having the rows unchanged and fewer columns. and RAID devices. In vertical partitioning.com to replicate the data to several subscribers. The current subscription would result in the table having fewer columns and rows. This method also improves database performance. During the course of the day you receive instruction from CertKiller. "Pass Any Exam.

A trace flag can be switched on or off by using the dbcc traceon and dbcc "Pass Any Exam.Microsoft 70-450: Practice Exam As an example. D. However. You should consider making use of the 3226 flag. No successful backup entries are logged.actualtests." . in this type of partitioning. What should you do? Answer: A Explanation: To meet the required goal in the scenario.www. In vertical partitioning. You should consider making use of the 1222 flag.com currently makes use of Microsoft SQL Server 2008 for hosting databases. In vertical partitioning. the columns are divided amongst multiple tables with the same number of rows. Vertical partitioning can be of two types: normalization and row splitting.com. You should consider making use of the 3625 flag. Only failed backup event entries are logged. it has the following effects: Successful backup entries are not added to the SQL Server error logs. you will have the same number of rows but fewer columns.com to fine tune CERTKILLER-DB01 by reducing the size of the backup logs and logs appended with every successful backup operation whilst avoiding entry in the error log when a successful backup is performed. redundant columns are removed from the primary table and moved into secondary tables. fewer columns are retained. When you add this flag. you should set the trace flag 3226.com 30 Ac A. In normalization. The redundant columns are then linked with the primary table using primary or foreign key. Any Time. B. You should ensure that no script is dependent on any successful backup entries that are logged either in the error log or in the System event log. Entries are prohibited from being logged in the System event log. tua lTe sts . QUESTION NO: 31 You work as a database administrator at CertKiller. which means that each row contains a portion of the logical row in the partitioned table. You should consider making use of the 1204 flag. CertKiller. During the course of the day you receive instruction from CertKiller. A trace flag can be either specific to a session or a global trace flag. the number of columns always remains the same across multiple tables.co m . you can split the table into four different tables where each table represents data for a specific quarter for the year. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. C. In row splitting.

The best option is to use the Network Load Balancing for the database. The XML generated by the 1222 trace flag contains the information on the resources and types of locks in a deadlock. Answer: C QUESTION NO: 33 You work as a database administrator at CertKiller. B. CertKiller. sts . but the 1204 does not.com 31 Ac tua CertKiller.com. Both trace flags also return the current command that is affected by the deadlock. You are responsible for administering a database server named CERTKILLER-DB01 with an instance.com wants you to implement a transactional database on CERTKILLER-DB01 which is expected to have high volumes of INSERT. The best option is to use the default. Both trace flags also return the current command that is affected by the deadlock. CERTKILLER-DB01 is configured to host a database named CK_SALES. The only difference between the two is that the 1222 trace flag returns the output in an XML format. C: You should not set the 1204 or 1222 trace flags. The CertKiller. This trace flag reduces the amount of information that is returned in an error message." .CERTKILLER-DB01 has several independent raid volumes. The best option is to use the data collector for the database. CertKiller. What should you do? A.trc file for the database.com CIO wants you to enhance the performance of the database by maximizing bandwidth and reducing the connection in the storage allocation structure.actualtests.com currently makes use of Microsoft SQL Server 2008 for hosting databases. The XML generated by the 1222 trace flag contains the information on the resources and types of locks in a deadlock.com.CERTKILLER-DB01 has four quad-core processors. lTe You work as a database administrator at CertKiller. Incorrect Answers: B: You should not set the trace flag 3625. You are responsible for administering a "Pass Any Exam.co m QUESTION NO: 32 .com currently makes use of Microsoft SQL Server 2008 for hosting databases. The best option is to create numerous data files for the database. UPDATE and DELETE activities. The only difference between the two is that the 1222 trace flag returns the output in an XML format. D: You should not set the 1204 or 1222 trace flags. C. but the 1204 does not.Microsoft 70-450: Practice Exam traceoff commands. D.www. Any Time. The hardware configuration of CERTKILLER-DB01 is shown below: CERTKILLER-DB01 has 64-GB of RAM.

Microsoft 70-450: Practice Exam database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. consolidation. At present the instance makes use of a 32-bit version on a Windows Server 2008 64-bit server. The best option is to use the default. What should you do? A.com is aware that the database will have numerous schemas however. B.com has enabled the awe option. The best option is to use the Merge Replication topology. During the course of the day you receive instruction from CertKiller. The best option is to use the master database to create the database. and upgrade strategy. To comply with the instructions. (6 Questions) m 32 . Answer: A QUESTION NO: 34 You work as a database administrator at CertKiller. you need to the suitable data collector type that will supply you with the necessary data. D. The best option is to use SQL Server registry hive and multiple filegroups to create the database. The best option is to use the Performance Counters collector. C.www. The best option is to use resource database and a single log file to create the database. CertKiller. You have received instructions from the CIO to use the best time to migrate the databases to a 64-bit SQL Server 2008 server without changing the hardware. The best option is to use the Hyper-V feature.trc file. D.actualtests.co Explanation: Part 4: Design a migration. CertKiller. Any Time.com Ac tua lTe sts . You expect the instance to get an increase in the query actions. The best option is to use multiple filegroups and a single log file to create the database.com." . B.com to deploy a new database to CERTKILLER-DB01 which will regularly received inserts and updates. You are responsible for administering a SQL Server 2008 instance. Answer: A "Pass Any Exam. C.com wants you to set up the database structure for best possible backup performance. with one schema having a huge amount of read-only reference data. What should you do? A. CertKiller.

You should consider installing SQL Server 2008 Standard edition. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You check and discover that the performance of CERTKILLER-DB01 has degraded. CPU utilization is increased.co m . You should consider installing SQL Server 2008 Express edition. QUESTION NO: 36 You work as a database administrator at CertKiller.) A. What should you do? (Choose all that apply. you can use the alter table or alter index statements.C Explanation: SQL Server 2008 supports compression at row-level and page-level for both tables and indexes.com 33 Ac tua lTe sts . You should consider installing SQL Server 2008 Enterprise edition.com.com currently makes use of Microsoft SQL Server 2005 (32-bit) Express for hosting databases. You can use the create table and create index statements to create compressed tables and indexes. D. When you configure row and page compression. while I/O utilization and memory utilization are decreased. or partition. "Pass Any Exam." . During routine monitoring you discovered an increase in the amount of queries.com currently makes use of a Microsoft SQL Server 2008 server named CERTKILLER-DB01 that contains a number of databases. index. CertKiller. Incorrect Answers: A: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition because these editions of SQL Server 2008 do not support compression.actualtests. You should also ensure that compression is enabled in the new server. configuring row and page compression can affect the performance of your sever.www. CertKiller. After the installation you will move a number of databases from CERTKILLER-DB01 to the new server. However. During the course of the day you receive instruction from CertKiller. Answer: B. To modify the compression state of an existing table. B. You need to determine the appropriate SQL version that should be installed on the new server. To ensure that a high level of productivity is maintained you decide to install an additional SQL Server 2008 server on the network.com has hired you as a database administrator for their network.com to upgrade CERTKILLER-DB01 to Microsoft SQL Server 2008. You should consider installing SQL Server 2008 Developer edition.Microsoft 70-450: Practice Exam QUESTION NO: 35 CertKiller. Any Time. C. D: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition because these editions of SQL Server 2008 do not support compression.

You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com 34 Ac You work as a database administrator at CertKiller. Answer: B Explanation: In this case.D.com wants to know which SQL Server 2008 edition CERTKILLER-DB01 can be upgraded to from SQL Server 2005 (32-bit) Express? A. you will also need to recreate any existing logins in the three system databases: master. and model. You have successfully detached and reattached the databases from SQL Server 2005 to SQL Server 2008. You can upgrade a server running SQL Server 2005 (32-bit) Standard Edition to SQL Server 2008 Standard Edition. you will have to perform a clean installation. You can upgrade a server running SQL Server 2005 (32-bit) Enterprise Edition to SQL Server 2008 Enterprise Edition. You would be able to upgrade to SQL Server 2008 Workgroup D.com to migrate a database from a 32-bit version of SQL Server 2005 to CERTKILLER-DB01 using SQL Server 2008 64-bit. You should ensure that the databases are published in replication on SQL Server 2005.co m .actualtests.com wants you to ensure that the database will be successfully migrated. or Workgroup.com currently makes use of Microsoft SQL Server 2008 64-bit for hosting databases.www. msdb .Microsoft 70-450: Practice Exam CertKiller.E Explanation: These are the only editions of SQL Server on the supported upgrade path from SQL Server 2005 (32-bit) Express. You should AWE Enabled option set to 1 on CERTKILLER-DB01. tua lTe sts . To be able to migrate databases from a 32-bit version of SQL Server to "Pass Any Exam. If you want to use a version other than SQL Server 2008 Express or SQL Server 2008 Express Advanced. During the course of the day you receive instruction from CertKiller.com. You should consider recreating logins and user objects in the system databases. You would be able to upgrade to SQL Server 2008 Enterprise B." . You cannot upgrade SQL Server 2005 to SQL Server 2008 Standard. C. Any Time. Enterprise . D. You should consider having the Show Advanced Options set to 1 on CERTKILLER-DB01. You would be able to upgrade to SQL Server 2008 Express Advanced E. You would be able to upgrade to SQL Server 2008 Standard C. QUESTION NO: 37 What should you do? A. B. and not an upgrade. You would be able to upgrade to SQL Server 2008 Express Answer: C. CertKiller. CertKiller.

com to install SQL Server 2008 Standard Edition on a new server running Windows Server 2003 64-bit.com.com 35 Ac tua lTe sts . In Windows 2000 Server. If max server memory limit is more than the physical memory. AWE is designed for and supported only on 32bit versions of Windows 2000 Server and Windows Server 2003.www. and model.Microsoft 70-450: Practice Exam a 64-bit version of SQL Server. This option would be used when you are enabling AWE support on a 32-bit system. msdb . all memory except 128 MB is locked. which is not the case in this scenario. these databases must be attached to the 64-bit SQL Server. AWE works differently both on Windows 2000 Server and Windows Server 2003. after which it locks the amount of memory specified in max server memory.actualtests. It is also mandatory to re-create the user logins and user objects in the system databases: master. Any Time. CertKiller. which is the target of the migration in this scenario. QUESTION NO: 38 You work as a database administrator at CertKiller. you must ensure that the databases are not published in replication. CertKiller. SQL Server allows dynamic allocation of AWE mapped memory. The databases from a 32-bit version of SQL Server cannot be restored to a 64-bit version of SQL Server 2008 if they are published in the replication.co m . Incorrect Answers: A: You should not set the AWE Enabled option to 1. and you need to detach the databases from the 32-bit version. you need to ensure that the databases are not published in the replication on SQL Server 2005. but it should not be enabled on a64-bit system.com currently makes use of Microsoft SQL Server 2005 for hosting databases. "Pass Any Exam. You would also enable this option when using parallelism. The databases first must be detached from the source SQL Server and then reattached to the 64-bit SQL Server. D: You should not set the Show Advanced Options to 1. The migration of this type will need to have Microsoft Windows Address Windowing Extensions (AWE) API support enabled on the 64-bit platform to take advantage of existing memory. If they are published. After they are detached. AWE support can only be activated when there is more physical memory than virtual memory. you can allow SQL Server to access the physical memory above the limit that is configured on the virtual memory. AWE mapped memory can be taken or returned to the operating system as and when required by SQL Server C: You should not ensure that the databases were published in replication on SQL Server 2005. In Windows Server 2003. With the help of AWE." . However. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller. You cannot configure AWE support on a 64bit platform.com wants to know which facts below are true about migrating databases to SQL Server 2008 on a 64-bit computer? A.com wants you to migrate the existing databases from CERTKILLER-DB01 to the new server. CertKiller. you will not be able to migrate them to the 64-bit SQL Server.

you can allow SQL Server to access physical memory above the limit configured on the virtual memory. B: You will not need to enable the /3gb parameter in the boot. AWE support can only be activated when there is more physical memory than virtual memory. The operating system holds a directory named SYSWOW64 under the Windows directory. AWE mapped memory can be taken from or returned to the operating system as required by SQL Server.co m . then by default 2 GB each are split between the operating system and the installed applications. Incorrect Answers: A: You cannot configure Microsoft Windows Address Windowing Extensions (AWE) API support on a 64-bit platform. and model.Microsoft 70-450: Practice Exam B. The databases first must be detached from the source SQL Server and then reattached to the 64-bit SQL Server. you will be able to successfully migrate 32-bit SQL Server databases to the 32-bit SQL Server on a 64-bit system because they will be installed to the WOW64 32-bit subsystem.www. you will not be able to migrate them to the 64-bit SQL Server. The migration of this type would be done to the Windows on Windows (WOW64) 32-bit subsystem D.ini file. AWE is supported only on the 32-bit versions of Windows 2000 Server and Windows Server 2003.com. Any Time. AWE works differently on Windows 2000 Server and Windows Server 2003. SQL Server allows the dynamic allocation of AWE mapped memory.com and currently makes use of Microsoft SQL Server 2008 and Microsoft SQL Server 2005 for hosting databases. not a 64-bit system. QUESTION NO: 39 You work as a database administrator at CertKiller. If the max server memory limit is more than the physical memory. you must ensure that the databases are not published in replication. then all memory except 128 MB is locked. This directory holds the 32-bit files that enable a 32-bit application to run on a 64-bit system. With the help of AWE. In Windows 2000 Server. If they are published. after which it locks the amount of memory specified in max server memoiy. The migration of this type would require you to enable the /3gb parameter in the boot. However.com domain is named CertKiller.actualtests. CertKiller." . D: The databases from a 32-bit computer running SQL Server 2008 cannot be restored to a 64-bit computer running SQL Server 2008 if they are published in the replication. In Windows Server 2003. Answer: C Explanation: With WOW64. In this scenario. The migration of this type would have you being able to restore database to a 64-bit version of SQL Server 2008 if published in the replication. 32-bit processes run as if they are running on the 32-bit system. msdb.ini file. You can reduce the amount of memory assigned to the operating system and allocate more memory by using the /3gb parameter in the boot. you will also need to recreate any existing logins in the system databases: master. In this case. this parameter does not affect the migration of databases. C. However.ini file.com 36 Ac tua lTe sts . If you have 4 GB of memory in a system. You are responsible for administering the company's database "Pass Any Exam.

"Pass Any Exam.com.com domain. You should consider having the VIA protocol enabled on the database servers in the CertKiller. .co m CertKiller.com 37 Ac A.Microsoft 70-450: Practice Exam servers.com wants you to ensure that all weyland. You should consider having the named pipes protocol disabled on the database servers in the CertKiller.com domain. The SPN maps to the Windows account associated with the SQL Server instance. Incorrect Answers: A: You should not disable the named pipes protocol.com clients are able to make use of Kerberos authentication when accessing database servers in the CertKiller. and a client and server that are in the same domain or have a trust relationship between different domains.com domain runs a mix of Microsoft SQL Server 2005 and Microsoft SQL Server 2008 database servers.com. as long as the client and SQL Server have the TCP/IP network layer protocol bound to their respective network adapters. B. The SQL Server configuration for the database servers in the CertKiller.com domain are shown in the exhibit below: CertKiller. C. Kerberos authentication in SQL Server 2008 can be used with TCP/IP. What should you do? Answer: C Explanation: The weyland. You should consider having the Service Principal Name (SPN) deactivated for the database servers in the weyland. All servers at Weyland Industries are running Windows Server 2003.com domain and the CertKiller. D. The use of Kerberos authentication with SQL Server requires a Service Principal Name (SPN) registered with Active Directory. You should consider creating a trust relationship between the weyland." .com domain is in a separate forest from CertKiller.com domain. For Kerberos authentication to work between domains in separate forests. a trust must exist between the two domains. named pipes.com domain. or shared memory protocols.com recently partnered with Weyland Industries which has their own Active Directory domain named weyland.actualtests. Any Time. The weyland.com domain.www. tua lTe sts .

that has the following criteria: the SSRS reports should use the Kerberos authentication protocol for communication.co m .com network contains ten of Microsoft SQL servers that run either SQL Server 2008 or SQL Server 2005. B. Answer: A QUESTION NO: 41 CertKiller.com. Enabling or disabling the VIA protocol will not allow a SQL Server to use the Kerberos authentication. The CertKiller.com domain. QUESTION NO: 40 You work as a database administrator at CertKiller. Any Time.www.Microsoft 70-450: Practice Exam The client and SQL Server must have the TCP/IP network layer protocol bound to the network adapter card to use Kerberos authentication with a domain controller in an Active Directory domain. You are responsible for administering a SQL Server 2008 Reporting Services (SSRS) instance. This can be accomplished by configuring Background Intelligent Transfer Service (BITS) settings to make use of the Secure Sockets Layer (SSL) protocol.com has hired you as a database administrator for their network. "Pass Any Exam. For the client to use Kerberos authentication with a SQL Server server in an Active Directory domain. The VIA protocol is used with a Virtual Interface Adapter." . This can be accomplished by accessing the Active Directory directory service and register a service principal name (SPN) the SSRS instance. This can be accomplished by configuring the Roaming user profiles to make use of a domain account. D: You should not deactivate the Service Principal Name (SPN) for the database servers in the weyland. the client must be using the same SQL Server Network Configuration protocol.com 38 Ac tua lTe sts . This can be accomplished by configuring the VPN solution to make use of the Integrated Security type. A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/IP network if both the client and the server are using the same named pipes protocol. C. You must have a trust relationship between the domains to use Kerberos authentication. You should have the SPN registered with Active Directory to use Kerberos authentication. B: You should not enable the VIA protocol.actualtests. You have received instructions from the CIO to set up an authentication method that uses SQL Server data connections for SSRS reports. D. What should you do? A.

You can use Transact-SQL statements or Policy-Based Management policies to administer servers in server groups. the Central Management Server and subordinate servers must be registered by using Windows Authentication.com domain is an Active Directory domain. You need to ensure that the server acting as the Central Management Server is configured to run SQL Server 2008. Any Time.co m 39 . QUESTION NO: 42 You work as a database administrator at CertKiller. D: The option stating that the Central Management Server and subordinate servers must be registered by using SQL Server Authentication is incorrect because Central Management Servers only support Windows Authentication. The Central Management Server uses server groups to maintain connection information for one or more instances of SQL Server. What should you do? (Choose all that apply.) A. on the servers that are members of the server group.www." . The Central Management Server cannot be a member of a group that it maintains. You need to ensure that the Central Management Server as well as the subordinate servers is registered using SQL Server Authentication. C.com. you can create a query to display the resource usage. such as CPU and memory. You can use Central Management Servers to administer multiple servers simultaneously. You can designate only SQL Server 2008 servers as Central Management Servers. All SQL servers on the CertKiller. After you configure a Central Management Server.C Explanation: You must ensure that the server that will act as the Central Management Server must be running SQL Server 2008.com Ac tua lTe sts . D.com network run SQL Servers 2008 and all domain controllers Windows Server 2008.Microsoft 70-450: Practice Exam You receive an instruction from the CIO to configure a Central Management Server in order to administer other SQL servers on the network. B. You need to ensure that the Central Management Server is a member of the Registered Servers group that it maintains. The CertKiller.actualtests. Also. You need to ensure that the Central Management Server as well as the subordinate servers is registered using Windows Authentication. "Pass Any Exam. Incorrect Answers: A: The option stating that the Central Management Server must be a member of the Registered Servers group that it maintains is incorrect. Answer: B. You need to follow the guidelines for creating Central Management Server to accomplish this task.

tua lTe sts .www. CERTKILLER-DB01 is configured as shown in the exhibit: What should you do? A. it contains a workgroup with a SQL Server 2008 server named CERTKILLER-DB01 as well as numerous Windows XP clients.co m .com 40 Ac You receive an instruction from the CIO to incorporate computers from the Courseware Publishers workgroup into the CertKiller." .com users make use of Kerberos authentication in order to communicate with the SQL Server from the Courseware Publishers workgroup.com acquires a rival company named Courseware Publishers.com domain to use Kerberos authentication with the SQL Server from the "Pass Any Exam. You need to ensure that CertKiller.com domain. You should consider having a Service Principal Name (SPN) registered with Active Directory. You should consider disabling the named pipes protocol. The newly acquired company does not have an Active Directory domain. C.actualtests. D. CertKiller. Answer: C Explanation: You must have a Service Principal Name (SPN) registered with Active Directory for the clients of the CertKiller. Due to company growth. Any Time.Microsoft 70-450: Practice Exam You are responsible for administering the SQL servers for the organization. However. You should consider enabling the TCP/IP protocol. B. You should consider enabling the VIA protocol.

The client and SQL Server must be a part of the same domain or in a trusted domain to use Kerberos authentication. Kerberos authentication in SQL Server 2008 can be used with TCP/IP. A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/ IP network if both the client and the server are using the same named pipes protocol. D: You should not disable the named pipes protocol. B: You should not enable the VIA protocol." . In this scenario. Any Time. Once a SPN is registered.Microsoft 70-450: Practice Exam Courseware Publishers workgroup. Active Directory acts as the Key Distribution Center (KDC) in a Windows domain. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. Kerberos authentication can be used with TCP/IP. What should you do? (Choose the correct options from the left and drag them to the right) "Pass Any Exam. CertKiller. named pipes.com to ensure that all client connections to CERTKILLER-DB01 make use of SSL if the clients support SSL encryption. If the SPN registration fails or is not completed.com domain. you must have a Service Principal Name (SPN) registered with Active Directory. QUESTION NO: 43 DRAG DROP You work as a database administrator at CertKiller. and the SPN will map to the Windows account that started the SQL Server instance. During the course of the day you receive instruction from CertKiller. In the scenario. Enabling or disabling the VIA protocol will not allow a SQL server to use the Kerberos authentication.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Incorrect Answers: A: You do not have to enable the TCP/IP protocol. as long as the client and SQL Server have the TCP/IP network layer protocol bound to their respective network adapters. the SQL Server from Courseware Publishers will become part of the CertKiller.com additionally wants clients not supporting SSL encryption to be denied access. Kerberos authentication will not be used because the Windows security layer cannot determine if a Windows account is associated with a particular SQL Server instance. the client must be using the same SQL Server Network Configuration protocol. For the client to use Kerberos authentication with a SQL Server server in an Active Directory domain. The client and SQL Server must have the TCP/IP network layer protocol bound to the network adapter card to use Kerberos authentication with a domain controller in an Active Directory domain. or shared memory protocols.com Ac tua lTe sts . CertKiller.actualtests.www.com. or shared memory protocols. The VIA protocol is used with a Virtual Interface Adapter.co m 41 . named pipes.

You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com wants the application to guarantee the sender of the sales order will have the CK_SALES databse as the intended target since the database is not granted special privileges by the Service Broker service.The application should have the target service protected from receiving messages from the CK_SALES database.www.Microsoft 70-450: Practice Exam Answer: QUESTION NO: 44 You work as a database administrator at CertKiller.The application should have the Service Broker encrypt messages transmitted over the network. What should you do? "Pass Any Exam. CertKiller. CertKiller. During the course of the day you receive instruction from CertKiller.com." . Any Time.com 42 Ac tua lTe sts . CertKiller.com to implement an application that will use the Service Broker service and allows workers to send sales orders to the CK_SALES database.com currently makes use of Microsoft SQL Server 2008 for hosting databases.co m .actualtests.com wants the requirements set below met: The application should have the initiating service protected from sending messages to the CK_SALES database.

co m 43 .www.com to configure CERTKILLER-DB01 to additionally run SQL Server Report Services (SSRS) which will be used by client applications and Web browsers connecting to CERTKILLER-DB01. Windows authentication allows a Windows user account from a computer or domain to log on to a SQL server. Full security would protect the initiating service from sending messages to the Orders database and help protect the target service from receiving messages from the Orders database. but the target service does not need to verify the identity of the initiating service. In this scenario. You should consider making use of Windows authentication. In this scenario. the initiating service should run as a member of the fixed database role public in the Orders database. it is not necessary to protect the target service from receiving messages from the Orders database. D: Mixed Mode authentication allows both a SQL server login and a Windows user account from a computer or domain to be authenticated to SQL Anonymous and full security can work with either Windows authentication or Mixed Mode authentication. C.com Ac tua lTe sts . Incorrect Answers: A: You should not use full security for the Service Broker service. Windows authentication or Mixed Mode authentication can be set on the SQL Server.com is aware that the clients make use of Kerberos authentication and all use third-party Web browsers.com currently makes use of Microsoft SQL Server 2008 for hosting databases. B." .actualtests. D. In this scenario. During the course of the day you receive instruction from CertKiller. C: You cannot set Windows authentication or Mixed Mode authentication on the Service Broker service.Microsoft 70-450: Practice Exam A. Therefore. You should consider making use of Mixed Mode authentication. You should consider making use of Full security.com wants you to increase the security on the network so client applications and Web browsers only use Kerberos authentication to connect to CERTKILLER-DB01. You should consider making use of Anonymous security. Answer: B Explanation: Anonymous security secures the initiating service when it sends messages to an untrusted database. CertKiller. Any Time. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com. Any messages sent from the application over the network to the Orders database will be encrypted when the conversation uses Anonymous security. "Pass Any Exam. Anonymous security would not protect the target service from receiving messages from the Orders database. the application uses the Server Broker service to send messages to the Orders database. the initiating service needs to identify the recipient of the work order. CertKiller. CertKiller. QUESTION NO: 45 You work as a database administrator at CertKiller.

You should consider having the AuthenticationTypes set to SWindowsNTLM in the RSReportServer. QUESTION NO: 46 You work as a database administrator at CertKiller.config file is also no longer used in SQL Server 2008. You should consider having the AuthenticationTypes set to RSWindowsKerberos in the RSReportServer. Any Time. In the RSReportServer. you have the option to set the following AuthenticationTypes settings: RSWindowsNegotiate -Allows both Kerberos and NTLM authentication. the Report Server service is configured to run under a domain user account. CertKiller.config file. B: You should not make any changes in the RSWebApplication. CertKiller." . In this scenario.config file D.com currently makes use of Microsoft SQL Server 2008 for hosting databases.The RSWebApplication.config file.Used if you have applications cannot use Kerberos authentication. an error can occur if an application is configured to use Kerberos only. The configuration settings in the RSWebApplication.config file B. RSWindowsNTLM .com wants "Pass Any Exam. You should consider having the AuthenticationTypes set to RSWindowsNegotiate in the RSWebApplication.config file that were used in previous versions of SQL Server have been moved to the RSReportServer. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.com.co m . Answer: D Explanation: You should configure the AuthenticationTypes setting to RSWindowsKerberos in the RSReportServer. The configuration settings in the RSWebApplication. The RSWebApplication.config file is no longer used in SQL Server 2008. RSWindowsKerberos . and the Service Principal Name (SPN) is not registered.config file to ensure that all client applications and third-party Web browsers use Kerberos authentication.config file.www.com to administer the newly installed instance of SQL Server 2008 Reporting Services (SSRS).config file C.Used if you have applications that only use Kerberos authentication.actualtests. You should consider having the AuthenticationTypes set to RSWindowsKerberos in the RSWebApplication.config file.Microsoft 70-450: Practice Exam What should you do? A.com 44 Ac tua lTe sts . C: RSWindowsNTLM is used if you have applications cannot use Kerberos authentication. you should have AuthenticationTypes set to RSWindowsKerberos to avoid this error.config file that were used in previous versions of SQL Server have been moved to the RSReportServer.config file. Incorrect Answers: A: If you choose RSWindowsNegotiate.

The CertKiller. and other operating system clients can connect to SQL Server 2008 by creating a "Pass Any Exam. Mixed Mode is used to provide backward compatibility for legacy clients.actualtests. You should consider making use of Windows Authentication Mode with NWLink network library.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You should consider having the default Web site on the new instance configured to use the Integrated Security type. UNIX.co m . In this scenario." . D. C.Microsoft 70-450: Practice Exam you to plan and design an authentication method for SSRS reports which make use of SQL Server data connections. Linux. Answer: D Explanation: Users who have accounts in the Windows domain or Active Directory can be authenticated with Kerberos authentication or NTLM authentication with Windows Authentication. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. Answer: B QUESTION NO: 47 What should you do? A.com network currently has Novell NetWare clients which require access to CERTKILLER-DB01. You should consider having a service principal name (SPN) registered in the Active Directory directory service for the new SSRS instance. You should consider having the application pool configured used by the default Web site to use a domain account. You should consider having the default Web site on the new instance configured to use the Secure Sockets Layer (SSL) protocol. B. You should consider making use of Windows Authentication Mode with named pipes network library. During the course of the day you receive instruction from CertKiller.com. You should consider making use of Mixed mode authentication.com wants you to ensure that all SSRS reports communicate to the new instance by using the Kerberos authentication protocol. You should consider making use of Windows Authentication Mode with TCP/IP network library. not Windows clients. Novell NetWare clients will be authenticating to the SQL server. called SQL logins. CertKiller. D. Any Time. C. sts . Users who have accounts created only on the SQL server. What should you do? A. can also be authenticated.com 45 Ac tua lTe You work as a database administrator at CertKiller. B. CertKiller.com to configure CERTKILLER-DB01 to allow legacy clients to connect to CERTKILLER-DB01. Novell Netware.www.

but Novell Netware clients. UNIX. Linux. Windows Authentication mode validates a Microsoft Windows user account. and other operating system clients connect to SQL Server 2008 by creating a native SQL login that cannot be used in Active Directory domains. the clients that will be authenticating to the SQL Server are not Windows clients. Any Time. Part 2: Design instance-level security configurations (12 Questions) C: You should not configure Windows Authentication Mode on the SQL Server 2008 server." . SQL Server 2008 no longer supports the NWLINK network library or SQL Server Network Configuration protocol. such as shared protocol or TCP/IP. Previous versions of SQL Server. the client can connect with a valid SQL Server login account. In this scenario. In this scenario. Linux. Novell Netware. did support the NWLINK network library. Linux. It does not matter whether the NetWare client and the SQL Server attempt to use Windows Authentication with the same network library or SQL Server Network Configuration protocol. a NetWare client that has TCP/IP bound to its network adapter and is running the shared protocol network library or SQL Server Network Configuration protocol can connect to a SQL server that has TCP/IP bound to its network adapter and is running the shared protocol network library or SQL Server Network Configuration protocol. Novell Netware. Previous versions of SQL Server. such as shared protocol or TCP/IP. In this scenario. such as SQL Server 2000. such as shared protocol or TCP/IP. Windows Authentication mode validates a Microsoft Windows user account. but Novell Netware clients.www. It does not matter whether the NetWare client and the SQL Server attempt to use Windows Authentication with the same network library or SQL Server Network Configuration protocol. Part 2: Design instance-level security configurations (12 Questions) B: You should not configure Windows Authentication Mode on the SQL Server 2008 server. UNIX. such as SQL Server 2000. and other operating system clients connect to SQL Server 2008 by creating a native SQL login that cannot be used in Active Directory domains. The SQL login is native only to the SQL server on which it is created. The authentication will fail because the NetWare client will not use a Windows account to connect to the SQL Server.com Ac tua lTe sts . Novell Netware. and cannot be used in Active Directory domains.Microsoft 70-450: Practice Exam SQL login for the users that need to connect. the clients that will be authenticating to the SQL Server are not Windows clients. the clients that will be authenticating to the SQL Server are not Windows clients. did support the NWLINK network library. SQL Server 2008 no longer supports the NWLINK network "Pass Any Exam. The authentication will fail because the NetWare client will not use a Windows account to connect to the SQL Server. Incorrect Answers: A: You should not configure Windows Authentication Mode on the SQL Server 2008 server. For example. UNIX.actualtests. The authentication will fail because the NetWare client will not use a Windows account to connect to the SQL Server. but Novell Netware clients. and other operating system clients connect to SQL Server 2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not matter whether the NetWare client and the SQL Server attempt to use Windows Authentication with the same network library or SQL Server Network Configuration protocol. Windows Authentication mode validates a Microsoft Windows user account.co m 46 . SQL Server 2008 no longer supports the NWLINK network library or SQL Server Network Configuration protocol. If the client has the same network layer protocol bound to its network adapter as the SQL server and is running the same network library or SQL Server Network Configuration protocol.

You are responsible for administering a SQL Server 2008 infrastructure. Furthermore the CIO wants it to done with the least amount of effort.com. During routine monitoring you discover that the certificate server has failed in the test environment. B. You have received instruction from the CIO to create an assembly that needs access to the file system as well as the registry. You should make use of the ExecuteWQL function in order to define policies based on conditions.com.www. the CIO wants the implementation to have the following criteria: A central system should do the implementation and it should verify hardware configurations for numerous servers.Microsoft 70-450: Practice Exam library or SQL Server Network Configuration protocol. such as SQL Server 2000. did support the NWLINK network library. You are in the process of installing a SQL Server 2008 server in a testing environment. Previous versions of SQL Server. sts ." . You should make use of the Windows System Resource Manager (WSRM) feature. Part 2: Design instance-level security configurations (12 Questions) QUESTION NO: 48 You work as a database administrator at CertKiller.com Ac QUESTION NO: 49 tua lTe A.dll'WITH PERMISSION_SET = EXTERNAL_ACCESS Which should you do? "Pass Any Exam. What should you do? Answer: A You are the newly appointed database administrator at CertKiller. D. Any Time.co m 47 . You receive an instruction from management to implement a solution to obtain hardware configurations regarding the amount of processors on a workstation as well as the type of processors on the SQL Server 2008 servers. However. C. You should make use of the Group Policy Management Console. You decide to register the assembly in a database named CK_RESEARCH with the subsequent code: CREATE ASSEMBLY CKAssembly FROM 'C:\CKApp\CKAssembly. You should make use of the Delegation of Control Wizard.actualtests.

co m . You can use the alter database Sales set trustworthy on statement to ensure the success of the with PERMISSION_SET = EXTERNAL_ACCESS Statement. C. the certificate server has failed. D. sts . Any Time. Classes within an assembly associated "Pass Any Exam. C.www. You should consider using the ALTER DATABASE CK_RESEARCH SET COMPATIBILITY_LEVEL = 80 statement. you should have the assembly strong name signed or Authenticode signed with a certificate. This can be accomplished by ensuring that the assembly code is not type-safe. You should consider using the ALTER DATABASE CK_RESEARCH SET TRUSTWORTHY OFF statement.actualtests. B. QUESTION NO: 50 What should you do? A. You should also ensure that information is accessed from the local SQL Server databases. You should consider using the ALTER DATABASE CK_RESEARCH SET TRUSTWORTHY ON statement. You should consider using the ALTER DATABASE CK_RESEARCH SET COMPATIBILITY_LEVEL = 90 statement. This can be accomplished by excluding the finalizer methods from the classes in the assembly.Microsoft 70-450: Practice Exam A.com has hired you as a database administrator for their network. Answer: A Explanation: The classes in the assembly cannot contain finalizer methods. In this scenario. This can be accomplished by using the SQL Server Configuration Manager in order to register the assembly in CERTKILLER-DB01. which may prevent the assembly from being signed by a certificate. Answer: C Explanation: To create an assembly with either external_access or unsafe permissions. You thus need to determine the best way to configure the assembly. You receive an instruction from the CIO to ensure that the assembly is created with safe permissions. Your duties include administrating a SQL Server 2008 database server named CERTKILLER-DB01. or you should have the database configured with the set trustworthy on statement.com 48 Ac tua You are in the process of adding an assembly to CERTKILLER-DB01." . A finalizer method is a method that runs when an object of a class is removed from memory. This can be accomplished by ensuring that static data members are marked as read-write in the classes of the assembly. B. lTe CertKiller. D.

You should use the regasm. You should consider configuring the SAFE permission set. the external network. C. QUESTION NO: 51 You have received instruction from the CIO to ensure that the assembly is able to access environmental variables as well as the registry. Incorrect Answers: B: You should not use the SQL Server Configuration Manager to register the assembly in SQL Server. CertKiller. ." . A type-safe assembly can only access classes at specifically defined entry points. What should you do? A. because the SQL Server runtime handles finalization. but even if the assembly was created with external_access permissions. Answer: C Explanation: The EXTERNAL_ access permission set allows the assembly to access the registry and environmental variables. You thus need to configure the appropriate permission set should will accomplish this. The assembly includes the subsequent features:The classes should not contain finalizer methods.www.com Ac tua lTe You are in the process of adding an assembly to CERTKILLER-DB01. the assembly can only contain static data members in its classes if they are marked as read-only. B.co m 49 .exe to register the assembly in SQL Server.Microsoft 70-450: Practice Exam with SQL Server 2008 do not need finalizer methods. D.actualtests. You should consider configuring the DEFAULT permission set. sts You work as a database administrator at CertKiller.The static data members are marked as read-only. You are assigned a database server named CERTKILLER-DB01. When the common language runtime verifier is run against the assembly. Any Time. D: The assembly code should be type-safe. You should consider configuring the EXTERNAL_ACCESS permission set. C: The assembly should only contain static data members in its classes if they are marked as read-only. "Pass Any Exam. and Web services.com currently makes use of Microsoft SQL Server 2008 for hosting databases.The code should be type safe. and it can only access memory buffers that are owned by the code. the assembly code is considered type-safe. The assembly in this scenario is created with safe permissions. You should consider configuring the UNSAFE permission set.com. not if they are marked as read-write. along with external system resources such as the file system.

You can also use the Services snap-in to change the SQL Server startup account. the assembly code should be type-safe.co m You work as a database administrator at CertKiller. B. Your best option would be to make use of the SQL Server Installation Center utility. Without restarting. B: You should not set the permission set on the assembly to safe. "Pass Any Exam. . The assembly cannot access external resources such as the registry and environment variables if the safe permission set is configured on the assembly. the older startup account remains tied to the SQL Server services. network protocols. You can invoke the SQL Server Configuration Manager form Start > All Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL Server Configuration Manager. There is no permission set for an assembly called default QUESTION NO: 52 What should you use? Answer: A Explanation: You should use the SQL Server Configuration Manager to change the startup account.com Ac tua A. You have to make sure that the configuration of the SQL Server will remain intact when changes are made to the startup account. and network configuration on SQL Server 2008. Your best option would be to make use of the Add or Remove Programs utility. SQL Server Configuration Manager is used for configuring services.com. An assembly that has unsafe as the permission set is considered type -unsafe. Using SQL Server Configuration Manger is the most appropriate method of changing the startup account. Assemblies considered type-unsafe can potentially access memory buffers in the SQL Server that are not owned by the code of the assembly.actualtests. Any Time. Your best option would be to make use of the Service Control Manager utility." . If you change the startup account. 50 . After you restart the services. The startup account is used for running the SQL Server services. This is the default permission set for an assembly. D: You should not set the permission set on the assembly to DEFAULT. the services must be restarted. You thus need to determine the utility that you need to use to accomplish this. D. In the scenario. Your best option would be to make use of the SQL Server Configuration Manager utility. lTe sts You receive an instruction from the CIO to change the startup account for SQL Server. the new account becomes active to run the SQL Server services.www.Microsoft 70-450: Practice Exam Incorrect Answers: A: You should not set the permission set on the assembly to unsafe. You are responsible for a administering a SQL Server 2008 failover cluster. C.

B." . QUESTION NO: 53 You work as a database administrator at CertKiller. The Max Degree of Parallelism will not restrict a user account's simultaneous logins. Any Time. This snap-in is used to view the hardware and software requirements for SQL Server 2008.actualtests. Incorrect Answers: A: You cannot configure the SQLUser account properties on the CertKiller.com policy states that login attempts to CERTKILLER-DB01 to be denied You want to deny login attempts to CERTKILLER-DB01 using the SQLUser account if four user sessions created by that login are currently running. view the security documentation. but not how many times a user account can be authenticated in the domain.Microsoft 70-450: Practice Exam Incorrect Answers: B: You should not use Add or Remove Programs to change the startup account for SQL Server.com domain to allow no more than four simultaneous logins You can limit which computers a domain account can log on to. A new CertKiller. You should consider limiting the SQLUser account properties in order to permit a maximum of four simultaneous logins on the CertKiller. Answer: B Explanation: Logon triggers are used to audit and control server sessions. tua lTe sts What should you do? .com 51 Ac A. "Pass Any Exam.com.com domain. Add or Remove Programs is used to install software. C: You should not set the Max Degree of Parallelism to 3 on CERTKILLER-DB01 for the SQLUser account. CertKiller. and add features. You should consider creating a logon trigger that will limit the SQLUser account to four simultaneous logins. You should consider limiting the SQLUser account properties in order to only permit four simultaneous logins on CERTKILLER-DB01. You are responsible for administering a database server named CERTKILLER-DB01 that is a member of the CertKiller. The Max Degree of Parallelism setting restricts the number of processors to use in parallel plan execution.www.com domain.com clients connect to CERTKILLER-DB01 using the SQLUser account. D: You should not use the SQL Server Installation Center. C. not to configure them. D.co m .com currently makes use of Microsoft SQL Server 2008 for hosting databases. A number of CertKiller. You can track login activity and restrict logins to SQL Server. You should consider setting the Max Degree of Parallelism to 3 for the SQLUser account on CERTKILLER-DB01.

actualtests. You are responsible for administering a database server named CERTKILLER-DB01 hosts a database named CK_PRODUCTS. PAGE_VERIFY CHECKSUM command. the database is not initially trusted and cannot access resources beyond the scope of the database. Incorrect Answers: A: You should not run either the alter database Sales set recovery full.com.www. The recovery full option provides full recovery after a media failure with transaction log backups. You detach CK_PRODUCTS for maintenance purposes. PAGE_VERIFY TORN_PAGE_DETECTION Statement to configure the Sales database." . You then decide to attach CK_PRODUCTS and grant the database the necessary permission to access resources beyond the scope of the database. You cannot use this option to have the database to access resources beyond the scope of the database. If you explicitly mark the database trustworthy. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY FULL. torn_page_detection is used to detect pages that have incomplete writes of the page.com currently makes use of Microsoft SQL Server 2008. sts . then you can access resources beyond the scope of the database.com Ac tua lTe A. There is no option to limit the number of account sessions on a SQL Server login account. The page_verify option is used to discover damaged database pages. C. What should you do? Answer: D Explanation: When a database is attached to a SQL Server. page_verify checksum statement or the ALTER DATABASE Sales SET RECOVERY FULL. B. You can set this option to checksum or torn_page_detection. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY OFF command. Neither checksum nor torn_page_detection can be used by a database to access resources beyond the scope of the database once it has been reattached to a "Pass Any Exam. You need to find a way to accomplish this. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY ON command. PAGE VERIFY TORN PAGE DETECTION command.co m 52 .Microsoft 70-450: Practice Exam D: You cannot configure the SQLUser account properties on CERTKILLER-DB01 to allow no more than four simultaneous logins. checksum calculates a checksum and compares the checksum when the data is written to the disk. CertKiller. Any Time. QUESTION NO: 54 You work as a database administrator at CertKiller. D. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY FULL.

com wants you to ensure that Rory Allen is part of a fixed server role which allows him to accomplish the task. D. The recovery full option provides full recovery after a media failure with transaction log backups. B: You should not run alter database CK_PRODUCTS set trustworthy off to configure the Sales database. Neither checksum nor torn_page_detection can be used by a database to access resources beyond the scope of the database once it has been reattached to a SQL Server. PAGE_VERIFY TORN_PAGE_DETECTION Statement to configure the Sales database. The CertKiller. You should consider making use of the Sysadmin fixed server role.com to assign a use named Rory Allen to add or remote linked servers. If a user "Pass Any Exam. C.com 53 Ac tua You work as a database administrator at CertKiller. You can set this option to checksum or torn_page_detection.com. Without having this role assigned. C: You should not run either the alter database Sales set recovery full. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. This statement marks the database as untrustworthy. page_verify checksum statement or the ALTER DATABASE Sales SET RECOVERY FULL. torn_page_detection is used to detect pages that have incomplete writes of the page.com network users make use of login accounts created in Active Directory. You should consider making use of the Serveradmin fixed server role. Some of the stored procedures are sp_addlinkedserver . If you attached a database to a SQL Server. sp_addlirikedsrvlogin . You should consider making use of the DBCreator fixed server role. You should consider making use of the Setupadmin fixed server role. The page_verify option is used to discover damaged database pages. it would be marked untrustworthy. Answer: A Explanation: A user with the Setupadmin role will be able to add or remove linked servers. CertKiller. you must have the database marked trustworthy to access resources beyond the scope of the database.co m . a user will not be able to add or remove linked servers.com currently makes use of Microsoft SQL Server 2008 for hosting databases. A user who is part of this role can also execute stored procedures that relate to the linked servers. B.Microsoft 70-450: Practice Exam SQL Server. In this scenario.www. CertKiller. lTe sts . checksum calculates a checksum and compares the checksum when the data is written to the disk." . and sp_droplinkedsrvlogin . This is the default setting for a database. QUESTION NO: 55 What should you do? A. Any Time.actualtests. You cannot use this option to have the database to access resources beyond the scope of the database. During the course of the day you receive instruction from CertKiller.

server_permissions .com 54 Ac A.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com has several developers who have created different objects in the CK_SALES database. he will have higher privileges than required for this scenario. Any Time. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com wants you to retrieve the information for every permission or column-exception permission in the CK_SALES database. such as creating or restoring a database on the SQL Server. In this scenario.www. Incorrect Answers: B: You should not use sp_table_privileges.Microsoft 70-450: Practice Exam is part of the role that has higher privileges than the Setupadmin role. you will not be able to use this stored procedure to find what "Pass Any Exam. This role also allows a user to gain the privilege of shutting down the server. D: You should not add Rory Allen to the Serveradmin role because a user with Serveradmin role can perform server configuration related tasks on the server. CertKiller. Incorrect Answers: B: You should not add Rory Allen to the Dbcreator role because a user with Dbcreator role can perform database related tasks on the server." . You should consider making use of the sys. This stored procedure returns a list of table permissions for a particular table. You should consider making use of the sp_table_privileges stored procedure.co m . CertKiller. CertKiller.server_permissions stored procedure. D. This role does not allow a user to add or remove a linked server. You should not use sys.com.actualtests. C. B. tua lTe You work as a database administrator at CertKiller. C: You should not add Rory Allen to the Sysadmin role because even though he will be able to add or remove linked servers. the user will still be able to add or remove linked servers. sts . You are currently unsure of the permissions which were granted to different users and roles. You should consider making use of the sys. The Sysadmin role has complete authority on the SQL Server. A user with the Sysadmin role assigned can perform any task on the server. This security catalog view can be used to view server-level permissions. QUESTION NO: 56 What should you do? Answer: D Explanation: You can use this security catalog view to audit every permission or column-exception permission in the Sales database.database_permissions stored procedure. While you can use this stored procedure to find what permissions are given to a table. you need to view database level permissions. You should consider making use of the sp_helprotect stored procedure.

database_permissions and fn_builtin_permissions instead of using sp_helprotect.dm_os_waiting_tasks view to track the client login time. sys.dm_exec_sessions view to track the client login time. such as the session ID to which the request is related. login name. This view allows you to track user connections with such detailed information as the host name.dm_os_waiting_tasks can be used together to detect deadlocks and performance bottlenecks. You should consider making use of the sys.dm_os_schedulers view to track the client login time. login user name. QUESTION NO: 57 You work as a database administrator at CertKiller. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases.co What should you do? m 55 . D: You should not use the sys. Incorrect Answers: B: You should not use the sys.dm_os_waiting_tasks dynamic management view. B. The tasks held in the queue are typically waiting for resources to be allocated.Microsoft 70-450: Practice Exam permissions are given to other objects. The sys. You should consider making use of the sys. C: You should not use sp_helprotect.www. This view is used to track the tasks held in the queue. and the status of the session for a specific user.dm_os_schedulers dynamic management view. C: You should not use the sys. D. this stored procedure will not return information about objects that were introduced in SQL Server 2005. All three views are part of the Server Activity collection set.actualtests. the protocol used by the client to connect to the SQL. and the status of the session. You should consider making use of the sys. such as stored procedures and user-defined functions. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com. CertKiller. login user name.dm_exec_requests dynamic management view. Microsoft recommends that you use sys. This view details out information related to requests. Answer: A Explanation: You should use the sys. You should consider making use of the sys. Any Time. login user name. Windows security ID. and the status of the request. and the status of the session for a specific user. the start time of the request.dm_exec_re quests view to track the client login time. However. and the status of the session for a specific user. login user name. host process ID." .com has recently begun suffering resource problems in the CK_SALES database. C. user name and the status of the session for a specific user. This stored procedure will return information on user permissions for an object in a database.com Ac tua lTe sts A.dm_exec_sessions dynamic management view. CertKiller.dm_exec_requests and sys. and the status of the session for a specific user.com wants you to track the client login time.dm_exec_sessions . . This view is mainly used to view the status "Pass Any Exam.

You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. the assembly code should be type-safe. C.com wants you to configure the permission set on the assembly. The external_access permission set allows the assembly to access the registry and environmental variables. In the scenario. The assembly cannot access external resources. You should consider having the SAFE permission set. Any Time. B: You should not set the permission set on the assembly to default. if any. In this scenario. along with external system resources such as the file system. QUESTION NO: 58 You work as a database administrator at CertKiller. The safe permission set does allow the assembly to access data from the local SQL Server database.co m 56 . the external network. An assembly that has unsafe as the permission set is considered to be type-unsafe. You should consider having the DEFAULT permission set. You should consider having the EXTERNAL_ACCESS permission set. "Pass Any Exam.CertKiller. the assembly should not access any external resources.Microsoft 70-450: Practice Exam of a scheduler and to track runaway tasks.com. You should consider having the UNSAFE permission set.The added assembly code should be type safe CertKiller. such as the registry and environment variables. sts .com Ac tua lTe A. During the course of the day you receive instruction from CertKiller. Assemblies considered to be type-unsafe can potentially access memory buffers in the SQL Server that are not owned by the code of the assembly. B. Incorrect Answers: A: You should not set the permission set on the assembly to unsafe. D. What should you do? Answer: C Explanation: This is the default permission set for an assembly. There is no permission set for an assembly called default D: You should not set the permission set on the assembly to external_access.com is aware that the assembly needs access to data from the local CERTKILLERDB01 databases and no other external resources. CertKiller.com to add an assembly to CERTKILLER-DB01 which has the characteristics listed below: The added assembly contains static data members which are marked as read-only. if the safe permission set is configured on the assembly.com currently makes use of Microsoft SQL Server 2008 for hosting databases.The added assembly should have the classed not containing finalizer methods." .www. and Web services.actualtests.

database_principals pri ON per.principal_id. such as stored procedures and user-defined functions. and "Pass Any Exam.com currently makes use of Microsoft SQL Server 2008 for hosting databases.databasepermissions and fn_builtin_permissions instead of sp_helprotect D: The sp_table_privileges stored procedure returns a list of table permissions for a particular table. You should consider making use of the following T-SQL statement: EXEC sp_table_privileges '%.permission_name FROM sys.actualtests. Answer: B Explanation: The sys.name. CertKiller. schema.com. During the course of the day you decide to have the permission for several roles updated in the database in CERTKILLER-DB01.principal id. Any Time.database_permissions per INNER JOIN sys.Microsoft 70-450: Practice Exam QUESTION NO: 59 You work as a database administrator at CertKiller. However. Part 3: Design database. this stored procedure will not return information about objects that were introduced in SQL Server 2005. per.database_permissions security catalog view can be queried to audit every permission or column-exception permission in a database.permission_name FROM sys. null. Microsoft recommends that you use sys.sysprotects per INNER JOIN sys.grantee principal id = pri.sysprotects pri ON per. CertKiller. You should consider making use of the following T-SQL statement: SELECT pri. per. You should consider making use of the following T-SQL statement: SELECT pri.name.com wants you to create a query which will document the privileged associated with a database role.co m . D. What should you do? A. C. Incorrect Answers: A: The sp_helprotectstored procedure will return information on user permissions for an object in a database.www. "enabled" B.grantee_principal_id = pri. The above query documents the privileges associated with a database role in a database." . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com 57 Ac tua lTe sts . you will not be able to use this stored procedure to find what permissions are given to other objects. You should consider making use of the following T-SQL statement: sp_helprotect null. While you can use this stored procedure to find what permissions are given to a table.

TestAPP1 makes use of a code segment.co m . B. It is implemented as a single assembly.com has hired you as a database administrator for their network. Your duties include administrating a SQL Server 2008 instance named CERTKILLER-DB01.actualtests. The components below are contained in the code segment:The method that is used to access the file system on a network file serverA manner in which to access the registry on the SQL serverThe class definition that will make use of the public static fields SQL CLR integration is used by the code segment. Your first step should be to make use of the regasm. sts . You are currently designing the security requirements for a new database application named TestAPP1. Your first step should be to replace the read write non-static fields in the code with static fields.com 58 Ac tua lTe A.www. You are responsible for administering a SQL Server 2008 instance named CERTKILLER-DB03. Your first step should be to replace the read-only static fields in the code with read write static fields.exe PEVerify utility in order to confirm whether the code meets the type-safety requirements. You receive an instruction from the CIO to make sure that the application is installed to CERTKILLERDB01. To ensure productivity you need to make sure that the application id deployed without the loss of functionality. You have to make sure that the application is configured to allow the EXTERNAL_ACCESS code access security setting.com. What should you do? "Pass Any Exam. The application will make use of stored procedures that is developed using SQL CLR integration. Any Time. Your first step should be to make use of the peverify. What should you do? Answer: A QUESTION NO: 61 CertKiller.exe assembly registration utility in order to register the assembly on CERTKILLER-DB03 prior to deployment.Microsoft 70-450: Practice Exam object security parameters (3 Questions) QUESTION NO: 60 You are employed as a database administrator at CertKiller." . D. C. You are in the process of planning the deployment of a third party database application to CERTKILLER-DB03.

You should consider using IS_SRVROLEMEMBER. CertKiller. Your best option would be to make use of the Database Engine Tuning Advisor tool for the assembly. Then. This stored procedure "Pass Any Exam. lTe sts . one of the three values will be returned: 0 . The value 0 signifies that user is not part of the role. A CertKiller. B. You have received instruction from the CIO to track the server login of Kara Lang as part of the securityadmin role on CERTKILLER-DB01. Your best option would be to replace the File Server Resource Manager (FSRM). C. In this scenario. To do this.actualtests.www. Incorrect Answers: B: The option sys. You need to determine the appropriate way to accomplish this. D. The value NULL signifies that the either the role or the login is not valid. you need to first list the role that you want to check for the user name. you should add the login account to be checked.com users all use login accounts that were created in the Active Directory. this view does not return the SQL Server login that is part of a specific role.com 59 Ac tua A. C. Thereafter the EXTERNAL_ACCESS code should be used to access security for the assembly. You should consider using sp_helpsrvrolemember. C: The option sp_helpsrvrolemember should not be used in this scenario.server_role_members. You should consider using sys. one of the three values will be returned as a result. or NULL. You are responsible for managing two Microsoft SQL Server 2008 named CERTKILLER-DB01 and CERTKILLER-DB02.1 .server_roIe_members should not be used in this scenario. As a result. D. What should you do? Answer: A Explanation: You should use Is_srvrolemember to determine whether the securityadmin role contains Kara Lang's server login. Your best option would be to use public static read-only fields instead of public static fields." . Your best option would be to replace the Distributed File System (DFS) role service. You should consider using sp_helpsrvrole. as desired in the scenario. Answer: D QUESTION NO: 62 You work as a database administrator at CertKiller.com.co m . The value 1 signifies that the user is part of the role. you would use the following syntax: IS_SRVROLEMEMBER ('role'[.com employee named Kara Lang works in the Research and Development department. This view displays a row for each of the member that is part of a specific role.'login']) In this syntax. Any Time.Microsoft 70-450: Practice Exam A. B. However.

www. This can be accomplished by ensuring that the SQL Profiler trace is utilized. as desired in the scenario. The code segment below displays the table that was created in the database: CREATE TABLE CK_Staff ( StaffID INT NOT NULL IDENTITY(1. this stored procedure does not return the SQL Server login that is part of a specific role." . B. C. D: The option sp_helpsrvrole should not be used in this scenario. D. as desired in the scenario. Any Time. However. This can be accomplished by ensuring that the NTFS file system security is utilized and access of the database files is limited to the SQL Server 2008 Service account. Part 4: Design a security policy and an audit plan (10 Questions) QUESTION NO: 63 You are the newly appointed database administrator at CertKiller.1).com Ac What should you do? tua lTe sts . The database will be installed on an SQL Server 2008 instance. Salary MONEY NOT NULL. This can be accomplished by ensuring that the appropriate trace flags are utilized for the database.co m 60 .actualtests. Bonus MONEY NULL ) The table contains a column named Bonus. You have received instructions from the CIO to make sure that Bonus has the most secure method of protection from unauthorized access A. JobLevel INT NOT NULL. This can be accomplished by ensuring that the Job Activity Monitor tool is utilized on all columns in the database. You are in the process of implementing the security requirements for a database. This stored procedure returns the server fixed roles on a server but does not return the SQL Server login that is part of a specific role.Microsoft 70-450: Practice Exam returns the members of a SQL Server fixed server role that you specify in the syntax.com. Your job function encompasses administering a SQL Server 2008 instance. Answer: B QUESTION NO: 64 "Pass Any Exam.

You should consider enabling a VPN solution on the two instances. C. You should consider making use of symmetric key encryption. You receive an instruction from the CIO to make sure that the classified information is stored is a secure manner and that the usage of memory space as well as processor time is minimized. What should you do? A.Microsoft 70-450: Practice Exam You are employed as the database administrator at CertKiller. Management wants you to make sure that the stored information is encrypted with the minimum of administrative effort. Distribution as well as the Subscriber databases.com 61 Ac tua CERTKILLER-DB02 hosts a database application named CK_App. You are in the process of implementing a data security strategy for CK_App. B.000 transactions per minute. C. You should consider making use of Key Management Service (KMS). Answer: C QUESTION NO: 65 What should you do? A. sts . You should consider making use of Database snapshot. You should consider enabling an ADM file between the instances. You should consider enabling RAID 5 for the Publisher. D. Your job function encompasses administering a SQL Server 2008 instance that hosts a database named CK_SALES. Any Time. CK_SALES is used by a Web based application that processes approximately 14.www. Answer: A QUESTION NO: 66 "Pass Any Exam. In order to replicate the information to another SQL server 2008 instance you need to make use of Snapshot replication. Distribution as well as the Subscriber databases. CKDATA stores classified information. lTe You work as a database administrator at CertKiller.co m ." . You are responsible for administering a SQL Server 2008 instance named CERTKILLER-DB02. D.com. There is a column named CKDATA in a table in CK_SALES that is only used by the application.actualtests. B. You should consider enabling transparent data encryption for the Publisher. You should consider making use of the Internet Information Services.com.

The database solution of CertKiller. D. D. You should consider using the Background Intelligent Transfer Service (BITS).www. Your first step should be to set up the Job Activity Monitor tool on the database.Data should be reliable.com Ac tua lTe sts . Your job function encompasses administering a SQL Server 2008 instance that hosts a database named CK_DATA. Answer: D "Pass Any Exam. You should consider using the Transparent database encryption. What should you do? A. You should consider using NTFS quotas and Performance Monitor alerts. It is vital that you make sure that all backups of CK_DATA are encrypted and that unauthorized access is prevented. Answer: C QUESTION NO: 67 You work as a database administrator at CertKiller.com. CK_DATA contains confidential information of the organization. You need to determine the first step that should be performed in the test plan in the event that the E-drive fails.com.com is log-shipped for high availability purposes. You receive an instruction from management to develop a database backup strategy for CK_DATA. You should consider using NTFS quotas and Event Viewer tasks. B. Your first step should be to set up offline files. You are responsible for administering a database solution. B. You receive an instruction from management to implement a recovery test plan for the log-shipping solution with the following criteria: Data loss should be nominal.co m 62 . Any Time. Your first step should be to run the folder redirection against the database. Your first step should be to execute the tail-log backup of the primary database. C.actualtests.The secondary database should be brought online as soon as possible.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller." . What should you do? A. The E-drive of the database hosts the data files and the F-drive the transaction log files. C.

Answer: B You work as a database administrator at CertKiller. The best option is to store the packages and manage the security in the SQL Server 2008 server. This package was created using the SQL Server Import and Export Wizard. Any Time. What should you configure? (Click and drag the options on the left to the column on the right. The users at CertKiller.www.com Ac tua lTe QUESTION NO: 69 DRAG DROP sts . What should you do? A. and place them in the correct order. All servers on the CertKiller.actualtests. D. The best option is to use the Network Service account when the packages are saved.com has employed you as a database administrator. You receive an instruction from the CIO to prevent unauthorized users access by ensuring that the user names and passwords are protected.com. The best option is to implement Internet Protocol security (IPsec). You receive an instruction from the CIO to encrypt the SSN column in the CKStaff table to stop unauthorized users from accessing the information.com will use their user names as well as passwords to the external data sources.) "Pass Any Exam. You are in the process of installing a new SQL Server 2008 Integration Services (SSIS) packages.Microsoft 70-450: Practice Exam QUESTION NO: 68 CertKiller.com network run Windows Server2008 and all client computers run Windows Vista. You are responsible for administering a SQL Server 2008 instance. B.com policy states that the Social Security numbers (SSNs) of all CertKiller.co m 63 . The best option is to use the Windows System Monitoring tool in the SQL Server 2008 server. C.com users needs to be tracked." . A new CertKiller.

com. "Pass Any Exam. You should consider using symmetric encryption. You should consider using asymmetric encryption.com has itsheadquarters in London and branch offices in Paris.com 64 Ac tua lTe sts ." . Any Time.actualtests. Milan. A large number of data replication is occurring on the main SQL Server at the London office. What should you do? A.Microsoft 70-450: Practice Exam Answer: QUESTION NO: 70 You work as a database administrator at CertKiller.www. B. Berlin. You are responsible for managing the SQL Server 2008 servers at every office. CertKiller.co m . To ensure productivity continues management wants you to make sure that information is encrypted during replication without affecting the performance of the server. Madrid and Stockholm.

The TDE encryption is used for static data. Symmetric encryption is typically used for large volumes of data. symmetric encryption is less resource-intensive and does not affect server performance. C: You should not use TDE encryption.com Ac You work as a database administrator at CertKiller. You typically use symmetric encryption during replication when you have large volumes of data. You should consider applying Transparent Data Encryption (TDE).Microsoft 70-450: Practice Exam C. TDE encryption encrypts data and log files using a database encryption key (DEK) stored in the master database.co m 65 . this solution will not be applicable in this situation. TDE encryption will not work during replication of data. Answer: B Explanation: In this scenario. D.actualtests. Incorrect Answers: A: You should not use asymmetric encryption for replication. You decide to make use of Transparent Data Encryption (TDE) on the CK_SALES and execute the subsequent steps:You create a master key. This type of encryption provides real-time encryption and decryption of data and log files. Therefore.You create a database encryption key and protect it with the SalesCert certificate You need to complete the encryption of CK_SALES. D: You should not use symmetric encryption and then compress the data encryption because encrypted data cannot be compressed. CertKiller. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES.www." . Compared to asymmetric encryption. such as data and the log files of the database. This type of encryption is resourceintensive. you should use symmetric encryption for encrypting the data during replication. tua lTe sts . You should not use TDE encryption for data during replication.You create a certificate named SalesCert that is protected by the master key. compared to the symmetric encryption. There is only one key used for encrypting and decrypting the data. It uses two different keys for encrypting and decrypting information. You should consider using symmetric encryption and then compress the data encryption. However.com currently makes use of Microsoft SQL Server 2008 for hosting databases. this encryption provides a higher level of security. Any Time. a private key and a public key. What should you do? "Pass Any Exam.com. QUESTION NO: 71 You have received instruction from the CIO to encrypt a number of columns in various tables in CK_SALES without modifying the applications that is used to access the tables.

mdf file. C: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers database. Answer: D Explanation: In order to use Transparent Data Encryption (TDE) on CK_SALES you must ensure each of the following actions is performed: Create a master key in the master database. The ATTRIB command is used to set attributes on a file. updating statistics. During the course of the day you receive instruction from CertKiller. this file can only be viewed by the person who encrypted it. B: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers database. The CIPHER command can be used to encrypt a file that is stored on an NTFS volume using EFS encryption. You should run the ALTER DATABASE CK_SALES SET ENCRYPTION ON command.mdf file. The file will not be readable to SQL Server.mdf command. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_STAFF.com to prevent the backup file of the CK_STAFF database being compromised using the script below to secure the data: "Pass Any Exam. The file will not be readable to SQL Server. which is protected by the master key. such as automatically creating statistics. setting the database as read only. Create a certificate called SalesCert . if you use the CIPHER command to encrypt the Customers.Microsoft 70-450: Practice Exam A.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You cannot use the ATTRIB command to set an encryption attribute.com 66 Ac tua lTe sts . The CIPHER command can be used to encrypt a file that is stored on an NTFS volume using EFS encryption. QUESTION NO: 72 You work as a database administrator at CertKiller. or setting the database to use torn page detection. 'TRUE' command. D. The ATTRIB command is used to set attributes on a file. Create a database encryption key (DEK) and protect it with the SalesCert certificate. You should run the ATTRIB +S C:\Program Files\Microsoft SQL Server\MSSQL10.co m .MSSQLSERVER\MSSQL\DATA /F CK_SALES. thus making the Customers database unusable. 'encrypted'. if you use the CIPHER command to encrypt the Customers. Any Time. Set the database to use encryption with the alter database statement.MSSQLSERVER\MSSQL\DATA \CK_SALES. CertKiller. B." . You can use the sp_dboption to set many other database options. However.www. C. You should run the EXEC sp_dboption 'CK_SALES'.actualtests. However. Incorrect Answers: A: You cannot use the sp_dboption stored procedure to set the database to use encryption. thus making the Customers database unusable.mdf command.com. You cannot use the ATTRIB command to set an encryption attribute. You should run the CIPHER /E /S:C:\Program Files\Microsoft SQL Server\MSSQL10. this file can only be viewed by the person who encrypted it.

You can use the Force Encryption option to secure communications from a client to the SQL server.bak'. and named pipes network libraries.exe to encrypt the CK_Staff. Any Time. you will not be able to open the database without the database encryption key. B. Answer: A Explanation: With TDE. Incorrect Answers: B: You should not load the TCP/IP network library on CERTKILLER-DB01 and enable the Force Encryption option.com Ac tua lTe sts . then the file would "Pass Any Exam. MEDIANAME = 'CK_StaffBackup'. With TDE. If you encrypted the file with EFS. you must supply the password when restoring data from the backup media. However. D. The encryption is transparent to the application. Only the user who encrypts the file or an encrypted recovery agent can access the file. CertKiller. then security can be compromised easily. What should you do? A. The mediapassword keyword will not be available in future versions of SQL Server. the system is only as good as the password.www. With any password secured system.bak file. You can use this option with TCP/IP.actualtests. MEDIADESCRIPTION = 'media set for CK_STAFF database'. When you set a password using the mediapassword keyword.exe to encrypt the CK_Staff.[CK_StaffBackup] WITH FORMAT. shared memory. you do not have to modify existing applications to take advantage of the encryption. You should consider making use of Transparent Data Encryption (TDE) to encrypt the CK_STAFF database. You should consider having the TCP/IP network library loaded on CERTKILLER-DB01 and enable the Force Encryption option. but will not be able to access the encrypted backup content without the key. You should consider making use of cipher." . You can use Windows Explorer or cipher.com wants you to secure the information. You are not limited in copying or moving the backup file of the database. C. so a backup application can access the data and store it on the backup media.bak file.com wants it so that only the backup operators know the media password to restore the media but your concerns is with rogue users using password crackers finding the password and restoring the data to another server.bak file.co m 67 . but you cannot use this option to encrypt a database. MEDIAPASSWORD = 'T3$T<1N8$T@FF' CertKiller.exe to encrypt a file with EFS. If several people share the password. C: You should not use EFS or cipher. You can use the mediapassword keyword to secure a backup. You should consider making use of Encrypted File Service (EFS) to encrypt the CK_Staff.Microsoft 70-450: Practice Exam BACKUP DATABASE [CK_STAFF] TO DISK = N'D:\Backup\CK_Staff. a rogue user may be able to steal the backup file.

Cell-level encryption can be configured so that users can have individual keys for their own data. B. You can use Windows Explorer or cipher. Cell-level is highly configurable.com Ac tua A. During the course of the day you receive instruction from CertKiller. With encryption.actualtests. You should consider making use of Cell-level encryption.com to secure all the data in the CK_SALES database whilst ensuring the requirements below are met: CertKiller. lTe sts . D. If you encrypted the file with EFS. In this scenario. You should consider making use of BitLocker encryption. You should not use cell-level encryption. so that applications that access data can be modified to take advantage of it.com wants to ensure that there is no performance concern. and it does not affect the use of indexes and other optimization tools used by the query engine. The encryption is transparent to the application. The granular level of encryption that cell-level encryption provides ensures that data is not decrypted until it is used. then the file would not be available to SQL Server and could not be used as a backup file. TDE does not hurt performance as much as cell-level encryption. If you need to encrypt the entire database.com currently makes use of Microsoft SQL Server 2008 for hosting databases.Microsoft 70-450: Practice Exam not be available to SQL Server and could not be used as a backup file. Any Time. C. the original value of the data will have a "Pass Any Exam. Part 5: Design an encryption strategy (12 Questions) QUESTION NO: 73 You work as a database administrator at CertKiller. What should you do? Answer: C Explanation: With TDE. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.bak file.CertKiller.exe to encrypt a file with EFS.exe to encrypt the CK_Staff. applications that access the data must not be reconfigured. Cell-level encryption should be used if you need to encrypt only a small amount of data in the database. Columns that will be encrypted must be altered to use the varbinary data type. you should use TDE.www. Part 5: Design an encryption strategy (12 Questions) D: You should not use EFS or cipher.co m 68 . You do not have to modify existing applications to take advantage of the encryption.com wants to have the application which accesses the data not to be reconfigured.CertKiller." . You should consider making use of Transparent Data Encryption (TDE). You should consider making use of EFS encryption.com wants to have all the data in the CK_SALES database encrypted. Incorrect Answers: A: Cell-level encryption will also slow down performance. CertKiller.com. Only the user who encrypts the file or an encrypted recovery agent can access the file.

With TDE. Any Time.com to create a policy prohibiting enabling Database Mail and SQL Mail on CERTKILLER-DB01. CertKiller. Your job function encompasses administering a SQL Server 2008 instance that hosts a database named CK_SALES.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com. You should consider having the Expression for the condition set to @Name=CK_ORDERS. CK_SALES is used by a Web based application that processes approximately 18. During the course of the day you receive instruction from CertKiller. This type of encryption cannot be used to encrypt data in a database unless the data is stored outside the SQL server such as FILESTREAM storage. This type of encryption is used to encrypt an entire NTFS volume. CertKiller.com additionally wants the policy which requires all new views to enable Database Mail on a newly added server whilst being able to create views in the CK_ORDERS database which are not encrypted. the applications do not need to be reconfigured. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_ORDERS. and unique keys will be affected by the encrypted values. foreign keys.com. BitLocker encryption can be used to protect a volume from being viewed after it is stolen from a server. This type of encryption is used to encrypt individual files and directories on an NTFS volume. but table scans. C. Any referential constraints such as primary keys.www.actualtests. You should consider having Encrypt View policy enabled. You should consider having the MSSQL Server service restarted. and files on a Window Server 2008 server. D: You should not use BitLocker encryption. directories. What should you do? Answer: D QUESTION NO: 75 You are employed as the database administrator at CertKiller.co m QUESTION NO: 74 . D. B: You should not use EFS encryption.000 transactions per minute. Any indexes on the encrypted columns will no longer use index scans. You should consider having the facet to Database Options set. In this scenario. There is a column in a table in CK_SALES that is only used by the application. The "Pass Any Exam. performance is a concern. thus affecting performance. EFS encryption can be used in conjunction with BitLocker encryption to secure volumes. tua lTe You work as a database administrator at CertKiller. B.com 69 Ac A. sts .Microsoft 70-450: Practice Exam different value after encryption. Cell-level encryption may require that applications be modified to take advantage of the encryption." .

lTe sts . You should consider making use of Transparent Data Encryption (TDE). During the course of the day you receive instruction from CertKiller. This type of encryption is used to encrypt files on an NTFS partition.com to apply real-time encryption to the CK_ORDERS database and log files whilst being able to encrypt the backup copy of the database.com. You should consider making use of Secure Socket Tunneling Protocol (SSTP). since the account that the SQL Server runs under did not encrypt the backup file. C.com currently makes use of Microsoft SQL Server 2008 for hosting databases. B. You should consider making use of Layer Two Tunneling Protocol (L2TP). This type of encryption provides real-time encryption and decryption of data and log files. You should consider making use of asymmetric encryption.actualtests. You should consider making use of Point-to-Point Tunneling Protocol (PPTP). D.www. You receive an instruction from the CIO to make sure that the classified information is stored is a secure manner and that the usage of memory space as well as processor time is minimized. What should you do? A.co m . C. You should consider making use of symmetric encryption. Answer: D QUESTION NO: 76 You work as a database administrator at CertKiller. CertKiller. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_ORDERS. then the SQL Server 2008 server will not be able to access the database file. Incorrect Answers: A: You should not use EFS encryption. D. B. If you encrypt the backup file. If a file is encrypted. It uses two different keys: a private key and a public key for encrypting and decrypting information. You should consider making use of the Encrypting File System (EFS).Microsoft 70-450: Practice Exam column stores classified information. C: You should not use asymmetric encryption. You should consider making use of symmetric key encryption.com 70 Ac tua A." . Any Time. What should you do? Answer: B Explanation: TDE encryption encrypts data and log files using a database encryption key (DEK) stored in the master database. only the user who encrypted the file or the recovery agent can decrypt the file. This type of encryption is resource-intensive. "Pass Any Exam.

com wants to have the disk drive containing the PDF files protected from theft.com wants to have FILESTREAM storage sued with the column. You should consider making use of Transparent Data Encryption. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com to add a column to the CK_PRODUCTS table in the CK_SALES database which will keep a PDF diagram of the products. CertKiller. You typically use symmetric encryption during replication when you have large volumes of data.com wants you to ensure that the requirements set below are met: CertKiller. Symmetric encryption is typically used for large volumes of data. E. You should consider making use of BitLocker encryption.actualtests. There is only one key used for encrypting and decrypting the data. You should consider having the CK_PRODUCTS table altered to include a new column as an image data type. During the course of the day you receive instruction from CertKiller. Any Time. D: You should not use symmetric encryption. D. Answer: B. "Pass Any Exam. You should consider having the CK_PRODUCTS table altered to include a new column as a varbinary(max) data type. CertKiller. Asymmetric encryption will not provide real-time encryption and decryption of data and log files. You should consider having the CK_PRODUCTS table altered to include a new column as an ntext data type.co m 71 .Microsoft 70-450: Practice Exam However.www. the standard varbinary ( max) data type limitation of 2 GB does not apply. the large PDF files that are stored outside SQL Server. B.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com wants to have the PDF files stored in the files system outside the SQL server. this encryption provides a higher level of security. QUESTION NO: 77 You work as a database administrator at CertKiller. Compared to asymmetric encryption." . When BLOBs are stored in the file system. compared to the symmetric replication. What should you do? (Choose two) A.com.com is aware that some PDF files are larger than 2 GB. Symmetric encryption will not provide real-time encryption and decryption of data and log files.CertKiller. C.D Explanation: FILESTREAM storage uses the varbinary ( max) data type on a column for Binary Large Objects (BLOB)s stored in the file system for example. symmetric encryption is less resource-intensive and does not affect the server performance. CertKiller. You can support PDF files even if they are over 2 GB in size.CertKiller.com Ac tua lTe sts .

QUESTION NO: 78 You work as a database administrator at CertKiller.com 72 Ac tua lTe sts . CertKiller. Any Time.www. B.Microsoft 70-450: Practice Exam Incorrect Answers: A: You should not use Transparent Data Encryption (TDE).When securing the data no data will be stored outside the SQL Server database. E: You should not alter the MaintenanceRecords table to include a new column as an ntext data type or as an image data type. FILESTREAM data is stored outside the database and cannot be encrypted with TDE. During the course of the day you receive instruction from CertKiller.You cannot use an ntext data type or an image data type for FILESTREAM storage. What should you do? A.When securing the data performance is of no concern but security of the data is. An image data type can support storage of up to 2 GB and an ntext data type can support storage of up to 1 GB. the account under which the SQL Server service account runs is the only account that is granted NTFS permissions to the FILESTREAM data. Once you have encrypted the volume that contains the operating system with BitLocker. Although the data is stored outside SQL server on a NTFS volume.actualtests.com currently makes use of Microsoft SQL Server 2008 for hosting databases.2 to ensure that data is accessible only if the encrypted disk is located in the original computer and the computer's boot components have not been altered. BitLocker can use the security capabilities of computers that have a Trusted Platform Module (TPM) version 1.com has the application custom designed to access the data." . TDE is used to encrypt a database.com. To support FILESTREAM storage.com to secure the data in the CK_SALES database whilst ensuring the conditions below are met: When securing the data only a small percent of data in the CK_SALES database requires encryption.co m . T-SQL transactions and OpenSqIFilestream APIs are allowed to access the FILESTREAM data. You should consider making use of Call-level encryption. SQL Server restricts access to the volumes and files that make up the FILESTREAM data containers. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. you can use BitLocker to encrypt the other volumes. You should consider making use of EFS encryption. but TDE cannot encrypt FILESTREAM data.CertKiller.FILESTREAM data in a table is secured with permissions that are granted at the table or column levels inside the SQL server database. "Pass Any Exam. The new column of the MaintenanceRecords table uses a FILESTREAM data type. C: You should use BitLocker encryption to protect the volume that contains the PDF files. BitLocker encrypts all user and system files in the operating system volume. BitLocker encryption provides full volume encryption for Windows Vista and Windows Server 2008 and protection against the physical theft of a hard drive. you must use a varbinary (max) data type on the column for the PDF files.

com 73 Ac tua lTe sts . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. so cell-encryption could be used. In this scenario. The granular level of encryption that cell-level encryption provides ensures that data is not decrypted until it is used. so that applications that access data can be modified to best take advantage of it. Columns that will be encrypted must be altered to use the varbinary data type. You do not have to modify an application to take advantage of TDE. Any Time. TDE does not affect the use of indexes and other optimization tools used by the query engine. TDE offers advantages over cell-level encryption. With encryption. and not the entire database. You should consider making use of BitLocker encryption. This type of encryption is used to encrypt individual files and directories on an NTFS volume.com currently makes use of Microsoft SQL Server 2008 for hosting databases. BitLocker encryption can be used to protect a volume from being viewed after it is stolen from a server. performance is not a concern. Any referential constraints such as primary keys. If you need to encrypt the entire database. D.www. but table scans. Cell-level encryption is highly configurable. C: You should not use Transparent Data Encryption (TDE).com to plan the implementation of Transparent Data Encryption (TDE) for the CK_SALES database using the script below: "Pass Any Exam. EFS encryption can be used in conjunction with BitLocker encryption to secure volumes. and unique keys will be affected by the encrypted values. D: You should not use BitLocker encryption. Any indexes on the encrypted columns will no longer use index scans. and files on a Window Server 2008 server.actualtests.Microsoft 70-450: Practice Exam C. you should use Transparent Data Encryption (TDE). thus affecting performance. TDE does not hurt performance as much as cell-level encryption. the original value of the data will have a different value after encryption. foreign keys. In this scenario. Incorrect Answers: B: You should not use EFS encryption. Cell-level encryption can be configured so that users can have individual keys for their own data. Answer: A Explanation: Cell-level encryption should be used if you need to encrypt only a small amount of data in the database.com. During the course of the day you receive instruction from CertKiller. This type of encryption is used to encrypt an entire NTFS volume. In this scenario.co m . the application was customized to access the data so cell-level encryption could be used. This type of encryption cannot be used to encrypt data in a database unless the data is stored outside the SQL server such as FILESTREAM storage." . You should consider making use of Transparent Data Encryption (TDE). you were required to encrypt a small percentage of the data. The encryption is transparent to the application. Cell-level encryption will slow down performance. directories. CertKiller. QUESTION NO: 79 You work as a database administrator at CertKiller.

you must have a backup of the CK_SALES database. GO CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'T35T1K1N8'.Microsoft 70-450: Practice Exam USE master. Answer: D. a backup of the master database. The CK_SALES database has Transparent Data Encryption (TDE) enabled.E Explanation: For a database that has TDE enabled. To restore the database you would require a backup of the CERTKILLER-DB01Cert certificate.com has additionally configured the CK_SALES database to use the full recovery model.com 74 Ac tua lTe sts . CertKiller. To restore the database you would require backups of the master database and the CK_SALES database. a backup of the certificate. C. and a backup of the private key associated with the certificate. To restore the database you would require backups of the msdb database and the CK_SALES database. GO CREATE CERTIFICATE CERTKILLER-DB01Cert WITH SUBJECT = 'CERTKILLER-DB01 Certificate' GO USE CK_SALES GO CREATE DATABASE ENCRYPTION KEY UITH ALGORITHM = AES_128 ENCRYPTION BY SERVER CERTIFICATE CERTKILLERDB01Cert GO ALTER DATABASE CK_SALES SET ENCRYPTION ON GO CertKiller. B.com wants you to ensure that you are able to restore the CK_SALES database after a media failure by selecting what would be required to restore the database." . To restore the database you would require backups of the EFS recovery certificate for CERTKILLER-DB01. and a backup of the CERTKILLER_DB011Cert certificate. D.actualtests. In this scenario. You should have a backup of the database. Any Time. You must have a backup of the certificate that protects the database encryption "Pass Any Exam. To restore the database you would require backups of the tempdb database and the CK_SALES database. E.www. the database is encrypted by using the database encryption key.co m . What additional information would be required? (Choose two) A.

You work as a database administrator at CertKiller. The msdb database is used to store jobs and alerts.You additionally created a certificate for encryption using the statement below: CREATE CERTIFICATE CERTKILLER-DB02 WITH SUBJECT = Inventory Level'You have later created a symmetric key from the certificate using the statement below: CREATE SYMMETRIC KEY SalesInventory_Key1 WITH ALGORITHM = AES_256 ENCRYPTION BY CERTIFICATE CERTKILLER-DB02.Microsoft 70-450: Practice Exam key.com 75 Ac tua lTe QUESTION NO: 80 sts . Neither of these two databases is used to store certificates or private keys for any databases. Neither of these two databases is used to store certificates or private keys for any databases. The EFS recovery certificate is not used to create a service master key (SMK) or a DMK and does not need to be recovered. The master database contains the certificate that is created with the DMK. which in this case is the CERTKILLER-DB01Cert certificate. You must have a backup of the CK_SALES database to restore the objects and data in case of a failure. The master database contains the certificate that is created with the DMK. The master database contains the certificate that is created with the database master key (DMK). The tempdb system database is used to store temporary objects. You must have backups of both the certificate and the private key or the database cannot be opened.actualtests. During the course of the day you receive instruction from CertKiller. Any Time.co m . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. B: You do not have to have a backup of the EFS recovery certificate for CERTKILLER-DB01. The tempdb system database is used to store temporary objects. Incorrect Answers: A: You do not have to restore the tempdb or msdb database.com currently makes use of Microsoft SQL Server 2008 for hosting databases." . The EFS recovery certificate is used to recover files and directories that are encrypted on a NTFS partition.com. You should back up the master database instead of the tempdb or msdb databases. CertKiller. The msdb database is used to store jobs and alerts. C: You do not have to restore the tempdb or msdb database. You have finally altered the Employees table to add a column named Inventory_Encrypted to store the encrypted data by writing the script below to encrypt the value in the column Inventory and save the results in the table in the Inventory_Encrypted: "Pass Any Exam.com to encrypt the inventory information of the Products table in the CK_SALES database by performing the action below: You decided to create a master key for the database.www. You should back up the master database instead of the tempdb or msdb databases.

Inventory. You should consider having the CERTKILLER-DB02 certificate used to open the table. You must use the symmetric key to encrypt a column. D: You do not need to use CERTKILLER-DB02 certificate to create a session key with the table.com wants you to determine what should be done before running the update statement on the table. C: You do not need to open the master key on the database. Any Time. D. You should consider having the symmetric key opened that will be used to decrypt the data.www. B. Incorrect Answers: A: You do not need to use the CERTKILLER-DB02 certificate to open the table. A session key can be used when creating a secure session between connections such as Web browser and a Web site. The command syntax is: OPEN SYMMETRIC KEY SalesInventory_Key1 DECRYPTION BY CERTIFICATE CERTKILLERDB02 The symmetric must be opened with the CERTKILLER-DB02 certificate before you encrypt the value in the column Salary and save the results in the column Inventory_Encrypted . In this scenario. you are encrypting a column. 1.Microsoft 70-450: Practice Exam UPDATE CK_SALES. The CERTKILLER-DB02 certificate is not used for identity purposes with the table. You are trying to encrypt a column in a table. You should consider having the CERTKILLER-DB02 certificate used to create a session key with the table.co m 76 . Inventory))). What should you do? A. Explanation: You must open the symmetric key with which to decrypt the data before running the update statement on the table. "Pass Any Exam. C. The certificate is not related to the table.com Ac tua lTe sts Answer: B . CONVERT( varbinary. You should consider having the master key opened on the database. not establish a secure connection between a client and a database server. The CERTKILLER-DB02 certificate is used to create the symmetric key. The symmetric key is used to encrypt a column in the table.actualtests." . GO CertKiller. not the master key on the database. HashBytes ('SHA1'.Products SET Inventory_Encrypted = EncryptByKey(Key_GUID('SalesInventory_Key1').

C. If you use the CIPHER command or Windows Explorer to encrypt the files that make up the Intelligence database file. you can use BitLocker to encrypt the other volumes. You should use BitLocker encryption to protect the volume against theft.com 77 Ac tua lTe A. BitLocker provides protection against theft of a hard drive. sts . "Pass Any Exam.com.com to add a table for the CK_SALES database using the statement below: CREATE TABLE Discontinued ( [Id] [uniqueidentifier] ROWGUIDCOL NOT NULL UNIQUE. What should you do? Answer: D Explanation: BitLocker encryption provides full volume encryption for Windows Vista and Windows Server 2008. thus making the Intelligence database unusable. [Design] VARBINARY(MAX) FILESTREAM NULL ) CertKiller. You should make use of EFS encryption. Encrypting files via EFS encryption does not necessarily protect them against theft if a user is able to export the certificate of Encrypted Recovery Agent to decrypt the files.com wants you to ensure that the data in the Design column in the Discontinued table is secure whilst ensuring that the disk containing the CK_SALES database is protected from theft. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.actualtests. D.2 to ensure that data is accessible only if the encrypted disk is located in the original computer and the computer's boot components have not been altered. BitLocker encrypts all user and system files in the operating system volume.www. BitLocker can use the security capabilities of computers that have a Trusted Platform Module (TPM) version 1. EFS encryption can encrypt files on an NTFS volume. You should make use of Transparent Data Encryption. These files will not be readable by SQL Server. Incorrect Answers: A: You should not use the EFS encryption.co m . You should make use of IPSec encryption. Any Time. Once you have encrypted the volume that contains the operating system with BitLocker . During the course of the day you receive instruction from CertKiller. B." .com currently makes use of Microsoft SQL Server 2008 for hosting databases. [SerialNo] INTEGER UNIQUE. You should make use of BitLocker Encryption. this files will be only viewed by the person that encrypted them. CertKiller. You can use Windows Explorer or the CIPHER command to encrypt a file that is stored on an NTFS volume.Microsoft 70-450: Practice Exam QUESTION NO: 81 You work as a database administrator at CertKiller.

IPSec encryption will not encrypt information on a NTFS drive or within a SQL server database.com Ac tua CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'T3$t1<lN8' CREATE CERTIFICATE DiscountRate WITH SUBJECT = 'Sales Discount'.com.com wants to know which data type should be used for the encrypted column.com has additionally planned to have the CK_SALES database altered to have an encrypted column created to store the encrypted column. the SQL Server service account is the only account that is granted NTFS permissions to the FILESTREAM data.Microsoft 70-450: Practice Exam B: You should not use IPSec encryption. CertKiller.actualtests. T-SQL transactions and OpenSqIFilestream APIs are allowed to access the FILESTREAM data. SQL Server restricts access to the volumes and files that make up the FILESTREAM data containers. B. CREATE SYMMETRIC KEY DiscountRate_0l WITH ALGORITHM = AES_256 ENCRYPTION BY CERTIFICATE DiscountRate lTe You work as a database administrator at CertKiller.www. You should make use of the varbinary data type.com to secure the information which is submitted by the customers. Answer: D "Pass Any Exam. FILESTREAM data in a table is secured with permissions that are granted at the table or column levels inside the SQL server database.com wants to have the credit card numbers used by customers to be encrypted whilst other customer information remains unencrypted by making use of the script below: sts . CertKiller. You should make use of the xml data type. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You should make use of the int data type. You should make use of the varchar data type. Any Time. C.co m QUESTION NO: 82 78 . The Chart column of the Records table uses a FILESTREAM data type. FILESTREAM data is stored outside the database and cannot be encrypted with TDE. C: You should not use Transparent Data Encryption (TDE). This type of encryption is used to encrypt communications between sessions. CertKiller. TDE is used to encrypt a database. During the course of the day you receive instruction from CertKiller. CertKiller. D.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Although the data is stored outside SQL server on a NTFS volume." . What should you do? A. but TDE cannot encrypt FILESTREAM data.

CreditCardNo AS 'Encrypted Credit Card'.648 to 2.483. What should you do? A.www. You should consider using the query: SELECT Credit Card." .147.com wants you to determine if the new CreditCardNo column contains the correct data before removing the Credit Card column by making use of a query to compare the data in the Credit Card column with the CreditCardNo column. You should consider using the query: SELECT Credit Card. Incorrect Answers: A: You should not set the data type of the column to int. CONVERT(nvarchar. During the course of the day you receive instruction from CertKiller. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com 79 Ac tua You created a master key in the database with a certificate for encryption. An int data type is can be used to store numbers from -2. You can either add a column with the varbinary data type. B.co m .483.Orders. lTe You work as a database administrator at CertKiller. A varchar data type can support nunUnicode data can support a storage size of 2^31 --1 bytes and cannot be used to store encrypted data for a column. DecryptByKey (CreditCardNo))AS 'Decrypted Credit Card' FROM CK_SALES. C: You should not set the data type of the column to xml. The schema of the table must be changed to allow for encryption. CertKiller. B: You should not set the data type of the column to varchar. You created a symmetric key for the certificate and altered the Orders table to add a column called CreditCardNo to store the encrypted Credit Card Number. An int data type is used to store exact numbers.actualtests. You then perform the actions listed below: sts . CONVERT(nvarchar. An xml data type is used to store XML data and cannot be used to store encrypted data for a column.Orders. "Pass Any Exam.Microsoft 70-450: Practice Exam Explanation: Encryption of a column in SQL Server 2008 is only supported when the column's data type is set to varbinary .com currently makes use of Microsoft SQL Server 2008 for hosting databases. or you can alter the column's data type to varbinary .com.com to have the Credit Card Numbers encrypted for the CertKiller.com customers in the Orders table.147. Any Time. CreditCardNo AS 'Encrypted Credit Card'. QUESTION NO: 83 CertKiller. You additionally encrypted the value in the CreditCardNo column with a symmetric key. DecryptByText (CreditCardNo)) AS 'Decrypted Credit Card' FROM CK_SALES.648 and cannot be used to store encrypted data for a column.

CreditCardNo AS 'Encrypted Credit Card'.com currently makes use of Microsoft SQL Server 2008 for hosting databases. CreditCardNo) AS 'Decrypted Credit Card' FROM CK_SALES. This function is not a standard T-SQL function.Microsoft 70-450: Practice Exam C.Orders. You should consider using the query: SELECT Credit Card. You should consider using the query: SELECT Credit Card. This function decrypts the data in the CreditCardNo column by using the symmetric key. CONVERT(nvarchar.com. You make use of the code segment below to create a table in the new database: CREATE TABLE CK_Discounts "Pass Any Exam. Answer: A Explanation: The encrypted column must have a varbinaiy data type. QUESTION NO: 84 You work as a database administrator at CertKiller. CreditCardNo AS 'Decrypted Credit Card' FROM CK_SALES. CertKiller. Any Time. You must also include the DecryptByKey function.actualtests. CreditCardNo AS 'Encrypted Credit Card'. CreditCardNo AS 'Encrypted Credit Card'. DecryptByText (CreditCardNo)) AS 'Decrypted Credit Card' FROM CK_SALES. CreditCardNo AS 'Decrypted Credit Card' FROM CK_SALES.OrdersThis query uses an incorrect function called DecryptByText.com 80 Ac tua lTe sts . CONVERT(nvarchar. D. you must convert the column to another readable data type.This query does not use the DecryptByKey function to decrypt the data in the CreditCardNo column by using the symmetric key. CONVERT(nvarchar.Orders.com to implement the security requirements for a new database application which will be deployed to CERTKILLER-DB01.This query does not use the DecryptByKey function to decrypt the data in the CreditCardNo column by using the symmetric key. D: You should not use the following query:SELECT Credit Card. Incorrect Answers: B: You should not use the following query:SELECT Credit Card. CreditCardNo AS 'Encrypted Credit Card'. C: You should not use the following query:SELECT Credit Card. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. such as a varchar data type.www.co m . During the course of the day you receive instruction from CertKiller. To display the information in varbinaiy column.Orders. CreditCardNo AS 'Encrypted Credit Card'." .Orders. CreditCardNo) AS 'Decrypted Credit Card' FROM CK_SALES.

B. A CertKiller.actualtests. The best option is to Event Subscriptions on all columns in the database.com policy states that CERTKILLER-DB06 should always be available to its users without any loss of information. What should you do? A. The best option is to limit the access of the database files to the SQL Server 2008 Service account.E QUESTION NO: 85 CertKiller.) A. You thus decide to make use of a high-availability solution. B.com Ac tua lTe sts .Microsoft 70-450: Practice Exam ( ProductID INT NOT NULL IDENTITY(1. Any Time. The best option is to use IPsec domain isolation.1). Filestream data is also included in CERTKILLER-DB06. You should consider making use of a RAID 5 array. The instance hosts a business critical database named CERTKILLER-DB06. C. SalePrice MONEY NOT NULL. You should consider making use of failover clustering. Discount VARBINARY(MAX) FILESTREAM ) CertKiller.www. The best option is to use NTFS file system security. Answer: C QUESTION NO: 86 "Pass Any Exam. You should consider making use of the Job Activity Monitor tool. What should you do? (Choose all that apply. C. Answer: B. D. You should consider making use of multiple downstream servers." .co m 81 . The best option is to set up offline files to use encryption.com wants you to ensure that the Discount column is protected from unauthorized access using the most secure method. D. E.com has hired you as a database administrator for their network. Your duties encompass administering a SQL Server 2008 infrastructure.

Keep the downtime of these databases together with the system databases to a minimum. B.CERTKILLER-DB02 is configured with 4 processors that have 8 GB of RAM. You need to determine the best solution to recommend to the CIO. Your duties at CertKiller.com.www. At present the instances are all optimized and contain no additional CPU cycles or memory.com has employed you as a database administrator. This can be achieved by having a two-node active/active cluster configured where every node will contain a 10 processors and 15 GB of memory.Microsoft 70-450: Practice Exam CertKiller.CERTKILLERDB03 is configured with 2 processors that have 16 GB of RAM.com CIO wants the cluster to handle the workload of the database applications without using too may hardware." . a single virtual cluster IP address will be used for the new SQL Server failover cluster will host the four databases. sts . You receive an instruction from the CIO to:Ensure the highest availability.com include administering four SQL Server 2008 instances. All the instances host a single database application.com Ac tua lTe A.actualtests. Any Time.CERTKILLER-DB04 is configured with 4 processors that have 8 GB of RAM. However. This can be achieved by having a two-node active/passive cluster configured where every node will contain 18 processors and 50 GB of memory.The databases are available on one server for client access. D. What should you do? "Pass Any Exam. You are currently implementing the migration of the instances to a new SQL Server failover cluster. What should you do? Answer: B QUESTION NO: 87 You work as a database administrator at CertKiller. C. The four instances are configured as follows:CERTKILLER-DB01 is configured with 8 processors that have 16 GB of RAM. You are assigned a SQL Server 2008 Enterprise Edition server named CERTKILLER-DB01 that hosts multiple databases.co m 82 . The CertKiller. You are responsible for administering multiple servers that run SQL Server 2008 Enterprise Edition. This can be achieved by having a four-node active/active/active/passive cluster configured where every node will contain 9 processors and a 50 GB of memory. This can be achieved by having a four-node active/active/active/active cluster configured where every node will contain a 6 processors and a 11 GB of memory.

However.Microsoft 70-450: Practice Exam A. The secondary copy or the standby copy is known as the mirror database. Replication is generally used to replicate some of the objects of a database.actualtests.co m 83 .com Ac tua lTe sts . the entire cluster instance appears as a single computer on the network. This solution will not work in the scenario because in case of a failure. there are multiple functional servers on the back end. You can use different types of replication. merge. unlike clustering. which was not the current node. The mirror database is created with no recovery. In database mirroring. In this solution. a publish-subscribe model is used that allows the primary server to replicate information to the secondary servers. Replication can be used to replicate tables and objects from a database. databases are mirrored from one server to another server to provide the highest availability and uptime. Any Time. does not provide failover detection or automatic failover. Incorrect Answers: A: The log shipping option is incorrect. to become the current node. Limited reporting functionality is available when the secondary databases are restored.com currently makes use of Microsoft SQL Server 2008 for hosting databases. When a failure happens. and not the entire database. Log shipping. the system databases will not be available. B. CertKiller. another node in the cluster is given the responsibility of owning the resource group. QUESTION NO: 88 You work as a database administrator at CertKiller. You should recommend Failover clustering. The database that is the primary copy is known as the principal database. C. but should not be used for data availability of that database. both the user databases and system databases are provided the highest availability when a failure occurs.com. You are responsible for administering a database server named CERTKILLER-DB01 with an instance. You cannot use replication to system databases. The transaction logs are used for synchronizing both primary and secondary databases." . This solution will not work in the scenario because in case of a failure. You should recommend Replication. The logs of the primary database on the primary server are backed up for the secondary database hosted on a secondary server. B: You should not implement database mirroring as a solution to meet the requirement stated in the scenario. the failover cluster allows a new node. or transactional. You should recommend Log shipping.www. Answer: D Explanation: Failover clustering requires one or more servers that contain two or more shared disks. such as snapshot. the system databases will not be available. When you create a SQL Server failover cluster. When this new current node fails. "Pass Any Exam. In SQL Server replication. C: You should not use replication. Log shipping enables transactional log backup from the primary server to the secondary server. D. You should recommend Database mirroring.

You should consider configuring automatic failover with asynchronous database mirroring. Automatic failover is a feature of database mirroring that is primarily used to prevent data loss during failover.co m . C. automatic failover cannot be used for upgrading hardware or software without affecting availability. B. CertKiller." . What should you do? A. CertKiller. D: You should not configure manual failover with asynchronous database mirroring because manual failover is supported only with synchronous database mirroring.com wants to know which pre-requirements should be met? A. QUESTION NO: 89 You work as a database administrator at CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. During the course of the day you receive instruction from CertKiller. You receive an instruction from the CIO to execute a software upgrade on the instance.Microsoft 70-450: Practice Exam All CertKiller. The failover clustering solution should have the account capable of running the Microsoft Cluster Service (MSCS) assigned public rights on the SQL Server. Also. The failover clustering solution would require the Microsoft Cluster Service (MSCS) and the SQL Server to use the same service account. You need to accomplish this without affecting the availability of the SQL server.com to configure a failover clustering solution for SQL Server 2008 by configuring the pre-requirements so the clustering solution is successfully implemented. Any Time. You should consider configuring manual failover with synchronous database mirroring. Incorrect Answers: A: You should not configure automatic failover with synchronous database mirroring because automatic failover cannot be used for upgrading hardware or software. Manual failover is only supported by synchronous or high-safety mode.com 84 Ac tua lTe sts . B.com. D. B: You should not configure automatic failover with asynchronous database mirroring because automatic failover is supported only in database mirroring sessions running with a witness in synchronous or high-safety mode. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com users make use of the instance daily. Answer: C Explanation: Manual failover can be used to upgrade hardware or software without sacrificing availability. "Pass Any Exam.actualtests. You should consider configuring automatic failover with synchronous database mirroring. You should consider configuring manual failover with asynchronous database mirroring.www.

What should you do? "Pass Any Exam. You are responsible for administering a SQL Server 2008 instance. The failover clustering solution would require Microsoft Cluster Service (MSCS) to be able to verify the failover cluster instance using the LooksAlive check. you should use different service accounts for both the MSCS and the SQL Server.com Ac tua lTe sts . If the same accounts are used. A clustering solution can be implemented with SQL Server Standard version. The MSCS service must be running on at least one node in the cluster for each version. The account that runs the MSCS service is also used to run the IsAlive check. The CertKiller. Answer: A Explanation: MSCS needs to verify the failover cluster instance availability. with only two nodes.co m 85 . A database configured using a high-safety mirroring operation mode along with a witness server is hosted by the instance at CertKiller. The failover clustering solution would require Microsoft Cluster Server or the Microsoft Cluster Service (MSCS) service to be configured on all nodes in the cluster. As a recommended practice. not all nodes of the cluster. Incorrect Answers: B: You must not use the same service account for the MSCS and the SQL Server. During routine monitoring you discover that the witness server is experiencing memory failure.com. you will not be able to change the password for the MSCS service at a later date. You thus decide to reconfigure the mirroring strategy. IsAlive is performed every 60 seconds by connecting to the SQL Server. Any Time. MSCS must have public rights on the SQL Server to run the IsAlive check for its availability.Microsoft 70-450: Practice Exam C. Part 2: Design database mirroring (6 Questions) QUESTION NO: 90 You work as a database administrator at CertKiller. D: The option stating that the Microsoft Cluster Server or the MSCS service must be configured on all nodes in the cluster is incorrect.com management wants you to make sure that database unavailability is kept to a minimum. Instead. LooksAlive is a simple check performed every five seconds using the Windows NT Service Control Manager. Therefore. and SQL Server Enterprise version can be implemented with eight nodes. the IsAlive check is performed to check the availability of the failover cluster instance. The witness server will thus be offline for a few hours.com." . MSCS uses the IsAlive check to verify the failover cluster instance availability by polling the SQL Server every 60 seconds. You need to have the MSCS service running on at least one of the nodes in your cluster.www. D.actualtests. C: The MSCS does not verify failover cluster instance availability using the LooksAlive check.

Your best option would be to use Microsoft Multipath. Your best option would be to use a Transaction log backup.Microsoft 70-450: Practice Exam A. You decide to force the mirror server to become the primary server. What should you do? Answer: C QUESTION NO: 92 You work as a database administrator at CertKiller. C.www. Your best option would be to use a database snapshot. Your best option would be to make sure that the resource database is not used. D. D. Your best option would be to make sure that Transaction Logs is removed. B.Daily a differential backup is executed. Answer: A QUESTION NO: 91 You are employed as the database administrator at CertKiller. Your best option would be to make sure that the mirroring session is not used on the witness server. You need to accomplish this in the least amount of time.co m . CK_MARKETING contains the backup strategy below:Weekly a full database backup is executed.com. What will happen? "Pass Any Exam. Your best option would be to use the Windows System Resource Manager (WSRM). You are responsible for administering two SQL Server 2008 servers. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_MARKETING. Any Time. You discover that the primary server failed.actualtests. You need to determine role the primary server have with the mirror database when it comes back online.com 86 Ac tua A. You are in the process of implementing an end-of-year batch process.com.Hourly a transaction log backup is executed. You have received instruction from the CIO to configure synchronous database mirroring in highsafety mode. lTe sts ." . B. This process will take three hours to complete and will modify 10 % percent of information within CK_MARKETING. Your best option would be to make sure that the SQL Profiler trace is removed. You receive an instruction from the CIO to make sure that the batch operation is able to be rolled back. C.

It will result in no mirror and the secondary server will be identified as a standalone server. CERTKILLER-DB01 and CERTKILLER-DB02 is located at the Chicago office and CERTKILLERDB03 at the Miami office. the secondary server continues to act as a secondary server until a secondary server forces the secondary server to become the principal server.co m .www. CertKiller. The original principal server in this case will become the secondary server and roll back its logs to synchronize with the new principal server's logs. It will result in the original primary server not being recognized as part of the mirror. You are responsible for administering multiple Microsoft SQL Server 2008 servers. B. Any Time.com has its headquarters in Chicago and a branch office in Miami. C: All the other options are incorrect because the secondary server will be the principal server in the mirror in this scenario. Answer: D Explanation: When you have a synchronous database mirroring in high-safety mode and the principal server goes down. When the original principal server comes online. The original principal server will be recognized as part of the mirror. but will be the secondary server. but will be the secondary server. QUESTION NO: 93 You are employed as a database administrator at CertKiller. B: All the other options are incorrect because the secondary server will be the principal server in the mirror in this scenario.com 87 Ac tua lTe sts . but will be the secondary server. Incorrect Answers: A: All the other options are incorrect because the secondary server will be the principal server in the mirror in this scenario. The original principal server will be recognized as part of the mirror. When the original principal server comes online. the mirror will not be broken. The original principal server will be recognized as part of the mirror. When the original principal server comes online.actualtests. After the secondary server becomes the principal server and the original principal server comes back online. the mirror will not be broken. D. it may not have the latest logs for the database. CERTKILLER-DB01 hosts a database named CK_PRODUCTS. it cannot demote the new principal server back to being a secondary server." . Therefore. If a principal server goes down or disconnects from the mirror. When the secondary server becomes the principal server. C.Microsoft 70-450: Practice Exam A.com. To ensure productivity you need to make sure that the client applications in the Miami and Chicago "Pass Any Exam. It will result in the original principal server being recognized as primary server again. the secondary server becomes the principal server hosting the working copy of the mirrored database. there may be some data loss depending upon what was written from the principal server's log to the secondary server log. the mirror will not be broken. It will result in the secondary server staying the primary server in the mirror.

This can be accomplished by ensuring that clustering is enabled with the CERTKILLER-DB03.com currently makes use of Microsoft SQL Server 2008. you can have the client applications connect to the mirrored copy of the Sales database on another SQL server in the branch office. Clustering does provide failover detection and automatic failover for both system databases and user databases. Incorrect Answers: B: You should not enable clustering with CERTKILLER-DB03. This can be accomplished by ensuring that replication is enabled with the CERTKILLER-DB03. You receive an instruction from the CIO to implement a high-availability solution in the network.Microsoft 70-450: Practice Exam offices is able to make use of CK_PRODUCTS in the event of CERTKILLER-DB01 failing. What should you do? A. QUESTION NO: 94 You work as a database administrator at CertKiller." .com Ac tua lTe sts . but neither replication nor log shipping provides failure detection or automatic failover. B. This high-availability solution should include database mirroring as well as log shipping. You cannot enable clustering for the SQL servers in the different offices. In this scenario. Answer: A Explanation: Database mirroring allows failover detection of user databases. This can be accomplished by ensuring that log shipping is enabled with the CERTKILLERDB03.co m 88 . Any Time. You cannot have applications automatically fail over to a copy database with either log shipping or replication. C. With database mirroring. These servers are used to manage the database. C: You should not enable log shipping or replication with CERTKILLER-DB03. You cannot enable clustering for the SQL servers in the different offices. CertKiller. You need to determine what benefit it will result in. D.actualtests. "Pass Any Exam. You can configure the Sales database to be mirrored on the CERTKILLER-DB03 server and configure CERTKILLER-DB02 to be a witness server.com. you can configure a mirror set to automatically fail over to a secondary server when the primary server fails if a witness server is configured. Replication and log shipping can be used to make a copy of a user database. D: You should not enable clustering with CERTKILLER-DB03.www. This can be accomplished by ensuring that database mirroring is enabled with CERTKILLERDB03. Clustering does provide failover detection and automatic failover for both system databases and user databases. You can program client applications to automatically connect to the new primary servers when database mirroring is enabled.

It is not mandatory that you can have only one secondary server in log shipping D: The option stating that the mirrored database in mirroring must also be configured as a secondary database in log shipping is incorrect. QUESTION NO: 95 You work as a database administrator at CertKiller. a principal and a secondary server contain replicas of the databases on which mirroring has been configured. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller. If configuring principal server to be the primary server.com has discovered that the CERTKILLER-DB01 went down forcing the mirror to become the principal server. for log shipping. you must also configure the mirror server as the log shipping primary server if the principal server has been configured as the primary server. During the course of the day you receive instruction from CertKiller. Answer: C Explanation: You can configure a principal database in mirroring to be the primary database in log shipping.com 89 Ac tua lTe sts .Microsoft 70-450: Practice Exam What should you identify? A. you would typically have a principal server. it requires only the principal server to be configured as a primary server.www. B. Any Time. a secondary server.com currently makes use of Microsoft SQL Server 2008 for hosting databases. you must also configure the mirror database to be the primary database. you will configure mirroring before configuring log shipping. It will result in the principal database in mirroring to be configured as a primary database in log shipping. is incorrect. then a witness server as well. In most cases. The mirrored database must also be configured as a primary database if the principal database is configured as a primary database. which will be the mirror/primary database.com to configure synchronous database mirroring using high-safety mode. It will result in the mirrored database in mirroring to be configured as a secondary database in log shipping. D.com. In mirroring. which is principal/primary database combination. You later "Pass Any Exam. For mirroring to work appropriately. B: The option stating that there can be only one secondary server configured with mirroring in log shipping is incorrect. CertKiller. C. In log shipping. you can have more than one secondary server configured. you must also configure the mirror server as the primary server for log shipping.co m ." . You need to configure the principal server as the primary server. and if you need automatic failover to the secondary server. It will result in only one secondary server in log shipping when configured with database mirroring.actualtests. Incorrect Answers: A: The option stating that when log shipping is configured with mirroring. Along with configuring the principal server. In mirroring. It will result in you only requiring the principal server to be configured as primary server.

it may not have the latest logs for the database. E. it will be demoted to secondary server. Part 3: Design a high-availability solution that is based on replication (2 Questions) D: You do not have to copy the master database or the logs from the secondary server to the newly promoted principal server. "Pass Any Exam. Otherwise.actualtests. Answer: A. E: You do not have to copy the master database or the logs from the secondary server to the newly promoted principal server. When the secondary server becomes the principal server. You should consider having the jobs created on the newly promoted principal server.Microsoft 70-450: Practice Exam promoted the secondary server to be the primary server. You should consider having user logins created from the CERTKILLER-DB01 to the promoted principal server B. You would need to perform the required steps to ensure that the newly promoted principal server is accessible. You should consider having CERTKILLER-DB01 brought back online. When the secondary server becomes the principal server. The master database is not automatically mirrored from the original principal server to the secondary server. You would need to perform the required steps to ensure that the newly promoted principal server is accessible. Incorrect Answers: C: When the original principal server comes online. Since the master database is not mirrored with the secondary database. it cannot demote the new principal server back to being a secondary server. The original principal server in this case will become the secondary server and roll back its logs to synchronize with the new principal server logs. and therefore there may be some data loss. and the master database maintains user logins. depending upon what was written from the principal server's log to the secondary server log. You should consider having the log files from CERTKILLER-DB01 copied to the newly promoted server. You will have to recreate any jobs that were running on the original principal server on the newly promoted principal server. Any Time.com Ac tua lTe sts ." .B Explanation: If a principal server goes down or disconnects from the mirror. What should you do next? (Choose two) A.co m 90 .www. the users will not be able to access newly promoted principal server. D. You should consider having the master database of CERTKILLER-DB01 copied to the newly promoted server. C. the master database is not part of the database mirror. After the secondary server becomes the principal server and the original principal server comes back online. you will also have to manually create the user logins on the newly promoted principal server. the secondary server continues to act as a secondary server until a secondary server forces itself to become the principal server.

both objects are owned by Miam Hamm.com wants you to ensure that the application is configured to enable EXTERNAL_ACCESS code access security settings whilst ensuring the application is deployed with no loss of functionality.exe utility used to confirm if the code meets the typesafety requirements.Microsoft 70-450: Practice Exam QUESTION NO: 96 You work as a database administrator at CertKiller. Rory Allen has additionally created a stored procedure object in the CK_PRODUCTS database named GetProductSales which call a stored procedure in the CK_SALES database named SalePrice.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com Ac tua lTe A. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day you receive instruction from CertKiller.www. D.com. B. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. C. Rory Allen has later created a user named Mia Hamm who is a user in the CK_SALES database in the CK_PRODUCTS database. CertKiller. sts . You should consider using the File Server Resource Manager (FSRM) with static fields. Any Time. The database configuration is shown in the exhibit below: "Pass Any Exam.com. During the course of the day you add a user named Rory Allen as a member of the db_owner role in the newly created CK_PRODUCTS database." . CertKiller. You should consider using the Windows System Resource Manager (WSRM) with read write static fields. You should consider having the peverify.com currently makes use of Microsoft SQL Server 2008 for hosting databases. CertKiller.com to install a new database application to the instance. You should consider registering the VPN solution for the installation.actualtests. The new database will use SQL CLR integration to develop stored procedures.co m 91 . What should you do? Answer: A QUESTION NO: 97 You work as a database administrator at CertKiller.

Microsoft 70-450: Practice Exam What should you do? QUESTION NO: 98 You work as a database administrator at CertKiller.com. C. 92 . You later backup the transaction logs using with norecovety clause from the primary server to the secondary server.com currently makes use of Microsoft SQL Server 2008 for hosting databases.www.com Ac Explanation: Part 4: Design a high-availability solution that is based on log shipping (2 Questions) tua Answer: B lTe A. CertKiller. sts . You should consider having cross-database ownership chaining disabled. You should consider having Mia Hamm added to the db_owner database role in the CK_SALES database.co m CertKiller." . You should consider changing the authentication mode from Mixed Mode authentication to Windows security authentication. B. D. During the course of the day you receive instruction from CertKiller.actualtests. You should consider having all of Rory Allen's permissions revoked on SalePrice. Any Time.com to perform a manual role change on CERTKILLER-DB01 from a primary server to a secondary server. What should you do? (Choose two) "Pass Any Exam.com wants you to ensure that Rory Allen has the permissions checked on the SalePrice object. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.

In the current configuration CERTKILLER-DB01 is the principal server and CERTKILLER-DB02 is the mirror server. You should consider having log shipping disabled on the secondary server. D. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES and CERTKILLER-DB02 as a database mirror configured with a full quorum. Log shipping on the secondary server should be enabled. You should consider having the primary server shut down. this is an optional step.www.actualtests. Incorrect Answers: A: You should not shut down the primary server. During the course of the day you add an additional server CERTKILLER-DB03 which is configured as the witness server. B.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com has later reported that CERTKILLER-DB01 went offline and the mirror CERTKILLER-DB02 10 minutes later also goes offline. You should consider having a new primary server configured as the primary server for other secondary servers. you need to ensure that the jobs are copied and restored on the secondary server from the primary server. E. If you shut down the primary server. C: You do not need to configure a new primary server as the primary server for other secondary servers in this scenario. You should consider having the log shipping backup job disabled on the primary server.com.Microsoft 70-450: Practice Exam A. QUESTION NO: 99 You work as a database administrator at CertKiller. CertKiller. which will be the new primary server. Answer: D. You will later enable the log shipping backup job on the secondary server.E Explanation: You should perform the following two steps: Disable the log shipping backup job on the primary server. not disabled. Any Time. C. you will not be able to complete the role change process.co m . You should consider having the jobs from the primary server copied and restored to the secondary server." . CERTKILLER-DB02 became online before CERTKILLER-DB01. CertKiller. Copy and restore the jobs from the primary to the secondary server. To be able to run the same jobs on the secondary server. CertKiller.com 93 Ac tua lTe sts . B: You should not disable log shipping on the secondary server.com wants to know that the result would be when CERTKILLER-DB01 becomes online. Even though you can configure the new primary server as the primary server for the other secondary servers. What would the result be? "Pass Any Exam.

This can be accomplished using log shipping.www. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB03 as the principal server. This can be accomplished using downstream servers.C QUESTION NO: 101 "Pass Any Exam.actualtests. CertKiller.com contains two instances on the site which is as follows: There is an Enterprise Edition server instance on a server that contains a redundant array of independent disks (RAID) 10 disk system as well as a Standard Edition server instance on a server that contains a RAID 5 disk system.) A. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB02 as the principal server. Answer: B.com.The loss of information should be little." . Answer: D Explanation: Part 5: Select high-availability technologies based on business requirements (7 Questions) QUESTION NO: 100 You work as a database administrator at CertKiller.co m 94 . CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have mirrored database remaining offline. C. B. C. What should you do? (Choose all that apply.The database should be available with least amount of downtime. The instances all host a single application.com Ac tua lTe sts . CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB01 remaining the principal server. You receive a directive from management to devise a high availability solution for the site that will meet the subsequent requirements:You need to use the implementation on the current systems. This can be accomplished using replication. B. D. You are responsible for administering SQL Server 2008 servers on a single site.Microsoft 70-450: Practice Exam A. Any Time.The solution should have least effect on the current system. D. This can be accomplished using the LUN Management settings.

B. Your duties include administrating a SQL Server 2008 infrastructure. E. Answer: B. Answer: D QUESTION NO: 102 What should you do? (Choose all that apply.com. You should use the WITH NORECOVERY option to make sure that the tail of the transaction log of primary databases is backed up. D. This can be accomplished by implementing peer-to-peer replication. D. You then decide to implement a manual failover.com has its headquarters in London and branch offices in Paris.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller.C.actualtests. tua lTe You work as a database administrator at CertKiller. C." .co m . You are in the process of implementing log shipping on three SQL Server instances for numerous databases.) A.com. B. The four sites all share a mission critical database named CERTKILLER-DB09.Reduce the loss of information when server failure occurs. A new directive from management states that all users must be able to:Access and change information with the least amount of latency of all the sites. This can be accomplished by implementing the Activity Monitor tool.com 95 Ac The logs of the three SQL instances are shipped to a fourth SQL instance. Any Time.D "Pass Any Exam. You should make sure that the transaction log not applied should be backed up in sequence to every secondary database with the WITH RECOVERY option on the last log. You should make sure that the stored procedures are copied to the secondary instance. C. This can be accomplished by implementing Asynchronous database mirroring. You should make use the Synchronous database mirroring with a witness server. You thus need to determine a high-availability solution that will accomplish this. Stockholm and Athens.www. You have received instruction from the CIO to make sure that the secondary server is used by the database applications in the event of a failover. To ensure productivity you need to make sure that the latest information is available to CertKiller. What should you do? A. This can be accomplished by implementing a two-node failover cluster. CertKiller. You are responsible for administering the SQL Server 2008 instances at the four sites. sts . You should make sure that the user workstations are redirected to the secondary instance.com users to access.

You can now redirect the SQL clients to CERTKILLER-DB03.com Ac tua lTe sts A. B. the database in the primary server goes into the restoring state. The transaction logs must be restored on the secondary server. In order to start the [process you copy the database backup files from the network share to CERTKILLER-DB03. You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02 and CERTKILLER-DB03." . After CERTKILLER-DB03 is configured as the primary server.www. "Pass Any Exam. These backup files might be stored in the network share. To ensure that productivity continues you need to make sure that CERTKILLER-DB03 performs the role of the primary server. Your next step should be to configure the CERTKILLER-DB03 as the primary server for other secondary servers if they exist.actualtests. the secondary database server is synchronized with the primary server and is updated with the latest information. What is your next step? Answer: B Explanation: You need to perform the following steps to bring a secondary server online as a primary server: Copy onto the secondary server any backup files that are not already there. Any Time. To achieve this you need to take the server offline. . You decide to apply certain maintenance patches on CERTKILLER-DB02. Incorrect Answers: A: You only need to roll forward the secondary server database once you have restored the transaction logs on the secondary server. Your next step should be to restore the transaction logs on CERTKILLER-DB03. Your next step should be to disable all backup jobs on the CERTKILLER-DB02. You need to back up the transaction logs from the primary to the secondary server using the with norecovery clause. When you back up transaction logs from the primary server using the with norecovery clause.co m 96 . C.Microsoft 70-450: Practice Exam QUESTION NO: 103 You are the newly appointed database administrator at CertKiller. CERTKILLER-DB03 can be configured as the primary server for various other secondary servers.com. On the secondary server. you need apply to the transaction logs to roll the database forward. the database is not available to users. D. After you roll the database forward on the secondary server. CERTKILLER-DB02 is configured as the primary server and CERTKILLER-DB03 as the secondary server. Your next step should be to roll the database forward on CERTKILLER-DB03. In this state. You are responsible for administering the Microsoft SQL Server 2008 server.

You should consider making use of snapshot replication. D: You do not need to configure the CERTKILLER-DB03 as the primary server for any other secondary servers. There is a requirement of data filtering. In this type of replication. B. You should consider making use of peer-to-peer replication. D. You only need to disable log shipping backup jobs when you are performing a role change between the primary and the secondary server. Any Time.com. B: You should not use transactional replication. fewer Subscribers keep the read-only copy of replicated data. The Toronto network users often come to Miami and use data from the Toronto office servers. QUESTION NO: 104 You work as a database administrator at CertKiller. You should consider making use of transactional replication. This type of replication is used when you need to replicate a large volume of information.com 97 Ac tua Explanation: Merge replication has the ability to resolve conflicts that may occur during the replication. You typically use merge replication when: lTe sts A.Microsoft 70-450: Practice Exam C: You do not need to disable all backup jobs on the primary server. CertKiller. you can filter different updates to different Subscribers at different locations.actualtests. This type of replication is typically used when you need high availability and scalability. You require the ability to resolve conflicts that occur during replication. CertKiller. This type of replication does not have the ability to resolve conflicts that may occur during replication updates. This step is not required while you are bringing the secondary server online. Incorrect Answers: A: You should not use peer-to-peer replication. This type of replication does not have the ability to resolve "Pass Any Exam. You are responsible for administering multiple database servers located in Miami and branch office at Toronto.co What should you do? m . C: You should not use snapshot replication. This type of replication does not have the ability to resolve conflicts that occur during replication updates.com currently makes use of Microsoft SQL Server 2008 for hosting databases. ." . Answer: D You must replicate information to mobile users who are not always connected to the SQL Server. C. In data filtering. You should consider making use of Merge replication.com wants you to configure data replication between the Miami servers and Toronto servers whilst ensuring the replication type used has the ability to resolve conflicts occurring during replication.www.

CertKiller. D. What should you do? (Choose all that apply) A. You should consider making use of replication.D Explanation: You can configure the following high availability solutions for a database that contains a varbinary ( max) column: Log shipping: This high availability solution works with the databases that have FILESTREAM data in the vat binary (max) column. you will be prompted with an error. You should consider making use of log shipping. Each server must be running SQL Server 2008 with FILESTREAM enabled.com currently makes use of Microsoft SQL Server 2008 for hosting databases. E: You cannot configure database mirroring for the database that contains FILESTREAM data in a varbinary (max) column. If mirroring does not support a database with the FILESTREAM data. When you attempt to create a database snapshot of the database that contains FILESTREAM data. FILESTREAM filegroups are not supported on the principal server in a mirroring configuration. You must enable FILESTREAM in both the primary and the secondary servers.www. You should consider making use of failover clustering. C. Replication: In merge replication.C. the "Pass Any Exam. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. a uniqueidentifier data type column is automatically added to tables that do not contain this data type. CertKiller. A UNIQUE constraint must also be defined for the column along with ROWGUIDCOL property set.co m 98 . QUESTION NO: 105 You work as a database administrator at CertKiller. B. You should consider making use of database snapshots. During the course of the day you receive instruction from CertKiller. the solution will not work. You should consider making use of database mirroring. E. Answer: A. Each node in the cluster must have FILESTREAM enabled for it to work successfully in a clustered environment.com." .com to add a column to the SaleData table which has a varbinary(max) column containing the FILESTREAM data files on the CK_SALES database.com Ac tua lTe sts . Incorrect Answers: B: You cannot configure database snapshots for the database that contains FILESTREAM data in a varbinary (max) column. Any Time. Failover clustering: This high availability solution requires FILESTREAM data to be hosted on a shared disk so that it can be accessible by all nodes in the cluster.actualtests. If any of the required prerequisites are not met.com wants you to configure a high availability solution for the database.Microsoft 70-450: Practice Exam conflicts that may occur during replication updates.

com additionally configured a server named CERTKILLER-DB03 as the witness server. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. only the witness "Pass Any Exam.www. Without the witness server. Therefore. CERTKILLER-DB03 going offline would result in CERTKILLER-DB01 and CERTKILLER-DB02 moving into partner-to-partner quorum. However. Both the principal. If there is no witness server and there is partner-to-partner quorum.com to add an additional server named CERTKILLER-DB02 and configure a database mirror which uses the full quorum. automatic failover will not be supported. B. QUESTION NO: 106 You work as a database administrator at CertKiller. D.com has configured CERTKILLER-DB01 as the principal server and CERTKILLER-DB02 as the mirror server. CertKiller. If this occurs.co m 99 .actualtests. During the course of the day you receive instruction from CertKiller. CertKiller. will move into a partner-to-partner quorum.Microsoft 70-450: Practice Exam secondary server will also not be able to support it. and this solution will not work when you have FILESTREAM data. CERTKILLER-DB03 going offline would result in the database going offline. If both principal and mirror lose the quorum.com wants to know what would occur if CERTKILLER-DB03 went offline.com. the witness server will assign the role of the principal server to the mirror server. CertKiller. the full quorum is no longer used. which is CERTKILLER-DB02." . database mirroring cannot be configured with a database that has FILESTREAM data and filegroups. CertKiller. Incorrect Answers: A: CERTKILLER-DB02 is the mirror server and will not become the principal server. the database will be offline and the witness server will not be available. lTe sts .com currently makes use of Microsoft SQL Server 2008 for hosting databases. the mirror server must be assigned the role of principal server by the administrator using the manual failover process. What would your reply be? Answer: B Explanation: When a witness server goes offline. in the scenario. CERTKILLER-DB03 going offline would result in CERTKILLER-DB02 becoming the principal server. C. The mirror server resumes the role of a principal server only when the principal server is no longer available. and mirror. C: The database will not go offline. which is CERTKILLER-DB01.com Ac tua A. Any Time. CERTKILLER-DB03 going offline would result in CERTKILLER-DB01 having the only copy of the database. A database administrator will have to perform manual failover if the principal server becomes unavailable. Only when the witness server is back online will the automatic failover be possible.

What should you do? Answer: A QUESTION NO: 108 CertKiller. If you have a full quorum and witness server goes down. Your best choice would be to make use of the Transaction log backup. There are two tape devices from different manufacturers in CERTKILLER-DB01.com. C. You are responsible for administering a SQL Server 2008 instance that hosts a database named CK_SALES.The recovery plan necessitates that you execute an unscheduled full backup. You have received instruction from the CIO to ensure that data restored as soon as possible in the event that an error occur. D. QUESTION NO: 107 You are the newly appointed a database administrator at CertKiller. Any Time. D: The principal server will not have the only copy of the database." . You thus need to confirm that the information on the backup of CK_PRODUCT can be "Pass Any Exam. Both the mirrored server and the principal server will have a copy of the database.com 100 Ac tua A. you will then have a partner-to-partner quorum. . Your best choice would be to make use of the database snapshot. A partner-to-partner quorum exists between CERTKILLER-DB01 and CERTKILLER-DB02. the tape devices make use of the same media and have the same capacity. You need to accomplish this tasks without the scheduled backup strategy being disrupted.com has hired you as a database administrator for their network.actualtests. lTe sts You receive an instruction from the CIO to execute a full database backup. B.com currently makes use of Microsoft SQL Server 2008 for hosting databases.co m .The execution of differential database backups every day.The execution of transactional log backups on an hourly basis. Your best choice would be to make use of the COPY_ONLY backup option. CertKiller. For a copy of the database to exist only on the principal server. the database is available on the principal server.www. Your best choice would be to make use of the Hyper-V feature. CK_SALES contains the subsequent backup strategy:The execution of full database backups on a weekly basis. However.Microsoft 70-450: Practice Exam server goes offline. and therefore the database does not go offline. you must remove the witness from the quorum so that if the mirror server goes down. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_PRODUCT that stored highly confidential data.

Then the stop_on_error keyword can be used during the backup." . B. Any Time. What should you do? A. the other device can still proceed with the backup. Checksum is present on the media. The restore verifyonly statement does not guarantee that the data can be recovered. You should consider configuring a mirrored backup media sets. B: You cannot create a mirrored backup media sets using the checksum keyword or the stop_on_error keyword during the backup. Incorrect Answers: A: You cannot create a mirrored backup media sets using the checksum keyword or the stop_on_error keyword during the backup.Microsoft 70-450: Practice Exam restored as well as ensuring that the information is not corrupted. Answer: D Explanation: The checksum keyword verifies each page for checksum and torn page errors and will generate a checksum for the entire backup. This is the default behavior and does not need to be specified. Then the stop_on_error keyword can be used during the backup. Volumes are all readable. C. You "Pass Any Exam. but not the same model. You should consider configuring a mirrored backup media sets. The backup will be flagged as containing backup checksums in the backupset table in the MSDB database.co m 101 . Then the checksum keyword can be used during the backup. Then checksum keyword can be used during the backup. D. The stop_on_error keyword is used to stop a backup if a checksum does not verify. You should consider creating a media set. A mirroring backup media set can increase the reliability of the backup by reducing the possibility of a backup-device malfunction. You should consider creating a media set. The tape devices used on CERTKILLER-DB01 are similar. A mirrored backup set can only be created if the tape devices are from the same manufacturer and have the same serial number. To verify the backup.www. If a malfunction occurs in one device. This command can be used to determine database integrity problems that could compromise the backup set.actualtests. but not the same model. A mirroring backup media set can increase the reliability of the backup by reducing the possibility of a backup-device malfunction. the other device can still proceed with the backup. The tape devices used on CERTKILLER-DB01 are similar. you should use restore verifyonly . The destination drive has sufficient space to restore. A mirrored backup set can only be created if the tape devices are from the same manufacturer and have the same serial number.com Ac tua lTe sts . This command is used to determine if the following conditions are met: The backup set is complete. If a malfunction occurs in one device.

Microsoft 70-450: Practice Exam should add the checksum keyword in the backup statement to ensure that checksums are performed. You should consider making use of the witness-to-partner quorum only. and then resynchronizes its copy of the database when the mirror server returns. C: You should not create a media set and use the stop_on_error keyword during the backup. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. it becomes the mirror server. if the mirror server fails. . D. Any Time. You also cannot create a mirrored backup media sets using the checksum keyword during the backup. Answer: A Explanation: In this scenario. the mirror server takes over the role of the principal server. You should consider making use of the partner-to-partner quorum only. B.com Ac tua lTe sts A. C. There is automatic failover initiated by the witness server and the mirror server will be designated as the principal server. the principal server continues with the witness server. If the mirror server is out of quorum. "Pass Any Exam. During the course of the day you receive instruction from CertKiller." . QUESTION NO: 109 You work as a database administrator at CertKiller. You should consider making use of the full quorum only. meaning the database is currently not being mirrored with its mirrored copy. You should consider making use of the full quorum of the witness-to-partner quorum. However.www. there is either a principal or a mirror server and one witness server. When the principal server comes online in the quorum. a principal server. If the principal server fails. You can set either of the two quorums for the automatic failover to the mirror server if principal server is out of quorum.com to set up database mirroring with a witness server whilst ensuring that automatic failover to the mirror server is available when CERTKILLER-DB01 goes down.co What should you do? m 102 .com currently makes use of Microsoft SQL Server 2008 for hosting databases. Witness-to-partner quorum: In this quorum. Three types of quorums can be configured: Full quorum: In full quorum.actualtests. In another condition where the principal server fails. This is the default behavior and does not need to be specified. either full quorum or witness-to-partner quorum would meet the requirement. and a mirror server. All three servers interact with each other in a full quorum.com. there are three servers involved: a witness server. the principal server suspends mirroring. the principal server keeps the database in an exposed state. On the other hand. the witness server initiates the automatic failover and the mirror server is assigned the role of principal server. CertKiller. no_checksum is the default.

CertKiller. and therefore does not have the capability for automatic failover." . To support automatic failover. You should consider having the database mirroring session configured to run in synchronous mode. However. unclustered computer. You should consider having the database mirroring sessions stored on a single computers. CertKiller. When you use database mirroring with failover clusters. Partner-to-partner quorum does not have a witness server. What should you do? (Choose all that apply) A. C: For an automatic failover to be applicable in a quorum. You should consider having the database mirroring sessions stored on different computers. and therefore does not have the capability for automatic failover. both the principal server and mirror server should reside on different clusters. Any Time. A database administrator will have to perform manual failover if the principal server becomes unavailable. the database mirroring sessions can be configured for automatic failover.actualtests. During the course of the day you receive instruction from CertKiller.co m . automatic failover will not be supported. C.com. D: For an automatic failover to be applicable in a quorum. a witness server must be present.com 103 Ac tua lTe sts .www. E. Without the witness server. there is no witness server. You should consider having the database mirroring session configured to run in asynchronous mode D. Partner-to-partner quorum does not have a witness server. the "Pass Any Exam. When you want to use database mirroring with failover clusters. a witness server must be present. Answer: A.D Explanation: Failover clusters provide high availability for an entire instance of SQL server.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Only when the witness server is back online will automatic failover be possible.B. You should consider having the database mirroring session configured with a witness server. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. a mirroring session can also be established when one partner resides on the failover clustered instance of a cluster and the other partner resides on a separate. B. whereas database mirroring provides high availability for a single database. QUESTION NO: 110 You work as a database administrator at CertKiller.com to configure high availability for the CK_SALES database by using database mirroring.com has additionally requested that you configure automatic failover database mirroring sessions whilst improving reliability of the automatic failover.Microsoft 70-450: Practice Exam Incorrect Answers: B: Partner-to-partner quorum: In this quorum.

and sysalerts tables for CERTKILLER-DB01 copied to the appropriate database on CERTKILLER-DB02 to move the operators and alerts.actualtests. To improve the reliability of automatic failover. B. CertKiller. a transaction is committed on both servers. Manual failover can be used to perform a rolling upgrade to the server operating system or SQL Server instances. You should consider having the model database on CERTKILLER-DB01 backed up and restore the master database on CERTKILLER-DB02 to move the operators and alerts. Any Time.com is aware that both servers are running the same build and edition of SQL Server 2008 with different hardware. Incorrect Answers: C: The option stating that the database mirroring session must be running in asynchronous mode is incorrect. When both the principal and mirror databases are stored on a single computer. In synchronous or high-safety mode. To support automatic failover. This will not guarantee that the mirror database is updated with all the transactions committed on the principal database. which ensures that the mirror database is in synchronization with the principal database. "Pass Any Exam. E: The option stating that the principal database and the mirror database must be stored on a single computer is incorrect because this will not improve the reliability of automatic failover. sysnotifications.Microsoft 70-450: Practice Exam database mirroring session must be running with a witness in synchronous or high-safety mode. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore the msdb database on CERTKILLER-DB02 to move the operators and alerts. you must ensure that you upgrade the mirror server first before initializing mirroring. What should you do? A. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com to move all the operators and alerts from CERTKILLER-DB01 in the testing environment to a server named CERTKILLER-DB02 in the production environment. In asynchronous or high-performance mode. To achieve this. QUESTION NO: 111 You work as a database administrator at CertKiller. automatic failover will not occur. both the databases will become unavailable if the computer fails. SQL Server 2008 also allows you to configure manual failover. the transactions commit without waiting for the mirror server to write the log to disk. You should consider having the sysjobs.co m . the principal database and the mirror database must reside on different computers. the database mirroring session must be running with a witness in synchronous or high-safety mode.com." .www. You should consider having the master database on CERTKILLER-DB01 backed up and restore the master database on CERTKILLER-DB02 to move the operators and alerts. Manual failover is only supported by synchronous or high-safety mode. C. During the course of the day you receive instruction from CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com 104 Ac tua lTe sts . D. CertKiller. In this case.

this data can be mirrored from the principal server to the mirrored server. a principal server. in this case. to track transaction log updates from the primary to the secondary "Pass Any Exam. Snapshots are typically used for reporting purposes.Microsoft 70-450: Practice Exam Answer: D QUESTION NO: 112 You work as a database administrator at CertKiller. there are three servers involved: a witness server. If the principal server fails. C. If the mirror server fails. you can bring the snapshot online but ensure that it is on the same SQL Server instance from where the snapshot was created. You could also have a monitor server. D. This solution will not meet the requirement stated in the scenario. the mirror server takes over the role of the principal server and automatic failover is initiated by the witness server.com.co m 105 . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts several databases containing mission critical data." . During the course of the day you receive instruction from CertKiller. You should consider configuring log shipping. will be designated as the principal server. it will not be a part of the snapshot. Log shipping will not help you revert to the database from the point where you had taken the backup of the source database. Answer: D Explanation: To meet the required goal in the scenario. Log shipping is used for backing up transaction logs from the primary to the secondary server. If you have a snapshot readily available and there is any issue with the database. Any Time. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com Ac tua lTe sts .www. If there is any open and uncommitted transaction on the database.com to have the flexibility to revert the source database back to a specific point if there is any error in the database whilst ensuring you are capable of retrieving historical data and use the data for reporting and the backup should also be used for reporting purposes. Only committed transactions are part of the snapshot. In a full quorum. If there is an error in the database or erroneous data in a table. B: You should not use log shipping. What should you do? A. You should consider creating a database snapshot. and a mirror server. Snapshots provide a read-only image of the database that has a full working image of the database from the time when the snapshot was created.actualtests. B. which will be the third server. Incorrect Answers: A: You should not mirror the database with a full quorum. the principal server suspends mirroring. you should create a database snapshot. and then resynchronizes its copy of the database when the mirror server returns. You should consider creating a full backup. The mirror server. All three servers interact with each other. You should consider having the database mirrored using a full quorum.

www. you can still make a backup of the transaction log.Microsoft 70-450: Practice Exam server. Any Time. C: You should not create a full back backup of the database. "Pass Any Exam.com 106 Ac A. C. If the transaction log file is on a different drive than the database files and the drive that contains the database files fails.A Transaction Log backup will run every day at 08:00 am.co m . this data can be mirrored from the primary server to a secondary server.A Transaction Log backup will run every day at 14:00 pm. You should consider increasing the frequency of the transaction log backups. You configure the backup schedule for CK_PRODUCT as follows:A full backup will run on Mondays. D. you cannot recover the database up to the point of failure. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You can use report snapshots to maintain historical reports. You receive an instruction from the CIO to add a read-only filegroup to the CK_PRODUCT that will enclose historical data. If the transaction log is on the same drive as the database files and the drive fails. you should do the following: Restore the latest full backup by typing RESTORE DATABASE CK_PRODUCT FROM full database backup WITH NORECOVERY. You should consider increasing the frequency of the differential backups. This solution will not meet the requirement stated in the scenario. tua lTe sts . referred to as a tail-log backup. What should you do? Answer: A Explanation: Not only should you have the transaction log on a different drive than the data files for performance reasons. You should consider moving the transaction log to another drive than that of the data files. you typically do not use a backup for reporting purposes. Wednesdays and Fridays at 02:00 am. In the event of a failure you need to be able to restore CK_PRODUCT up till the point of failure. you should have them on different drives for recovery purposes. To perform a complete restore up to the point of failure.actualtests. CK_PRODUCT is spanned across multiple disks.com. QUESTION NO: 113 You work as a database administrator at CertKiller. B. You should consider adding a filegroup backup of the read-only database. Even though backup will be used if the database or the entire server goes down. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_PRODUCT. Thursdays and Saturdays at 01:00 am." . If there is an error in the database or erroneous data in a table.A differential backup will run on Tuesdays. You need to determine a way to achieve this.

www.bakl'MIRROR TO DISK = 'F:\SQL2008\CK_Orders. "Pass Any Exam. You are responsible for a database server named CERTKILLER-DB01 that hosts a database named CK_ORDERS. There are two tape devices from different manufacturers in CERTKILLER-DB01. you will not restore the database back to the point of failure. Recover the database by typing restore database CK_PRODUCT with recovery. However. Repeat this restore-log step for each additional log backup since the last differential backup Restore the tail-log backup that you created after the database failure by typing restore log CK_PRODUCT from taillog_ backup WITH NORECOVERY. unless you can create a tail-log backup as well. A filegroup backup may not allow the database to recover to the point of failure.bak2'WITH MEDIANAME = 'CK_OrdersSetl'. CertKiller.com.com 107 Ac tua You work as a database administrator at CertKiller. Any Time. Restore the transaction logs from the last differential in order by typing restore log CK_PRODUCT from log_backup with NORECOVERY. Incorrect Answers: B: You should not Increase the frequency of transaction log backups or increase the frequency of differential backups. lTe sts .co m . the tape devices make use of the same media and have the same capacity. QUESTION NO: 114 At present CK_ORDERS is configured to run a full backup daily and transaction log backups hourly. You decide to implement mirrored backup media sets to accomplish this. Increasing the frequency of the transaction log backups and differential backups will help to recover data. The hard drives in CERTKILLER-DB01 are the same model and have the same capacity. However. C: You should not Increase the frequency of transaction log backups or increase the frequency of differential backups. Increasing the frequency of the transaction log backups and differential backups will help to recover data. decrease the chances of data loss as well as reduce the impact of backup-device malfunctions. You will need a tail-log backup to get the database back to the point of failure. Management wants you to increase the reliability of the backups. BACKUP DATABASE CK_ORDERS TO DISK ='E:\SQL2008\CK_Orders.com currently makes use of Microsoft SQL Server 2008 for hosting databases.actualtests. you will not restore the database back to the point of failure. The checksun keyword is included in all backup statements." . However.Microsoft 70-450: Practice Exam Restore the latest differential backup since the last full backup by typing restore database CK_PRODUCT from full_differential_backup WITH NORECOVERY. How can this be accomplished? A. unless you can create a tail-log backup as well. D: You should not add a filegroup backup.

You should have the backup devices on separate drives.Microsoft 70-450: Practice Exam B. CERTKILLER-DB01 has two tape drives from different manufacturers.\tape0'MIRROR TO TAPE = '\\.com has its headquarters in London and a branch office in Paris. Answer: A Explanation: You should use the backup database statement to specify that you will back up the Sales database. D: You should not use the following statement because backup devices are being created on the same drive:BACKUP DATABASE CK_ORDERS TO DISK = 'E:\SQL2008\CK_Orders. C: You should not use either statement that uses the sp_addbackupdevice statement. CertKiller.co m . BACKUP DATABASE CK_ORDERS TO TAPE = '\\. This stored procedure was deprecated in SQL Server 2000." . the backup devices must have the same model number and be from the same manufacturer. sp_addbackupdevice media= 'CK_OrdersSetl". Any Time. then both of your backup devices will be affected. However.bakl'MIRROR TO DISK = 'E:\SQL2008\CK_Orders.www.com. The Athens office is allocated a new SQL server. however.com 108 Ac tua lTe sts .\tape1'WITH MEDIANAME = 'CK_OrdersSet1'. but multiple hard drives that are from the same manufacturer and are the same model. You cannot use this stored procedure in SQL Server 2008.\tapel'WITH MEDIANAME = 'CK_OrdersSetl'. not with the tape drives. You receive an instruction from the CIO to ensure that a full backup of CK_DATA is shipped from the Athens office to the London office weekly. You can mirror backup devices on the same drive.bak2'WITH MEDIANAME = 'CK_OrdersSetl'. You must also specify the Mirror TO clause. In this scenario.bak2'WITH MEDIANAME = 'CK_ORdersSet1'. You need to determine the statement the server operator should enter at the Athens office in order "Pass Any Exam. You can mirror to disk or tape. C.\tape1'. Incorrect Answers: B: You can create a mirrored media set with the hard drives in CERTKILLER-DB01. Due to company growth the company opens another branch office in Athens. you should not use the following statement:BACKUP DATABASE CK_ORDERS TO TAPE = '\\. device='\\. QUESTION NO: 115 You work as a database administrator at CertKiller. Therefore. device='\\. You are responsible for administering the Microsoft SQL Server 2008 servers. MIRROR DEVICE D. You need to make sure that the shipped backup does not have any effect on the scheduled backups for CK_DATA.actualtests.bak1'MIRROR TO DISK = 'E:\SQL2008\CK_Orders.\tape0'MIRROR TO TAPE = '\\. if there is an error with the drive. BACKUP DATABASE CK_ORDERS TO DISK = 'E:\SQL2008\CK_Orders.\tape0'.

BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data. In this scenario. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.com wants the backup to be part of the regular backup routine whilst "Pass Any Exam. This type of backup is independent of the sequence of any current backups.com. NOREWIND. QUESTION NO: 116 You work as a database administrator at CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. the copy only parameter is ignored.bak'.actualtests. NOUNLOAD. The SQL server operator should include the copy_only parameter to perform a copy-only backup that will not interrupt the sequence of backups. NOREWIND. COPY_ONLY Answer: C Explanation: In this scenario. [FullBackup] WITH NOFORMAT.bak'. NOUNLOAD C. [FullBackup] WITH NOFORMAT. NOINIT. DIFFERENTIAL B.bak'.com 109 Ac tua lTe sts .Microsoft 70-450: Practice Exam to execute the backup. COPY_ONLY D. DIFFERENTIAL. NAME = N'CK_DATA Full Database Backup'. NOREWIND. SKIP. NAME = N'CK_DATA Full Database Backup'.www." . NOREUIND. Any Time. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data. D: This statement will perform a differential backup.bak'. B: This statement will perform a full backup that could disrupt the regular sequence of backups that are performed in the Atlanta office.com to create a script to make a backup of the changed data only since the last full backup of the CK_DATA database. you need a full backup not a backup of everything that has changed since the last backup. NAME = N'CK_DATA Full Database Backup'. CertKiller. Copy-only backups are useful for making a backup to transport to another location because they will not affect the current sequence of regular backups. NOINIT. NOUNLOAD. CertKiller.co m . Incorrect Answers: A: If the differential parameter and copy only parameter are used together. NOINIT. NAME = N'CK_DATA Full Database Backup'. [FullBackup] WITH NOFORMAT. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data. What should you identify? A. During the course of the day you receive instruction from CertKiller. NOINIT. SKIP. NOUNLOAD. [FullBackup] WITH NOFORMAT. SKIP. the SQL server operator should create a copy-only backup. SKIP.

NOREWIND. init -initializes the media and does not allow backups to be appended to media.bak'. DIFFERENTIAL B. the COPY_ONLY parameter is ignored.bak' [Fullback] WITH INIT. it resets the base backup. Any Time. If both of these parameters are in the statement. COPY_ONLY D. NAME = N'CK_DATA-Full Database Backup'. NOUNLOAD. NAME = N'CK_DATA-Full Backup'. This statement also includes the differential parameter and the copy_only parameter.Microsoft 70-450: Practice Exam continuing to append the backup to the media. SKIP. differential -backs up only the portions of the database or file that have changed since the last full backup." . you would disrupt the regular backup schedule. NOINIT. A differential backup takes all data that has changed since the last full backup. noinit -does not initialize the media and allows backups to be appended to media.co m 110 . NOINIT. the copy_only parameter is ignored and the differential parameter is used. noformat -does not format the media.bak'. Differential and Transaction log backups. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.www. COPY_ONLY. disk -specifies the destination of the backup. "Pass Any Exam.bak'. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA. Answer: D Explanation: This statement will perform a differential backup that will back up the changes made in the database since the last full backup. What should you do? A. [Fullback] WITH NOFORMAT. If you were to perform another full backup in between the current backup sequence of Full. You can use the backup database command to back up a database. [Fullback] WITH NOFORMAT. DIFFERENTIAL. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA. NOREUIND. NOREWIND. SKIP. If the DIFFERENTIAL parameter and COPY_ONLY parameter are used together. NAME = N'CK_DATA-Full Database Backup'. NOREHIND. You should consider adding the statement below in the script: BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA. [Fullback] WITH NOFORMAT. SKIP. The following are options with the backup database command: copy_only -allows a copy-only backup. NOUNLOAD.actualtests. NOUNLOAD C.com Ac tua lTe sts . NOUNLOAD. NOINIT. name -specifies name of the backup. Copy-only backups are useful for making a backup to transport to another location because it will not affect the current sequence of regular backups. When you perform a full backup. NAME = D'CK_DATA-Full Database Backup'. SKIP.

you were required to append backups. Any Time. The scenario required you to make a differential backup. B.www. Answer: C QUESTION NO: 118 You are employed as a database administrator at CertKiller. In this scenario. The scenario required you to make a differential backup. which will not append backups. D. norewind -does not rewind media. Your best option would be to configure caching on the shared folder. UPDATE or DELETE statements. You are in the process of implementing a backup strategy.actualtests. m QUESTION NO: 117 111 .Microsoft 70-450: Practice Exam skip -Ignores the backup set expiration.A minimum amount of disk space should be used by the transaction log.com. Your best option would be to make use of Storage Reports Management snapshots.com Ac tua lTe Data modifications are executed via stored procedures that make use of the INSERT. You are responsible for administering a SQL Server 2008 server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. but this statement also contains the INIT parameter. Part 2: Design a recovery strategy (27 Questions) What should you do? A. Your best option would be to make use of the full-recovery model in conjunction with transaction log backups. NOUNLOAD -does not unload media after the backup operations is complete. C: This statement will perform a differential backup. Incorrect Answers: A: This statement will not perform a differential backup. but will perform a full backup instead. sts . but will perform a full backup instead. You are responsible for administering a SQL Server 2008 database solution. B: This statement will not perform a differential backup. In this scenario. Management wants you to make sure that the subsequent requirements are met:Point-in-time recovery in the event of failure should be supported at any time. Your best option would be to make use of Microsoft Multipath in conjunction with differential backups. This statement also contains the INIT parameter. which will not append backups.co You work as a database administrator at CertKiller. C.com." . you were required to append backups. "Pass Any Exam.

Microsoft 70-450: Practice Exam The table below displays the backup strategy used CK_DATA: You decide to run a batch process on Saturday from 20:00 pm to 22:00 pm.actualtests.co m . This strategy needs to be validated.com 112 Ac tua lTe A. "Pass Any Exam. Then restore the differential backup that was executed on Friday. sts . B. This can be accomplished by use a two-node failover cluster. C. You need to determine the tasks that need to be included. Thereafter the entire database should be restored. Thereafter the transaction logs should be restored from the time of the differential backup on Friday and stop at 20:00 pm on Saturday. This can be accomplished by restoring the full database backup that was executed on Thursday. This can be accomplished by installing a failover cluster that contains one node. D." . You need to accomplish this task in the least amount time. What should you do? Answer: B QUESTION NO: 119 CertKiller. You should consider using the cluster group. This can be accomplished by using the Windows System Resource Manager (WSRM).) A.com has hired you as a database administrator for their network. You are in the process of implementing a corporate backup and recovery strategy. Your duties include administering the SQL Server 2008 infrastructure.www. It has come to your attention that the batch process is invalidated. Any Time. Management wants you to restore CK_DATA to the state prior to the start of the batch process. This occurred when a client modified data on Saturday at 20:10 pm. B. What should you do? (Choose all that apply. You should consider scripting the SQL login accounts as well as the credentials. Management wants you to guarantee the successful recovery of a single database from a disastrous failure without needing a backup data center in another location.

Microsoft 70-450: Practice Exam C. You should consider using the SQL Server registry hive. D. You should consider documenting the administrative processes as well as the application access requirements. E. You should consider storing the backup media offsite. Answer: B,D,E

QUESTION NO: 120 You are employed as a database administrator at CertKiller.com. You are responsible for administering the SQL Server 2008 servers for the organizations. You are assigned a database server named CERTKILLER-DB01 with an instance named CK_SALES. During routine monitoring you discover that the disk containing the FILESTREAM filegroup has failed. You ordered a replacement disk but will only be available in seven days. You do not anticipate new information to be added to the database the following seven days. You attempt to execute a partial restore on CK_SALES. You are able to restore the filegroups excluding for the FILESTREAM filegroup. You then decide to execute a point-in-time restore, however, it fails. You need to determine a way to successfully restore the filegroup.

A. In order to make the make the point-in-time restore succeed you need to specify the continue_after_error option in conjunction with stopat, stopatmark, or stopbeforemark. B. In order to make the make the point-in-time restore succeed you need to specify the checksum option in conjunction with stopat, stopatmark, or stopbeforemark. C. In order to make the make the point-in-time restore succeed you need to specify the checksum option in conjunction with the standby option. D. In order to make the make the point-in-time restore succeed you need to specify the continue_after_error option in conjunction with the standby option. Answer: A Explanation: When performing a partial restore that requires a point-in-time restore you must include one of the stopat , stopatmark , or stopbeforemark options. If a FILESTREAM filegroup is excluded from a point-in-time restore, the point-in-time restore will fail. For the point-in-time restore to continue, you can specify the continue_after_error option together with the stopat , stopatmark , or stopbeforemark . This will allow the restore to continue, but the FILESTREAM filegroup will become unrecoverable. In this scenario, the database on the CERTKILLER-DB01 instance will be able to operate until the new disk arrives, after which you can begin a full restore. Any data that has been added to the database after the partial restore was performed would have to be "Pass Any Exam. Any Time." - www.actualtests.com 113

Ac

tua

lTe

What should you do?

sts

.co

m

Microsoft 70-450: Practice Exam recreated. Incorrect Answers: B: You should not specify the checksuh option together with the stopat, stopatmark, or stopbeforemark options. The checksum option checks each page for checksum verification and torn page corruption and will generate a checksum for the entire backup. The backup will be flagged as containing backup checksums in the backupset table in the msdb database. This option will not help a point-in-time restore succeed if a FILESTREAM filegroup is not available for restore.C; D: You should not specify checksum option or the continue_after_error option together with the standby option. The standby option backs up the tail of the log, but leaves the database in read-only state. This option requires a standby file that holds the standby data of rollback changes. In this scenario, the STANDBYoption will not help a point-in-time restore succeed if a FILESTREAM filegroup is not available for restore.

Management wants you to make sure that you are able to restore CK_SALES in the event of a disaster. You thus need to determine the appropriate changes that have to be made to the script to accomplish this. What should you do? A. This can be achieved by using a mirrored media set for backup. B. This can be achieved by using an extra drive to mirror drive Z. C. This can be achieved by removing the continue_after_error keyword from the backup database statement. D. This can be achieved by adding the compression keyword in the backup database statement. Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

BACKUP DATABASE CK_SALES TO DISK=' Z:\CK_Backups\CK_SALES1.bak', CONTINUE_AFTER_ERROR GO

lTe

CERTKILLER-DB01 contains a number of identical drives from the same manufacturer. CK_SALES contains the FILESTREAM data and makes use of the full recovery model. The script below is used to backup CK_SALES:

sts

.co

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES.

m

QUESTION NO: 121

114

Microsoft 70-450: Practice Exam Explanation: The continue_after_error keyword is used to allow a backup to finish if an error is encountered. If you have FILESTREAM data in the backup, the FILESTREAM data many not recover all data if an error is encountered during the backup. The default setting of the backup database statement is stop_on_error . Incorrect Answers: A: You should not use a mirrored media set for backup. A mirrored media set for backup can be used to have fault tolerance with your backup devices. The devices should have the same manufacturer and be the same model. If there is an error with a page or object in the database, a mirrored media set will not prevent the error from being written to both backup devices. B: You should not create a mirror drive for drive Z. A mirrored drive will provide fault tolerance in case one drive fails. However, if your backup device is on a mirrored drive and the backup encounters errors with a page or object in the database, the mirrored drive will not prevent the errors from being written to the backup device. D: You should not add the compression keyword in the backup database statement. This keyword can be used to get more data on a backup device, but does not prevent errors from being written to the device.

QUESTION NO: 122

You receive an instruction from the CIO to restore a backup of the CK_ORDERS onto a second SQL Server 2008 server in a test environment. However, your attempt to restore the backup fails. You thus need to determine what needs to be restored in order to rectify the error. What should you do? A. You should consider restoring the database master key. B. You should consider restoring the SSL session key. C. You should consider restoring the service master key. D. You should consider restoring the SSL certificate. Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

You enable Transparent Data Encryption (TDE) on CK_ORDERS. You decide to test a new application that will be responsible for updating records in CK_ORDERS. The new application will require:The TCP/IP network library.SSL encryption established on the server to guarantee a secure connection.

tua

lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for a database server named CERTKILLER-DB01 hosts a database named CK_ORDERS.

sts

.co

m

115

Microsoft 70-450: Practice Exam Explanation: You must restore the service master key onto the second SQL Server 2008 server. The restore operation failed in this scenario because the correct server certificate cannot be found and the encrypted data is inaccessible. Although TDE encryption is completely transparent to client applications, the data is encrypted and backup cannot be restored to other servers without the server master key. When the service master key is restored, SQL Server can decrypt all keys that been encrypted with the current service master key, including the database master key. Incorrect Answers: A: You should not restore the database master key. The entire user database is secured by the database master key. However, you will need to restore the service master key to decrypt the database master key. Restoring the service master key allows SQL Server to decrypt all keys that have been encrypted with the service master key. B: You do not need to restore the SSL session key or the SSL certificate. In the scenario, the application requires a secure SSL connection to the SQL Server. Enabling a secure connection between the application and the SQL Server will not cause an error in restoring a database. The error is caused because the data is encrypted and the backup cannot be restored to other servers without the server master key. If you need to force encryption between a client and a SQL Server, you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL Server instance. D: You do not need to restore the SSL session key or the SSL certificate. In the scenario, the application requires a secure SSL connection to the SQL Server. Enabling a secure connection between the application and the SQL Server will not cause an error in restoring a database. The error is caused because the data is encrypted and the backup cannot be restored to other servers without the server master key. If you need to force encryption between a client and a SQL Server, you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL Server instance.

QUESTION NO: 123 DRAG DROP

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a SQL server named CERTKILLER-DB01. You are in the process of performing daily full backups to all the databases on CERTKILLERDB01. You notice that errors occur when the server reboots after a power failure. You check and discover that CERTKILLER-DB01 has to be rebuilt. You continue to restore the other databases and discover numerous errors. You check and discover that there are orphaned users in the Accounts database. You need to determine a way to discover and resolve the orphaned users.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

116

" .Microsoft 70-450: Practice Exam What should you do? (Click the steps on the left and place them in the correct order on the right to detect orphaned users.) Answer: QUESTION NO: 124 You are the newly appointed database administrator at CertKiller. and relink the logins to the users. What should you do? "Pass Any Exam.actualtests.com 117 Ac tua lTe sts .co m . This disk contains the user database that is configured for log shipping. To ensure productivity you need to bring CERTKILLER-DB03 online with the latest CERTKILLER-DB02 database state. CERTKILLER-DB02 is configured as the primary server and CERTKILLER-DB03 as the secondary server. You are responsible for administering the Microsoft SQL Server 2008 server.www. Any Time. It may not be necessary to use all the steps provided. You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02 and CERTKILLER-DB03. You discover during routine maintenance that a disk failed on CERTKILLER-DB02.com.

com Ac tua lTe sts .co m 118 . Any Time. You need to back up the transaction logs from the CERTKILLER-DB02 to the CERTKILLER-DB03 using the with norecovery clause. the CERTKILLER-DB03 is synchronized with the CERTKILLER-DB02 and is updated with the latest information." . the database is not available to users. You only disable log shipping backup job when you are performing a role change between CERTKILLER-DB02 and CERTKILLER-DB03. B. D. you need to perform manual failover from CERTKILLER-DB02 to the CERTKILLER-DB03. Incorrect Answers: A: You should not disable all backup jobs on CERTKILLER-DB02. This can be accomplished by backing up the transaction logs from CERTKILLER-DB02 to CERTKILLER-DB03 using the with norecovery clause. Answer: B Explanation: Backup files which are not already on CERTKILLER-DB03 need to be copied onto the CERTKILLER-DB03. Database Mirroring and Clustering provide automatic failover. Thereafter the files can be restored on CERTKILLER-DB03 from a shared location. "Pass Any Exam. You do not delete files from CERTKILLER-DB02. The transaction logs must be restored on the CERTKILLERDB03.Microsoft 70-450: Practice Exam Which step do you need to perform to bring the secondary server online? A. To bring CERTKILLER-DB03 online.actualtests. After you roll the database forward on CERTKILLER-DB03. D: You should not delete the transaction logs and the database data files from the CERTKILLERDB02 and restore the files on CERTKILLER-DB03 from a shared location. CERTKILLER-DB03 can be configured as the CERTKILLER-DB02 for various other secondary servers. After CERTKILLER-DB03 is configured as the primary server. You do not disable all backup jobs on CERTKILLER-DB02. C. You do not need to execute any steps since CERTKILLER-DB03 will have the synchronized copy of the database and it will automatically come up. C: The option stating that you do not need to perform any steps is incorrect. the database in the CERTKILLERDB02 goes into the restoring state. These backup files might be stored in the network shares where you store your backups for the SQL Server. This can be accomplished by disabling the backup jobs on CERTKILLER-DB02. The manual failover process requires you to back up the transaction logs from CERTKILLERDB02 and then restore them on the CERTKILLER-DB03 and so on. You can now redirect the SQL clients to CERTKILLER-DB03. In this state. When you back up transaction logs from the CERTKILLER-DB02 using the with norecovery clause. On CERTKILLER-DB03 you need to apply the transaction logs to roll the database forward. This can be accomplished by deleting the transaction logs as well as the database data files from CERTKILLER-DB02.www. You can restore the latest database backup files from a network share or any other storage location. Log shipping does not.

com wants you to determine the first step of the operation. In this case. you will be able to compress data with the NTFS compression capabilities. or remote file system access depending on which value is assigned. You need to use the CONTAINS FILESTREAM attribute to create a filegroup . The share_name parameter creates a file share that is used for accessing BLOB. For instance. "Pass Any Exam. it is decompressed.Microsoft 70-450: Practice Exam QUESTION NO: 125 You work as a database administrator at CertKiller.com Ac tua lTe sts . Creating a filegroup is the second step in enabling FILESTREAM for a database instance. B.www. For instance.com.com to have FILESTREAM enabled in CK_SALES so that you are able to store MS Word documents in the CK_SALES database. C. you first need to enable FILESTREAM using the stored procedure named sp_fiIestream_configure .SQL. A Word document that is stored on the file system will be compressed with the NTFS compression capabilities." . What should you do? A. If you do not want to use the stored procedure for enabling FILESTREAM. The value 2 allows only T. The parameter enablejevel allows you to configure T. You should consider having T-SQL and local file system access enabled. D. You should consider having a filegroup created. This step must be performed after enabling FILESTREAM.actualtests. CertKiller. CertKiller. you can execute the stored procedure with @ enable_level and @ share_name parameters: EXEC sp _filestream_configure@enable_level = 2. local file system access. The data in FILESTREAM is actually stored on the file system. When the data is stored. You should consider having FILESTREAM enabled using the sp_filestream_configure stored procedure. and when the data is retrieved. Explanation: To enable FILESTREAM in a database instance.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Any Time. @ share_name = N ' WordDocumentsShare '. This is the first step in enabling FILESTREAM for a database instance. you can also use SQL Server Management Studio (SSMS).SQL and local file system access.co Answer: B m 119 . FILESTREAM will be enabled for the database instance. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. which provides a number of benefits. You should consider having a table created with Binary Large Object (BLOB) column. During the course of the day you receive instruction from CertKiller. it is in compressed form.

" . you will have to rebuild the master database before you can restore it. You should consider making use of a tail-log backup of the tempdb database C. You have later discovered that there are errors when CERTKILLER-DB01 reboots after a power failure.actualtests. You should consider making use of the msdb database restored. Incorrect Answers: B: You do not have to make a tail-log backup of the tempdb database or restore the tempdb database. After rebuilding the master database. Any Time. You should consider having the tempdb database restored. This program was "Pass Any Exam.exe utility from the SQL Server 2008 media with the rebuilddatabase keyword to rebuild the master database. C: You do not have to make a tail-log backup of the tempdb database or restore the tempdb database. You should consider having a tail-log backup created of the msdb database. F. You should consider making use of the rebuildm. lTe Answer: A. The tempdb database is recreated when the SQL server service restarts.co m .exe utility to rebuild the master database. You should consider making use of the setup. If you cannot get the SQL server service to start. CertKiller. The tempdb database contains temporary objects. D.com 120 Ac tua Explanation: You will have to restore the master database to rebuild an SQL server instance.F sts . B. you will have to restore not only the master database. E. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You should make a tail-log backup of the msdb database and restore the msdb database. E: You should not use the rebuildme.com wants to know what should be done to rebuild CERTKILLER-DB01.com. CertKiller. The tempdb database is recreated when the SQL server service restarts. The operating system starts fine but the SQL Server service will not start.D.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com wants you to have CERTKILLER-DB01 rebuild. CertKiller. During the course of the day you make full backups once a day of the CK_SALES database.www. The msdb database contains job information and any scheduled jobs. The tempdb database contains temporary objects. You should restore the tail-log backup to ensure that you can get the msdb database back up to the point of failure. What should you do? (Choose all that apply) A.exe utility to rebuild the master database. but also the model and msdb databases. You should restore any database backups for the msdb database and any log backups since the last full backup.Microsoft 70-450: Practice Exam QUESTION NO: 126 You work as a database administrator at CertKiller.

You should consider having a differential backup performed each Friday night whilst performing transaction log backups each Monday. During the course of the day you are instructed by CertKiller. You should consider having a full database backup performed monthly whilst having the transaction log backups performed each Friday D.com. QUESTION NO: 127 You work as a database administrator at CertKiller." . You should consider having a differential backup performed every other Friday night whilst performing transaction log backups each Monday. B. Wednesday.com wants the backup strategy configured to have the database restored as quickly as possible if a database failure occurs whilst ensuring that database can be restored as close as possible to the point of failure. lTe sts . Full database backups should be performed regularly because a full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state. CertKiller. Wednesday and Thursday night.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com to develop a new backup strategy which keeps downtime to a minimum. and Thursday night. Wednesday and Saturday nights. Any Time. You should then have the transaction log back up every hour during business hours.Microsoft 70-450: Practice Exam used to rebuild the master database in SQL Server 2000.actualtests. Wednesday and Saturday nights. "Pass Any Exam.co m .www. You should consider having a full database backup performed each Friday night whilst having differential backups performed each Monday.com 121 Ac tua A. but the program was discontinued in SQL Server 2005. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES configured to use the Full Recovery model by default. differential database backups. you can reduce the amount of time that is involved in restoring the database to the moment of failure. Thursday. CertKiller. C. What should you do? Answer: A Explanation: You should do the following: You should perform a full database backup each Friday night. You should perform transaction log backups every hour during business hours. Tuesday. By implementing a disaster recovery strategy that uses full database backups. You should perform differential database backups each Monday. and transaction log backups.

A full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state. Any Time. filegroup backups are performed when a database is so large that a full backup becomes unmanageable or when certain files change more frequently than others. Generally.com. Wednesday. Generally. You must consecutively restore each of the transaction log backups that have been made since the last full or differential database backup. After restoring the latest full database backup.www. you must also perform transaction log backups.Full database backup performed from 08/20/2009 01:00TransactionBackup1 Transaction Log backup performed fromTransactionBackup2 . Performing a full backup once a month and transaction backups every week will not be sufficient to restore a database up to the point of failure. Transaction logs should be made often enough to reflect changes in the database. each subsequent differential database backup includes all of the information from the previous differential backup. are necessary when a database must be restored to a specific time. filegroup backups do not include any information from a transaction log. CertKiller. Additionally. whereas full database backups and differential database backups do. differential backups minimize restore time. You need to restore only the latest differential backup. more time is usually required to perform a differential backup than a series of transaction log backups that cover the same time period. you should perform a transaction log backup on a daily or hourly basis." . However. if possible.com 122 Ac tua lTe sts . each differential database backup includes all changes made to the database since the last full database backup.com currently makes use of Microsoft SQL Server 2008 for hosting databases. D: You should not perform a differential database backup each Friday night and perform transaction log backups each Monday. or limit transaction log backups to each Friday.Transaction Log backup performed "Pass Any Exam.actualtests. However. and filegroup backups at the end of each business day. This solution does not contain a full backup. differential database backups every Monday. The backups listed below have been scheduled for the CK_SALES database: FullBackup1 . C: You should not limit your full database backups to a monthly schedule. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES spanned across multiple disks. Incorrect Answers: B: You should not perform your full database backups every other Friday night. Transaction log backups. you should avoid performing filegroup backups because they increase administrative overhead. Therefore. because you must restore them to recover the database after you have restored the filegroup backup.co m . A filegroup backup is functionally equivalent to backing up all files in the filegroup.Microsoft 70-450: Practice Exam Differential database backups are cumulative.com has additionally located the transaction logs on a separate disk subsystem for performance purposes. CertKiller. QUESTION NO: 128 You work as a database administrator at CertKiller. and Saturday nights. Thus. When a filegroup backup is performed. you do not need to restore all subsequent differential database backups. which do not contain redundant data.

TransactionBackup5. You should consider creating a tail-log backup and restore FullBackup2.com to develop a new backup strategy which keeps downtime to a minimum. You should then restore DifferentialBackup2 and restore the tail-log backup. B. CertKiller.Transaction Log backup performed from 08/22/2009 07:00TransactionBackup4 . sts . CertKiller.actualtests. You should consider restoring FullBackup2. TransactionBackup6 and finally restore DifferentialBackup2.Differential Backup performed from 08/21/2009 01:00TransactionBackup3 . What should you do? "Pass Any Exam. TransactionBackup6 and DifferentialBackup2. TransactionBackup5.Transaction Log backup performed from 08/23/2009 13:00DifferentialBackup2 . CertKiller. You should consider having FullBackup2 restored and then restore DifferentialBackup2. D. C.Full database backup performed from 08/23/2009 01:00TransactionBackup5 Transaction Log backup performed from 08/23/2009 07:00TransactionBackup6 .Transaction Log backup performed from 08/24/2009 13:00 During the course of the day on 08/24/2009 you receive reports from employees all stating that errors are present in the CK_SALES database.co m What should you do? 123 .com currently makes use of Microsoft SQL Server 2008 for hosting databases. Any Time.Transaction Log backup performed from 08/22/2009 13:00FullBackup2 . You should consider creating a tail-log backup and restore FullBackup2.com.Microsoft 70-450: Practice Exam from 08/21/2009 13:00DifferentialBackup1 . You work as a database administrator at CertKiller. You should then have the tail-log backup restored.com wants you to have the CK_SALES database restored to the point of failure by selecting the order of the backup sets to restore. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES configured to use the Full Recovery model by default.com wants the backup strategy configured to have the database restored as quickly as possible if a database failure occurs whilst ensuring that database can be restored as close as possible to the point of failure.www.Transaction Log backup performed from 08/24/2009 07:00TransactionBackup8 ." . During the course of the day you are instructed by CertKiller.Differential Backup performed from 08/24/2009 01:00TransactionBackup7 .com Ac QUESTION NO: 129 tua Answer: D lTe A. You decided to check the log and notice the error occurred at 05:42.

if possible. each differential database backup includes all changes made to the database since the last full database backup.Microsoft 70-450: Practice Exam A. Wednesday and Thursday night. Generally. You should then have the transaction log back up every hour during business hours. which do not contain redundant data. differential database backups every Monday." . Any Time. you can reduce the amount of time that is involved in restoring the database to the moment of failure. Wednesday. and filegroup backups at the end of each business day. A filegroup backup is functionally equivalent to backing up all files in the filegroup.com Ac tua lTe sts . After restoring the latest full database backup. filegroup backups are performed when a database is so large that a full backup becomes unmanageable or when certain files change more frequently than others. Thursday. You must consecutively restore each of the transaction log backups that have been made since the last full or differential database backup. you do not need to restore all subsequent differential database backups. are necessary when a database must be restored to a specific time. differential backups minimize restore time. By implementing a disaster recovery strategy that uses full database backups. Incorrect Answers: A: You should not perform your full database backups every other Friday night. C. filegroup backups do not include any information from a transaction log. You should consider having a full database backup performed every other Friday night whilst having differential backups performed every Monday. Therefore. Transaction log backups. each subsequent differential database backup includes all of the information from the previous differential backup. B. differential database backups. Tuesday. You should perform transaction log backups every hour during business hours.actualtests. Answer: D Explanation: You should do the following: You should perform a full database backup each Friday night. whereas full "Pass Any Exam.www. Differential database backups are cumulative.co m 124 . You should consider having a full database backup performed monthly whilst having the transaction log backups performed each Friday. Thus. more time is usually required to perform a differential backup than a series of transaction log backups that cover the same time period. You need to restore only the latest differential backup. Full database backups should be performed regularly because a full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state. and Thursday night. However. You should consider having a differential backup performed each Friday night whilst performing transaction log backups each Monday. you should avoid performing filegroup backups because they increase administrative overhead. You should perform differential database backups each Monday. However. Additionally. and transaction log backups. Wednesday and Saturday nights. You should consider having a full database backup performed each Friday night whilst having differential backups performed each Monday. You should then have a filegroup backup performed at the end of each business day. D.

com Ac tua lTe You work as a database administrator at CertKiller.co m QUESTION NO: 130 CORRECT TEXT 125 . sts . A full backup creates a starting point for the sequence of transaction log backups that you must restore in order to return the database to a consistent state. or limit transaction log backups to each Friday.com wants you to perform a recovery of the database up to the point of failure. by placing options in the correct order) "Pass Any Exam. you should perform a transaction log backup on a daily or hourly basis.com. What should you do? (Choose all that apply.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Performing a full backup once a month and transaction backups every week will not be sufficient to restore a database up to the point of failure. and Saturday nights. you must also perform transaction log backups. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day one of the disk drives of CERTKILLER-DB01 has failed.www.Microsoft 70-450: Practice Exam database backups and differential database backups do. CertKiller. Transaction logs should be made often enough to reflect changes in the database. Generally.actualtests. This solution does not contain a full backup. C: You should not limit your full database backups to a monthly schedule. Wednesday. CertKiller. CertKiller.com has configured the CK-SALES database with its transaction logs and database files stored on separate disk drives. B: You should not perform a differential database backup each Friday night and perform transaction log backups each Monday." . because you must restore them to recover the database after you have restored the filegroup backup. When a filegroup backup is performed. Any Time.

you should not enable this option. During the course of the day you receive instruction from CertKiller.co m 126 .com wants to know what should be kept in mind when configuring FILESTREAM in a failover cluster? (Choose two) A. You should keep in mind that any node which is required to host FILESTREAM should have FILESTREAM enabled.com currently makes use of Microsoft SQL Server 2008 for hosting databases. CertKiller.www. It should be enabled only on the nodes on which you want to configure FILESTREAM. QUESTION NO: 132 "Pass Any Exam. D: You would enable this option when you want to have remote access to FILESTREAM data. CertKiller. D. Incorrect Answers: A: You are not required to have the FILESTREAM filegroup on all nodes. You will need to enable FILESTREAM on all nodes that need to host FILESTREAM data. You should keep in mind that you should have the FILESTREAM filegroup on all nodes in the cluster. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com Ac tua lTe sts . If remote access is not required.E Explanation: The following guidelines must be met when configuring FILESTREAM in a failover cluster: You must have FILESTEAM filegroup on the shared disk so that it can be accessible to all nodes in the cluster. You should keep in mind that you should allow remote clients to have streaming access to FILESTREAM data option enabled. B: Enabling FILESTREAM only on the primary node in the cluster will not work.Microsoft 70-450: Practice Exam Answer: QUESTION NO: 131 You work as a database administrator at CertKiller. Any Time. E.com. B. Any node that needs to host FILESTREAM must have FILESTREAM enabled. then the node cannot host FILESTREAM. If this is not done. Answer: C. C.com to enable FILESTREAM for a failover cluster of CertKiller.actualtests." .com. You should keep in mind that FILESTREAM should be enabled on the primary node in the cluster. You should keep in mind that you should have the FILESTREAM filegroup on the shared disk. This option is not a prerequisite parameter to create a failover cluster with FILESTREAM data.

CertKiller.0.You secondly restore the most recent full database backup. the syslogs table allowed users to see the transactions that were in the transaction log.com to make full backups everyday with transaction log backups every hour.com. C. During the course of the day you receive instruction from CertKiller.com wants you to identify the most recent marked transactions available in all the transaction log backups.com Ac tua Answer: C lTe A.com wants the database to be restored to the same consistent point if disaster should strike. B.actualtests. You can use the stopatmark or stopbeforemark keyword to stop at a marked transaction. You should look for the information in the logmarkhistory table in the CK_SALES and CK_PRODUCTS databases.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller. The logmarkhistory table is kept in the msdb database. The syslogs table cannot be used with SQL Server 2008 to find the most recent marked transactions. D. stopatmark or stopbeforemark keywords to have a point in time restore. You should look for the information in the logmarkhistory table in the msdb database. the syslogs table was not used. CertKiller. Explanation: You can use the stopat .co What should you do? m 127 .com currently makes use of Microsoft SQL Server 2008 for hosting databases. After SQL Server 7. You should look for the information in the logmarkhistory table in the master database. Incorrect Answers: A: You should not look in the syslogs table in the database that you are trying to restore. The logmarkhistory table is kept in the msdb database. "Pass Any Exam. The stopat key word can be used to stop at a specific time. CertKiller. sts . In previous versions of Microsoft SQL Server. D: You should not look in the logmarkhistory table in either the master database or the database that you are trying to restore. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts two database named CK_SALES and CK_PRODUCTS which are used by an application making updates. You have later decided to test the recovery of the databases to a marked transaction by doing the tasks listed below: You first created a tail-log backup of the databases.www. Any Time. B: You should not look in the logmarkhistory table in either the master database or the database that you are trying to restore. You should look for the information in the syslogs table in the database that you are trying to restore." .

You decided to check the log and notice the error occurred at 05:42. The backups listed below have been scheduled for the CK_SALES database: FullBackup1 .com.Microsoft 70-450: Practice Exam QUESTION NO: 133 You work as a database administrator at CertKiller.Differential Backup performed from 08/21/2009 01:00TransactionBackup3 . TransactionBackup6.Transaction Log backup performed from 08/24/2009 13:00 During the course of the day on 08/24/2009 you receive reports from employees all stating that errors are present in the CK_SALES database.Transaction Log backup performed from 08/22/2009 13:00FullBackup2 . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES spanned across multiple disks.Full database backup performed from 08/20/2009 01:00TransactionBackup1 Transaction Log backup performed fromTransactionBackup2 . Any Time.com.Transaction Log backup performed from 08/22/2009 07:00TransactionBackup4 . CertKiller. TransactionBackup5. TransactionBackup5. You should consider creating a tail-log backup and restoring FullBackup2. You should consider restoring FullBackup2. DifferentialBackup2 and TransactionBackup7. Answer: A QUESTION NO: 134 DRAG DROP You work as a database administrator at CertKiller.Full database backup performed from 08/23/2009 01:00TransactionBackup5 Transaction Log backup performed from 08/23/2009 07:00TransactionBackup6 .Transaction Log backup performed from 08/23/2009 13:00DifferentialBackup2 .Transaction Log backup performed from 08/21/2009 13:00DifferentialBackup1 .com has additionally located the transaction logs on a separate disk subsystem for performance purposes. C.Transaction Log backup performed from 08/24/2009 07:00TransactionBackup8 .com currently makes use of Microsoft SQL Server 2008 for hosting databases. CertKiller. CertKiller. DifferentialBackup2. You should consider restoring FullBackup2. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which uses the full recovery model and has multiple online filegroups. The "Pass Any Exam.www.com 128 Ac tua lTe sts . TransactionBackup6.actualtests. What should you do? A.com wants you to have the CK_SALES database restored to the point of failure by selecting the order of the backup sets to restore.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You should consider creating a tail-log backup and restoring FullBackup2. TransactionBackup7 and the tail-log backup. B. D.Differential Backup performed from 08/24/2009 01:00TransactionBackup7 ." . CertKiller. DifferentialBackup2 and TransactionBackup7. TransactionBackup7 and the tail-log backup. DifferentialBackup2.co m .

and place them in the correct order) Answer: "Pass Any Exam.com Ac tua lTe sts ." .www.actualtests.contains the inventory table CertKiller.co m 129 . Any Time.Microsoft 70-450: Practice Exam CertKiller.com wants you to develop a plan to do a piecemeal restore in case of a disaster.KingGroup2 .contains the historic dataKingGroup3 .com secondary file groups are shown below: KingGroup1 . What should you do? (Move the correct steps from the left column to the right column.contains the most valued tables of the database.

com currently makes use of Microsoft SQL Server 2008 for hosting databases." .com. but are in the database. CertKiller. Any Time. What should you do? (Click and drag the required steps from the left column in the correct order on the column to the left) Answer: "Pass Any Exam.co m 130 . During the course of the day you discover that there are damaged pages present in the CK_SALES database.com Ac tua lTe sts . You later concluded that the damaged pages are not in the transaction log and are not metadata pages. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.actualtests.www.Microsoft 70-450: Practice Exam QUESTION NO: 135 DRAG DROP You work as a database administrator at CertKiller.

Rory Allen has later applied the policy to CERTKILLER-DB01. the msdb database stores jobs. operators. "Pass Any Exam.www. You should ensure that the msdb database is backed up on a regular basis. You should consider having the master database restored. You later use the user named Rory Allen to create the policy by adding Rory Allen to the PolicyAdministrator Role role. C. D. Answer: A Explanation: You should restore the msdb database to ensure that policies are applied after a disk in the server has failed.actualtests.com wants to know in event of disk drive failures suffered on CERTKILLER-DB01 which database should be restored from backup to restore the policy.com currently makes use of Microsoft SQL Server 2008 for hosting databases.Microsoft 70-450: Practice Exam QUESTION NO: 136 What should you do? A. and alerts. lTe sts . Besides policies for Policy-Based Management. Policies for Policy-Based Management are stored in the msdb database. CertKiller. CertKiller. You should consider having the model database restored. B.com 131 Ac tua You work as a database administrator at CertKiller. You should consider having the distribution database restored.co m .com." .com to ensure that CERTKILLER-DB01 does not have Database Mail or SQL Mail enabled. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. Any Time. You should consider having the msdb database restored. During the course of the day you receive instruction from CertKiller.

and spatial indexes. None of these databases stores policies from Policy-Based Management. D: You should not restore the master. CertKiller. You should consider having the DBCC CHECKDB with the EXTENDED_LOGICAL_CHECKS option command run. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which are used by users running geospatial queries on database tables. you wanted to perform logical checks on the spatial indexes in the database.co m . CertKiller.Microsoft 70-450: Practice Exam Incorrect Answers: B: The model database is used as a template database for any new databases that are created in the SQL server instance. Therefore. The master database contains information that pertains to the SQL server configuration. During the course of the day you discover that queries are slow and you think the problem is caused with the spatial indexes. model. You should consider having the DBCC CHECKDB with the ESTIMATEONLY Option command run. What should you do? Answer: D Explanation: This option performs logical checks on an indexed view. You later conclude that no physical corruption is evident and page-level checksums have not been turned off. In this scenario.com 132 Ac A. XML indexes. C.com. B." .com currently makes use of Microsoft SQL Server 2008 for hosting databases. You would specify with extended_logical_checks only if you have the following issues: Index problems that are not due to physical corruption Disabled page-level checksums Column-level hardware corruption.com wants you to perform logical checks on the spatial indexes. QUESTION NO: 137 You work as a database administrator at CertKiller. C: The distribution database is used by SQL replication.actualtests. running DBCC CHECKDB with the extended_logical_checks option would be the best "Pass Any Exam. or distribution database. D. You should consider having the DBCC CHECKDB with the REPAIR REBUILD Option command run. You should consider having the DBCC CHECKDB with the REPAIR_FAST option command run. tua lTe sts .www. Any Time.

You should run dbcc checkdb with the extended_logical_checks option to perform logical checks on the spatial indexes in the database. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_PRODUCTS.Microsoft 70-450: Practice Exam choice. CertKiller. This option is not designed to perform logical checks on the spatial indexes in the database.com currently makes use of Microsoft SQL Server 2008 for hosting databases. C: You should not run dbcc checkdb with the estimateonly option." . . This option performs quick repairs with no possibility of data loss.actualtests. This option does not perform a database check. QUESTION NO: 138 CK_PRODUCTS contains two filegroups named Primary and FileGroup1 as shown in the exhibit: "Pass Any Exam. Incorrect Answers: A: You should not run dbcc checkdb with the repair_fast option. This option will not actually perform any repair actions on the database. This option only displays the amount of tempdb space needed to run DBCC checkdb. This option can rebuild an index or repair rows in nonclustered indexes. This option is kept in SQL Server 2008 for backward compatibility only.com has employed you as a database administrator. Any Time.www.co m 133 . B: You should not run dbcc checkdb with the repair_rebuild option.com Ac tua lTe sts CertKiller.

Your best option would be to ensure that a restore is executed without recovery on the log backups that were made since the last database backup. Your best option would be to ensure that a restore is executed with recovery on the tail-log backup.) tua There are no tables spanning these two filegroups. lTe sts . Your best option would be to ensure that a restore is executed with recovery on the database from the latest full database backup. Your best option would be to ensure that a tail-log backup is made.F "Pass Any Exam. F.E. Answer: A. E. Your best option would be to ensure that a restore is executed without recovery on KingGroup1 from the latest full database backup. CK_PRODUCTS is configured by default to make use of the full recovery model.www." . You decide to restore CK_PRODUCTS from the backups two minutes prior to entering the wrong specifications.com Ac What should you do? (Choose all that apply. Any Time. D. The transaction log backups are executed hourly and a full database backup is executed every evening. Your best option would be to ensure that transaction log is truncated. B.co m 134 . You receive notification from the Sales manager stating that an incorrect change was made to the Specifications table in FileGroup1. C.B.Microsoft 70-450: Practice Exam A.actualtests.

GO CertKiller. it is not necessary to restore the entire database in order to expunge the incorrect change made to Specifications. Restore FileGroup1 from the latest full database backup and specify with norecovery in the restore statement. Therefore.com. When the restore statement that will use the latest transaction log backup is executed.M.com has additionally scheduled the tasks below: CertKiller. The norecovery option is required in this scenario because you will be applying transaction log backups after the database is restored. Any Time. CertKiller. Restore the transaction log backup that was made on the active transaction log.M. You test the application and know some data would be lost but you want to recover transactions the application has made. and the incorrect transaction was recorded a few minutes ago. you should do the following: Immediately make a tail-log backup.com has configured a differential backup to be performed at noon (12:00 P. the inactive portion of the log is automatically truncated. and the with recovery option brings the database to a consistent state. The application makes use of the script below: BEGIN TRANSACTION UpdateDiscount WITH MARK 'UPDATE CK_PRODUCTS discount'. During the course of the day you decided to use an application which makes updates to the databases. QUESTION NO: 139 You work as a database administrator at CertKiller.com has configured a snapshot of the databases to be taken at "Pass Any Exam.). This is the latest log backup. Each time a transaction log is backed up using the default settings." .com currently makes use of Microsoft SQL Server 2008 for hosting databases.com has configured transaction log backups to be performed every two hours beginning at 1:00 A.CertKiller. Consecutively restore each of the transaction log backups that were made after the last full database backup. the stopat and with recovery options must be specified. Because the Specifications table is located on FileGroup1 and no tables span filegroups . which contains the transactions that have been recorded since the previous log backup.www. The stopat option specifies the desired moment in time to which you must restore the database. GO UPDATE CK_SALES.Microsoft 70-450: Practice Exam Explanation: The latest transaction log backup was made within the last hour. If a disaster should occur you should be able to restore each of the databases to the same consistent point.com has configured a full backup to be performed at midnight (12:00 A.actualtests. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES and CK_PRODUCTS. To correct the situation. it is not necessary to truncate the transaction log again.com 135 Ac tua lTe sts .).Products SET discount = Price * 0.CertKiller.925 WHERE Code LIKE '70-%'. Each transaction log backup must be restored by specifying the norecovery option so that all subsequent transaction log backups can be restored.co m .M.CertKiller.

You should consider having the latest full backup restored on each database with the latest differential backup. You should then have each database recovered with RECOVERY. You must restore the database backups with norecovery . Any Time. You will have to take a full backup of the database before you can make a log backup.com Ac tua lTe sts . You should consider having the database reverted with the database snapshot on each database. each differential backup. In the scenario. C. You should consider having the database restored with the latest full backup each transaction log backup in order on each database.M. What should you do? A. you break the log backup chain. and restore the logs with stopatmark to return to the marked transaction. You should consider having the latest full backup restored on each database followed by the latest transaction log backup.M.M. These actions will not recover each database to the point of failure. The tail-log backup that you made is not usable when reverting a database. You should mark a transaction block in both databases. restore each transaction log backup in order on "Pass Any Exam. B. You can use the WITH mark keyword in your script. You should then have each database recovered by using WITH RECOVERY.M.actualtests. C: You should not restore the latest full backup. and the transaction log backups in order on each database. Any committed changes after the marked transaction will not be restored.Microsoft 70-450: Practice Exam 12:30 P." . You should back up the transaction log for both databases. Answer: B Explanation: You should restore the full backup. You should then make use of the recovery keyword and STOPMARK = 'UPDATE CK_PRODUCTS discount'. but will recover each database to the marked transaction of updating the CK_PRODUCTS discount. to bring both databases back to the same consistent point. D: You should not restore the latest full backup. the latest differential backup. You should not recover each differential backup. D. You should only restore the latest differential backup since the last full backup. for reporting purposes. and the transaction log backups in order. Reverting the snapshot would not bring the database up to the point of failure. you should have full database backups with differential backups. When you revert a database from a snapshot. Incorrect Answers: A: You should not revert the databases using the database snapshot.co m 136 .com wants to know what should be done to recover transactions made by the application in each database to a consistent point if the error occurs at 12:35 P. When using marked transactions in two related databases. and the latest transaction log backup on each database and recover each database with recovery. CertKiller. You should also use the recovery keyword and stopmark = i update CK_PRODUCTS discount' . This action will only restore the database up to 12:30 P. the error occurred at 12:35 P.www.

com has full backups performed on the CK_SASLES database at midnight (12:00 A. You should consider having a tail-log backup created and revert the CK_SALES database using the database snapshot.com has a snapshot of the database backup at noon for reporting purposes. Any Time. You should consider having the full backup restored with norecovery and restore the transaction log backup with recovery and stopatmark. This action will not consistently recover both databases. tua lTe CertKiller." .M. If you omit the differential backup.com is aware that the CK_SALES database is set to use the full recovery model and that the application updates the prices at noon. QUESTION NO: 140 You work as a database administrator at CertKiller. CertKiller. "Pass Any Exam.com wants you to ensure that all data is recovered up to point of failure.M. B. You should consider having the CK_SALES database reverted using the database snapshot. The application makes use of the script below: USE CK_SALES GO BEGIN TRANSACTION DiscountUpdate WITM MARK 'UPDATE Product Discount prices'. sts . You should consider having a tail-log backup created and restore the full backup with norecovery.com also makes use of an application which sets product prices.Microsoft 70-450: Practice Exam each database. CertKiller. During the course of the day you discover that a error has occurred in the CK_SALES database. You must restore the latest differential backup after recovering the full backup.www.Products SET Discount = Price * 0. A. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. the database will be an inconsistent state.)CertKiller. C. You should then have the tail-log backup restored with RECOVERY and STOPATMARK. and 4 P.com currently makes use of Microsoft SQL Server 2008 for hosting databases. GO UPDATE CK_Sales.M. You should then have the transaction log backups and tail-log backup restored with norecovery. and recover the database with recovery. and recover each database with recovery.com 137 Ac CertKiller. CertKiller.com has additionally scheduled their backups as shown below: CertKiller. D.co m .com has transaction log backups performed at 8.com. GO What should you do? A.actualtests.95.CertKiller.

Microsoft 70-450: Practice Exam Answer: A Explanation: You should do the following to ensure that all data is recovered up to the point of failure: Create a tail-log backup. Restore the full backup with norecovery . Restore the transaction log backups with norecovery and restore the tail-log backup with recovery.

To restore the database to the point of failure, you must create a tail-log backup. A tail-log backup contains all the transactions that have not been backed up since the last transaction log backup was performed. After performing the tail-log backup, you should restore the full backup that was taken at midnight using the norecovery keyword and restore the transaction log taken at 8 A.M. with the norecovery keyword. You should then restore the tail-log backup with the recovery keyword. You should use the recovery keyword only after the latest full backup, the latest differential backup, the latest transaction log backups, and the tail-log backup have all been restored in the proper sequence. The database recovery, however, should be performed using the recovery keyword to ensure that data can be rolled back after the entire set of data has been restored. Incorrect Answers: B: You should not create a tail-log backup, revert the Products database using the database snapshot, and restore the tail-log backup with recovery and stopatMark. When you revert a database from a snapshot, you break the log backup chain. The tail-log backup that you made is not usable when reverting a database. You will have to take a full backup of the database before you can make a log backup. C: You should not restore the full backup with norecovery and restore the transaction log backup with recovery and stopatMark. This action will not recover the database to the application update performed at noon. The stopatMark keyword is used to recover a marked transaction. The script used to update retail prices contains with mark 'update Product Discount prices'. This action will only recover the database to the previous time that the application ran an update. Because the last transaction log backup was taken at 8 P.M., it would not contain the update that was done at noon, or restore data changes that were performed after noon. D: You should not revert the Products database using the database snapshot. This action will only restore the database up to noon. In the scenario, the error occurred sometime after noon. Reverting the snapshot would not bring the database up to the point of failure.

QUESTION NO: 141 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES which has the full recovery model set. During the course of the day you perform full "Pass Any Exam. Any Time." - www.actualtests.com 138

Ac

tua

lTe

sts

.co

m

Microsoft 70-450: Practice Exam backups on the database at midnight 1:00 A.M. with transaction log backups every hour. CertKiller.com recently finished and application which updates the data in the database. You have later discovered checking the logs that the application has added corrupt data in the database at 3:15 A.M. You decided to restore the database using the statement below: RESTORE DATABASE CK_SALES FROM CK_SalesBackups WITH NORECOVERY; What should you do next? A. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, RESTART, STOPATMARK = 'Jun 14, 2009 3:15 AM'; B. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, STOPBEFOREMARK = 'Jun 14, 2009 3:15 AM' C. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, STOPAT = 'Jun 14, 2009 3:15 AM'; D. You should consider making use of the restore statement below: RESTORE LOG CK_SALES FROM CK_SalesBackups WITH RECOVERY, STOPATMARK = 'Jun 14, 2009 3:15 AM'; Answer: C

Explanation: To restore a database, you should restore the latest full backup, restore the latest differential backup, and then the transaction log backups after the latest differential backup. You must use the recovery keyword with restore log statement. This keyword is used to ensure that data can be rolled back after the entire set of data has been restored. The stop AT keyword allows a point in time restore to an exact time. In this scenario, the restore is to June 14, 2009 at 3:15 A.M. You should restore the each transaction log backup transaction after midnight with the stop at keyword. You should also issue the restore database CK_SALES WITH RECOVERY to complete the restore process. Incorrect Answers: A: You should not use the STOPATMARK keyword. This keyword can restore a database to a marked transaction. This keyword accepts a mark name, not a date and time. You can use an optional after <datetime> clause that will allow the STOPATMARK or STOPBEFOREMARK keyword to accept a date. If you do not use the AFTER <datetime> clause, you can only use a "Pass Any Exam. Any Time." - www.actualtests.com 139

Ac

tua

lTe

sts

.co

m

Microsoft 70-450: Practice Exam unique mark name for the transaction, and not a date. The restart keyword is used to restart a restore operation that may have been interrupted due to a power failure. B: You should not use the STOPBEFOREMARK keyword. This keyword can restore a database to a marked transaction. This keyword accepts a unique mark name, but not a date. D: You should not use the STOPATMARK keyword. This keyword can restore a database to a marked transaction. This keyword accepts a mark name, not a date and time. You can use an optional after <datetime> clause that will allow the STOPATMARK or STOPBEFOREMARK keyword to accept a date. If you do not use the AFTER <datetime> clause, you can only use a unique mark name for the transaction, and not a date. The restart keyword is used to restart a restore operation that may have been interrupted due to a power failure.

QUESTION NO: 142 You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_PRODUCTS which is configured to use the full recovery model. CertKiller.com currently possesses full backups and multiple log backups of the CK_PRODUCTS database. The CK_PRODUCTS database has several file groups shown in the exhibit below:

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

140

Microsoft 70-450: Practice Exam During the course of the day you discover that there are problems with the FileGroup1 file group and FileGroup2 file group. You later discover that the file containing FileGroup3 file group is undamaged and is consistent with the CK_PRODUCTS database. CertKiller.com wants you to perform a piecemeal restore of the CK_PRODUCTS database to a specific point in time by selecting which statements are true regarding piecemeal restores to a specific point in time. Which of the statements are correct? (Choose two). A. You would be required to restore the FileGroup2 filegroup first. B. You would be required to restore the FileGroup1 filegroup first. C. You would be required to have all the filegroups of the CK_PRODUCTS database restored. D. You would not have to worry about the sequence order of the restoration of the CK_PRODUCTS database filegroups. E. You would be required to specify every step of the restore sequence and specify the same point in time. F. You would be required to indicate the partial option in the restore database option. Answer: E,F

Explanation: The restore sequences of a piecemeal restore that uses the full recovery model must do the following: Restore the primary filegroup first. Secondary filegroups can be restored in the order of importance. Read-only filegroups , such as FileGroup3, can be restored last. The restore database statement must specify the partial option. The partial option indicates that a partial restore is being performed. You must have a full database backup that contains the primary filegroup . You do not require a single backup that contains all filegroups . You must specify the time in which you want to restore to in the partial restore sequences. Incorrect Answers: A: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you must restore the Primary filegroup first. The sequence order of restoration of the filegroups is important. You should restore the more important filegroups first. Read-only filegroups need to be restored should be restored last because their data is static. B: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you must restore the Primary filegroup first. The sequence order of restoration of the filegroups is important. You should restore the more important filegroups first. Read-only filegroups need to be restored should be restored last because their data is static. C: You do not have to restore all filegroups of the CK_PRODUCTS database. You do not have to restore a read-only filegroup if the file that contains the filegroup is undamaged and consistent with the database. In this scenario, FileGroup3 is undamaged and consistent with the CK_PRODUCTS database. D: You should restore the primary filegroup first; the secondary filegroups can be restored in the "Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

141

You should consider running the statement: ALTER TABLE Invoices REBUILD WITH (DATA_COHPRESSION = PAGE). You should use the rebuild partition keyword to compress a partitioned table.com to save consumed disk space with the Invoices table which contains reoccurring data and is partitioned across multiple partitions in the CK_SALES database.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Part 3: Design a recovery test plan (5 Questions) D: These statements apply data compression to a non-partitioned table. The Invoices table is a partitioned table. and stores fixed character strings by not storing the blank characters similar to the variable length format. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. By contrast.www. can be restored last. C. The redundant data is stored in on a single page and then the data is referenced to multiple columns.com Ac tua lTe sts . You should consider running the statement: ALTER TABLE Invoices REBUILD WITH (DATA_COHPRESSION = ROW). Page compression reduces data redundancy in columns in multiple rows on a page. CertKiller. B.co m 142 . QUESTION NO: 143 You work as a database administrator at CertKiller. During the course of the day you receive instruction from CertKiller." . What should you do? A.Microsoft 70-450: Practice Exam order of importance and read-only filegroups. Answer: A Explanation: Page compression is usefully if the table stores reoccurring data. You should consider running the statement: ALTER TABLE Invoices REBUILD PARTITION ALL WITH (DATA_COHPRESSION = PAGE ON PARTITIONS(1) ). such as FileGroup3. Part 3: Design a recovery test plan (5 Questions) "Pass Any Exam. Any Time. You should use the rebuild partition keyword to compress a partitioned table. D. The Invoices table is a partitioned table. uses variable-length storage format for numeric data types. Incorrect Answers: B: This statement is syntactically incorrect: C: These statements apply data compression to a non-partitioned table. You should consider running the statement: ALTER TABLE Invoices REBUILD PARTITIONS WITH (DATA COMPRESSION = ROW). row compression reduces the metadata overhead.actualtests.com.

"Pass Any Exam. When you configure the database on the secondary server in the standby mode. C. The secondary database was configured in standby mode. you can schedule users either to be disconnected or to be connected to the primary database only when there is no connection to the primary database. you should use the norecovery mode. D. In this state. the users will be disconnected as soon as the restore of the transaction logs on the secondary server is initiated. B: The option stating that the users will not be able to run any queries is incorrect. If you choose to disconnect the users. B. Users will be able to perform queries on the secondary server when the secondary database is in STANDBY mode .com Ac tua lTe sts . You have finished configuring log shipping between a primary server and a secondary server. you have the flexibility to shift the load of the read-only queries from the primary server to the secondary server. Any Time. When you configure the secondary database on the secondary server in standby mode. You need to determine what effect the configuration will have on the secondary database.actualtests. The transaction log will be restored on the secondary server. It will result in transaction log restores not taking place on the secondary server. When you back up the transaction logs from the primary server using with norecovery. It will result in the ability of configuring read-only queries on the secondary server. It will result in employees being disconnected when the secondary database is in standby mode. Answer: D Explanation: The option stating that you will be able to configure read-only queries on the secondary server is correct. The users are not able to run any queries when the database is in the norecovery mode. In the standby mode.com." . You need to back up the transaction logs using with norecovery from the primary to the secondary server.co m 143 .www. The users are not able to connect to the database when it is in the norecovery mode. You are responsible for administering the SQL Server 2008 database servers. Incorrect Answers: A: The option stating that the users will always be disconnected when the secondary database is in the standby mode is incorrect. What should you identify? A. the database is not available to users for updates. you can configure the users to be disconnected when transaction logs are restored on the secondary server or wait for users to disconnect. It will result in employees being unable run any queries on the secondary server. the database in the primary server goes into the restoring state. This eases the load on the primary server.When you are backing up the transaction log on the secondary server.Microsoft 70-450: Practice Exam QUESTION NO: 144 You work as a database administrator at CertKiller.

The strategy should include full backups as well as log backups.com currently makes use of Microsoft SQL Server 2008 for hosting databases.co m . The recovery plan should have a RAID 5 volume tested and used that contains the database files.www. The recovery plan should have a RAID 1 volume tested and used that contains the operating system. This option is true only if you have chosen not to disconnect the users when you must run the restore of the transaction log backups. CertKiller. During the course of the day you receive instruction from CertKiller. B.F QUESTION NO: 146 You work as a database administrator at CertKiller. In this condition.com wants to know which of the following would be included in the plan.D.Microsoft 70-450: Practice Exam C: The option stating transaction log restores on the secondary server will not take place is incorrect. Any Time. The strategy should include the simple recovery model. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You thus need to devise a restore strategy that will accomplish this. will the restore operation will take place. What should you do? (Choose all that apply) A. D. C." .com currently makes use of Microsoft SQL Server 2008 for hosting databases. CertKiller. The strategy should include differential backups as well as log backups. QUESTION NO: 145 CertKiller. F. sts . The strategy should include the bulk-logged recovery model. which means that there are no users connected. E. The sales information of the company is located on CK_SALES. You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES. the restore will not take place as long as the users are connected. B.com 144 Ac tua lTe A.com has employed you as a database administrator.com. Only when there is an idle session.com to design a disaster recovery plan. CertKiller. The strategy should include full backups as well as differential backups. "Pass Any Exam. You receive an instruction from the CIO to make sure that you are able to recover CK_SALES without any data loss exposure. What should you include? (Choose all that apply) Answer: B.actualtests. The strategy should include the full recovery model.

You should consider how long you will keep the media. Answer: C.E Explanation: Your disaster recovery plan should include the following tasks: Schedule for overwriting backup media Determine locations to store offsite backups Run a base-functionality script There are number of items that should be included in your disaster recovery plan. RAID-5 should not be implemented for the drive that contains the transaction log files for a database.com is aware that all backup statements include the checksum keyword.com. Using a RAID-1 can provide fault tolerance for the operating system if a disk fails. The recovery plan should have a schedule created for overwriting backup media. B: You should not test and use RAID-5 for the volume that contains the database files as part of a disaster recovery plan. You should also have a base-functionality script that may execute insert. The recovery plan should have a base-functionality script run. QUESTION NO: 147 You work as a database administrator at CertKiller. CertKiller. During the course of the day you receive instruction from CertKiller. but not a part of the disaster recovery process. It should be part of the design process. D. E.Microsoft 70-450: Practice Exam C.com currently makes use of Microsoft SQL Server 2008 for hosting databases. If you store the media offsite.co m 145 . you should also determine how long will it take to retrieve the media and restore the data. but not a part of the disaster recovery process. and delete statements or a batch of stored procedures to determine if everything is working correctly after a restore. update. Incorrect Answers: A: You should not test and use RAID-1 for the volume that has the operating system as part of a disaster recovery plan. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. "Pass Any Exam.com Ac tua lTe sts .D." . Using a RAID-5 can provide fault tolerance be supporting up to one drive failure. The recovery plan should have the locations determined to store offsite backups.com wants you to verify that the backup of the CK_SALES database can be restored.com to make full backups once a day with transaction log backups every hour of the CK_SALES database. RAID-5 is designed to prevent the server from stopping if a failure of a disk occurs. Any Time. CertKiller. how often you should overwrite the media. Determining where you store this media could be a factor in the time it takes to retrieve the data. RAID-1 is designed to prevent the server from stopping if a failure of a disk occurs. and where to store the media. You should always perform a restore of a database to test the backup sets and to test whether the operator is skilled in performing a restore.www. It should be part of the design process. CertKiller.actualtests.

Any Time.co m 146 . The dbcc showcontig statement displays fragmentation information for indexes and tables. C: You should not use the dbcc checkdb statement. QUESTION NO: 148 You work as a database administrator at CertKiller. and filegroups.www.actualtests. You should consider making use of the binary_checksum statement to on the backup device to validate the checksum on the backup.com. During the course of the day you decided to enable Transparent Data Encryption (TDE) on the CK_DATA database using the statement below to backup the database: "Pass Any Exam. This statement can be used to determine database integrity problems that could compromise the backup set. You should consider making use of the dbcc checkdb statement on the backup device to check the integrity of the backup. B. It cannot be use to check the checksum of the backup media. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. Answer: A Explanation: This statement can ensure the following conditions are met: The backup set is complete. D: You should not use the dbcc showcontig statement. Incorrect Answers: B: You should not use the binary_checksum statement to on the backup device to validate the checksum on the backup.Microsoft 70-450: Practice Exam What should you do? A. You should consider making use of the restore verifyonly statement check the integrity of the backup. You should consider making use of the dbcc showcontig statement on the backup device to check the integrity of the backup.com currently makes use of Microsoft SQL Server 2008 for hosting databases. The dbcc checkdb statement is used to check the integrity of a database and can be used on tables. The destination drive has sufficient space to restore." .com Ac tua lTe sts . CertKiller. This statement is used to check the checksum value for a row of a table. C. Checksum is present on the media. Volumes are all readable. Using the checksum keyword with your backup statement and using the restore verifyonly statement to validate a backup increases the chances that your backup can be restored. The restore verifyonly command does not guarantee that the data can be recovered. indexes. D. but not on backup devices.

Transparent Data Encryption (TDE) is recommended by Microsoft to encrypt any backups of your database.bak A backup of the certificate used to protect the database encryption key sts . C. Any Time. What should you do? A. You would require having a backup of the certificate used to protect the database encryption key. You should have a backup of the certificate used to protect the database encryption key as well as a backup of the database. and thus will be unreadable. D: You do not need the password for the SQL Server service or the SQL Server Agent service. MEDIADESCRIPTION = 'media set for CK_DATA database'. MEDIANAME = 'CK_DATABackup'. The MEDIAPASSWORD keyword places a password on the media to protect the media from being restored by rogue operators. You would require having a backup of the SSL certificate of the server. B. The MEDIAPASSWORD keyword is not a recommended way to secure your backup.bak. Answer: B." .co m 147 . If the certificate is lost.E You should have access CK_Data. a rogue operator could use a password cracker to reveal the password for the media. the database cannot be restored. However. You would require having the password for the media.Microsoft 70-450: Practice Exam BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_Data. MEDIAPASSWORD = 'T3$tl<1n8' CertKiller. Incorrect Answers: A: You do not need to have a backup of the SSL certificate for the SQL server. You would require having the password for the account used for the SQL Server Agent service E. The SSL certificate can be used to have a SSL connection between a client and the SQL server. The backup of the database and the certificate should not be stored in the same location for security reasons.C.[CK_DATABackup] WITH FORMAT. It is imperative that you can access the backup file for the Sales database because without access to this file.bak. You should know the password to the media.bak'. The MEDIAPASSWORD keyword will not be available in future versions of SQL Server 2008. D. This is the backup file for the database. "Pass Any Exam. You would require having access to CK_SALES.actualtests.www.com wants you to plan for a disaster recovery by selecting what would be required to restore the CK_DATA database should disaster strike. but you do not need this certificate to restore a database. data on the encrypted backup will not be decrypted.com Ac tua lTe Explanation: The following three things are required to restore the CK_DATA database: The password for the media Access to CK_Data.

column-value integrity will be checked with dbcc checkdb .com Ac tua A." . and spatial indexes. You later come to the conclusion that the problem was not caused by indexes in the database or hardware corruption. C. QUESTION NO: 149 You work as a database administrator at CertKiller. You should run the DBCC CHECKDB command with the DATA_PURITY option.com. you must run dbcc checkdb with the data_purity option to enable column-value checks. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. Because the Parts database used to be on a SQL Server 2000 server. CertKiller. You should run the DBCC CHECKDB command with the PHYSICAL_ONLY option.Microsoft 70-450: Practice Exam The password for these accounts may be needed to make changes to the respective accounts.actualtests. but they are not needed to restore a database. You should not run dbcc checkdb with the extended_logical_checks option. You would specify with extended_logical_checks only if you have the following issues: Index problems that are not due to physical corruption Disabled page-level checksums Column-level hardware corruption "Pass Any Exam. Any Time. During the course of the day you move parts of the CK_SALES database from CERTKILLER-DB01 to a new server named CERTKILLER-DB02. CertKiller. What should you do? Answer: D Explanation: This option causes dbcc checkdb to check column values of tables to see if the data is out-ofrange or not valid. Once dbcc checkdb with data_purity has been run error-free on the Paris database. When a database is upgraded from a previous version of SQL Server. columnvalue checks are not enabled by default.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com wants you to find the out-of-range values manually and modify them. B. D. You should run the DBCC CHECKDB command with the REPAIR_ALLOW_DATA_LOSS Option.co m 148 . This option performs logical checks on an indexed view. You later inspect the application used to update the database and discover that an invalid out-ofrange value were entered into the database by the network users based on column data type in the tables in the CK_SALES database.www. lTe sts . XML indexes. You should run the DBCC CHECKDB command with the EXTENDED_LOGICAL_CHECKS Option.

com 149 Ac tua lTe You work as a database administrator at CertKiller. you need to run columnintegrity checks on the tables in Parts database. D. In this scenario. In this scenario. and then reconfigure the new monitor server.Microsoft 70-450: Practice Exam Incorrect Answers: A: In this scenario. Therefore.co m . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com additionally added a new server named CERTKILLER-DB02 and configured log shipping between CERTKILLER-DB01 and CERTKILLER-DB02 and a new monitor server. B: You should not run dbcc checkdb with the repair_allow_data_loss option. When the physical_only option is specified. Any Time. You should consider having the new server designated as the monitor server from the primary server.com. you do not believe that index issues or hardware corruption are the cause of the out-of-range issues with the column values.www. C.actualtests. you should not run dbcc checkdb with the repair allow data loss option. Answer: B Explanation: To be able to configure a new server as the monitor server and remove the existing monitor server. Therefore running dbcc checkdb with the extended_logical_checks option would not be the best choice. you wanted to determine the out-of-range column values and manually change them. B. you will need to remove log shipping first from the existing monitor server. You have successfully configured log shipping with the monitor server and require assigning the role of monitor server to another server removing the existing monitor server." . CertKiller. This is the only method that can be used to change to a new monitor server. column-integrity checks are not performed. You should consider having log shipping removed from the old monitor server first and then configure the new monitor server with log shipping. C: You should not run dbcc checkdb with the physical_only option. sts . You should consider having the new server designated as the monitor server from the primary and secondary servers. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Therefore. This option will attempt to correct errors in the database and might delete some pages in the database. you cannot change the "Pass Any Exam. this option might delete some data. You should consider having the new monitor server brought up and simply shut down the older one. After you configure log shipping with a monitor server. Part 2: Design a monitoring solution at the instance level (2 Questions) QUESTION NO: 150 What should you do? A.

the WMI Provider for Server Events translates the query into another form.com.actualtests.www. You use the sys.Microsoft 70-450: Practice Exam monitor server unless log shipping has been removed and reconfigured on the new monitor server. C. Any Time. The model and tempdb databases are never used for event notifications. a monitor server will track the last backup of the transaction log from the primary to the secondary server." . A monitor server is responsible for tracking activities that take place in log shipping. or in any database other than the master database.com planned using the sys.server_event_notifications view to view the event notifications in rows. which is used only for server-scoped event notifications. The master database would store such events. The tempdb database would store such events. Answer: D Explanation: When you execute a query for retrieving an event notification.co m 150 . CertKiller. The model database would store such events. Part 3: Design a solution to monitor performance and concurrency (22 Questions) "Pass Any Exam. The event notifications specific to database or object are stored in the database that you have specified in the query.com Ac tua lTe sts . B. For instance. CertKiller. where each row represents an event notification. The event notification is created in the master database. D: You cannot designate the new server as the monitor server if a monitor server currently exists. All the remaining methods are incorrect and will not allow you to change the monitor server. A monitor server can be configured to monitor more than one log shipping configuration.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com wants you to select which database stores such events? A.server_event_notifications catalog to view and track server-scoped event notifications. which is an event notification. Any database would store such events. Server-scoped event notifications are not stored in the model or tempdb databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. C: You cannot designate the new server as the monitor server if a monitor server currently exists. Incorrect Answers: A: You cannot shut down the old monitor server and bring the new server up as the monitor server. D. During the course of the day CertKiller. QUESTION NO: 151 You work as a database administrator at CertKiller.

Microsoft 70-450: Practice Exam

QUESTION NO: 152 You work as a database administrator at CertKiller.com. You are responsible for administering a database server named CERTKILLER-DB01 with a SQL Server 2008 instance. CERTKILLER-DB01 contains the following attributes:64-GB RAM4 quad-core processorsNumerous independent physical raid volumes You are in the process of using a transactional database on the instance. It is anticipated that the transactional database will have a high volume of INSERT, UPDATE, and DELETE activities. The activities encompass the creation of new tables. You receive an instruction from management to optimize the performance of the database as well as maximizing the disk bandwidth. You need to accomplish this by ensuring that the contention in the storage allocation structures is minimized. What should you do?

Answer: B

You work as a database administrator at CertKiller.com. Your duties include administrating the SQL Server 2008 infrastructure of CertKiller.com. You receive a notification from management requesting capacity planning data. You thus decide to implement a long-term infrastructure monitoring strategy. You need to determine the tasks you need to include in the design. What should you include? (Choose all that apply.) A. You should consider deploying the production databases after base lining the system. B. You should consider using database snapshot. C. You should consider setting the max worker threads. D. You should consider creating a new Database profile. "Pass Any Exam. Any Time." - www.actualtests.com 151

Ac

QUESTION NO: 153

tua

lTe

A. You should consider enabling Server Auditing. B. You should consider using multiple data files for the database. C. You should consider using row-level compression. D. You should consider using the checksum page verify option.

sts

.co

m

Microsoft 70-450: Practice Exam E. You should consider, on a regular basis, reviewing the system monitor counters. Answer: A,E

QUESTION NO: 154 CertKiller.com has employed you as a database administrator. You are responsible for administering the SQL Server 2008 infrastructure. During routine maintenance you discover that the instance is experiencing poor performance due to excessive CPU usage, server processes paging as well as deadlocks. You receive an instruction from the CIO to design a monitoring solution that will:Supply information including detailed deadlock informationMonitor and troubleshoot performance issues. You need to design this solution with the least amount of administrative effort. What should you do?

Answer: C

QUESTION NO: 155

You decide to implement a monitoring solution plan for the instance. You want to monitor the object usage statistics. Your solution needs to identify a list of at least 15 objects for the subsequent components:Stored procedures and functions that are often performed.Transact-SQL statements that is long running. Management wants you to use the monitoring solution plan in order to decrease the performance effect. You need to accomplish this with the minimum amount of administrative effort. What should you do? A. You should consider using the Hyper-V feature.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

CertKiller.com has employed you as a database administrator. You are responsible for administering a SQL Server 2008 instance.

tua

lTe

A. This can be accomplished using the SQLAGENT.OUT log. B. This can be accomplished using the Netsh utility. C. This can be accomplished using the Extended Events utility. D. This can be accomplished using the ServerManagerCMD utility.

sts

.co

m

152

Microsoft 70-450: Practice Exam B. You should consider using RAID 3. C. You should consider using the Background Intelligent Transfer Service (BITS). D. You should consider using dynamic management views. Answer: D

QUESTION NO: 156 CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com include administering the SQL Server 2008 infrastructure. The instance includes a database named CERTKILLER-DB02. CERTKILLER-DB02 is used for the day-to-day business operations of your company. You receive numerous complaints from clients stating that the response times are poor when executing reports. You thus decide to implement a performance monitoring strategy plan. This plan will capture and store the subsequent information:The executed Transact-SQL statements as well as query activity.Blocking and deadlock data.The counters for memory, disk and CPU. To ensure productivity you need to use the monitoring process. You need to accomplish this with the least amount of administrative effort. What should you do?

Answer: B

QUESTION NO: 157 CertKiller.com has hired you as a database administrator for their network. The CertKiller.com network contains four SQL servers that are configured to run SQL Server 2008. You receive an instruction from the CIO to configure one of the SQL servers named CERTKILLER-DB01 as a Central Management Server. CERTKILLER-DB01 will administer the other SQL servers on the company network. You then create a server group on CERTKILLERDB01 that will contain the other SQL servers in order to manage them. You require data about the memory and CPU from members of the server group. You need to determine a way to retrieve this data. "Pass Any Exam. Any Time." - www.actualtests.com 153

Ac

tua

A. You should consider using the Background Intelligent Transfer Service (BITS). B. You should consider using the data collector. C. You should consider using the Windows System Resource Manager (WSRM) feature. D. You should consider using the Event Subscriptions.

lTe

sts

.co

m

Microsoft 70-450: Practice Exam What should you do? (Choose all that apply.) A. You should consider using the Policy-Based Management policies. B. You should consider using Rules. C. You should consider using Dimensions. D. You should consider using the Transact-SQL statements. Answer: A,D Explanation: Central Management Servers allow you to administer multiple servers simultaneously. The Central Management Server uses server groups to maintain connection information for one or more instances of SQL Server. You can use Transact-SQL statements or Policy-Based Management policies to administer servers in server groups. After you configure a Central Management Server, you can create a query to display the resource usage, such as CPU and memory, on the servers that are members of the server group. Incorrect Answers: B: You cannot use rules or dimensions to administer servers in server groups by using Central Management Servers. Rules are database objects that are bound to columns or alias data types, and specify which data values are acceptable in a column. C: A dimension is a structural attribute of a cube, which is an organized hierarchy of categories that describe data in the fact table.

QUESTION NO: 158

You are employed as the database administrator at CertKiller.com. Your duties include managing a SQL Server 2008 server that host a database named CK_SALES. Employees in the sales department make use of CK_SALES to update sales records for online clients. You need to be able to check the amount of employees who are connected to CK_SALES at any given time. You decide to make use of System Monitor in conjunction with SQL Server objects and counters in order to capture the current amount of users for performance benchmarking. You need to determine a way to accomplish this. What should you do? A. This can be accomplished using SQL Server: Workload Group Stats. B. This can be accomplished using SQL Server: SQL Statistics. C. This can be accomplished using SQL Server: General Statistics. D. This can be accomplished using SQL Server: Databases.

"Pass Any Exam. Any Time." - www.actualtests.com

Ac

tua

lTe

sts

.co

m

154

co m 155 ." . "Pass Any Exam. QUESTION NO: 159 During routine monitoring you discover that numerous high-priority applications performs poorly when they are run simultaneously with low-priority resource-intensive applications on CERTKILLER-DB01. You thus need to determine what percentage of the processor is used by a particular group of applications. However.Microsoft 70-450: Practice Exam Answer: C Explanation: Using this object. You should look at the SQL Server:General Statistics in System Monitor. and Logins/sec. this object cannot be used for monitoring the current number of connected users to an instance of SQL Server. Any Time.www. B. Active Temp Tables. D: You should not use SQL Server: Databases object to view the current number of users. and bulk copy operations.com currently makes use of Microsoft SQL Server 2008 for hosting databases. this object cannot be used for monitoring the current number of users connected to an instance of SQL Server. this object cannot be used for monitoring the current number of connected users to an instance of SQL Server. This object contains counters that help you monitor backup/restore throughput. The connections and disconnections are displayed on per second basis. C. transaction log activities. You should look at the SQL Server:SQL Statistics in System Monitor. You are responsible for administering a database server named CERTKILLER-DB01. In order to solve the error you decide to make use of the Resource Governor. These counters are Temp Tables for Destruction. there are other counters available with this object. you would use the User Connections counter to view the current number of users connected an instance of SQL Server.com Ac You work as a database administrator at CertKiller. This object contains counters used for monitoring compilation and recompilations of user queries sent to an instance of SQL Server. you can capture information on the number of current connections to the SQL Server. Incorrect Answers: A: You should not use SQL Server: Workload Group Stats object to view the current number of users. However. Along with this counter. What should you do? A.actualtests. However. tua lTe sts . You should look at the SQL Server:Workload Group Statistics in System Monitor. CertKiller. You can also view the number of users who either connect or disconnect with the SQL Server instance. In this scenario. This object contains counters that monitor the performance of the Resource Governor workload group. B: You should not use SQL Server: SQL Statistics object to view the current number of users. Transactions. Connection resets/sec.com.

com. C. Answer: D Explanation: "Pass Any Exam. QUESTION NO: 160 What should you identify? A. You can apply these counters to the resource pools that you have defined in the workload groups. None of these objects allows you to apply the counters to an instance of the resource pools that you have defined in the workload groups.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Any Time. SQL Server:General Statistics or SQL Server:Exec Statistics objects. lTe sts ." . You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.Microsoft 70-450: Practice Exam D. D. Your best choice would be to use a combination of the Disk Usage and Server Activity collection sets. C: You should not use the SQL Server:Exec Statistics.actualtests. Your best choice would be to use the Query Statistics collection set. You thus need to determine the appropriate System Data collection sets you should use. None of these objects allows you to apply the counters to an instance of the resource pools that you have defined in the workload groups. SQL Server:General Statistics or SQL Server:Exec Statistics objects. and Query optimizations/sec. CertKiller. Incorrect Answers: B: You should not use the SQL Server:Exec Statistics. tua You work as a database administrator at CertKiller.www. Answer: A Explanation: The SQL Server :Workload Group Statistics object allows you to look at various counters such as CPU usage %.com Ac During routine monitoring you discover that CERTKILLER-DB01 is experiencing performance related errors. Max request memory grant (KB). B. None of these objects allows you to apply the counters to an instance of the resource pools that you have defined in the workload groups. You decide to trace resource issues that are related to the disk I/O and memory. D: You should not use the SQL Server:Exec Statistics. Your best choice would be to use the Server Activity collection set. Your best choice would be to use the Disk Usage collection set. Max request cpu time.co m 156 . SQL Server:General Statistics or SQL Server:Exec Statistics objects. You should look at the SQL Server:Exec Statistics in System Monitor.

Data Files and Disk Usage . You are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_SALES.com makes use of CK_SALES to accomplish their daily tasks. The growth is tracked in megabytes (MB) per day. sys. you can track the database growth using Disk Usage collection set. You can use this collection set to determine the health of system resources and to track any performance bottleneck with the system resources utilization.com. "Pass Any Exam.Microsoft 70-450: Practice Exam This collection set is mainly used for checking the health and resource utilization of the SQL Server. B: You should not use the Disk Usage collection set because this collection set gathers information on the databases hosted on the SQL Server 2008 system.dm_exec_requests and sys. sys. You thus need to determine the most appropriate utility that will assist you in this task.co m . This collection set cannot gather information related to disk I/O and memory. dm_os_schedulers . such as performance counters from the system and SQL Server. You can use these resources to track performance issues such as deadlocks.actualtests. sys. dm_os_waiting_tasks can be used together to detect deadlocks and performance bottlenecks.dm_exec_requests and sys. You receive notification from the CIO to capture all events taking place on CERTKILLER-DB01 as well as replaying a step-by-step analysis of the captured events. This collection set can use different resources. What should you do? A. It is recommended that you use a specific collection set to solve a problem related to one specific area in SQL Server performance. For instance.dm_exec_sessions . CertKiller.dm_exec_sessions . C: You should not use a combination of the Disk Usage and Server Activity collection sets to solve the problem stated in the scenario.www." . The information gathered is about the disk and the log usage on the SQL Server.Log File. such as query statistics. You should consider using SQL Server Profiler.dm_os_waiting_tasks views. sys.com currently makes use of Microsoft SQL Server 2008 for hosting databases. This collection set uses the sys.com 157 Ac tua lTe sts . This collection set cannot gather information related to disk I/O and memory. You would not be able to use two collection sets in combination. dm_exec_query_stats view to gather information along with many different resources. The sys. Any Time. and the text of individual queries. query plans. QUESTION NO: 161 You work as a database administrator at CertKiller. The Sales department at CertKiller. Incorrect Answers: A: You should not use Query Statistics collection set because this collection set gathers information related to queries used in the database. There are two types of collection items in this collection set: Disk Usage . You would use this collection set when you want to know how much a database and its related log files are growing on daily basis.

You should consider using sys. C: Policy-Based Management manages entities. You cannot use System Monitor. You should consider using sys. Any Time. and partitions. You can also replay the events captured by SQL Server Profiler to determine what exactly happened.Microsoft 70-450: Practice Exam B.com 158 Ac tua lTe sts . You should consider using sys. C. E.actualtests. Answer: A Explanation: SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of the SQL Server Database Engine or Analysis Service services." . or a Policy-Based Management policy for the purpose stated in the scenario. D. D: Database Engine Tuning Advisor provides recommendations to add. but it does not allow you to replay captured events.C "Pass Any Exam.dm_os_sys_memory.com are the administering SQL Server 2008 server named CERTKILLER-DB06. on an instance of SQL Server 2008. You receive an instruction from the CIO to optimize the performance of CERTKILLER-DB06.com has employed you as a database administrator. You need to determine the suitable dynamic management views that will assist you to accomplish the task. What should you identify? (Choose all that apply.co m . You should consider using System Monitor. You should consider using sys.dm_os_memory_brokers. Database Engine Tuning Advisor. such as databases or other SQL Server objects. or modify indexes. You need to gather data regarding the operating system-related memory usage of CERTKILLERDB06. You should consider using Policy-Based Management policy. Your duties at CertKiller. Database Engine Tuning Advisor allows you to analyze the performance effects of Transact-SQL statements executed against databases you want to tune.www. remove. indexed views. QUESTION NO: 162 CertKiller. Incorrect Answers: B: System Monitor is primarily used for monitoring resource usage associated with server processes. C. Answer: A. D. You should consider using Database Engine Tuning Advisor.dm_os_memory_nodes.dm_os_process_memory.dm_os_sys_info. SQL Server Profiler allows you to capture and save data about each event to a table or a file for analysis. B.) A. You should consider using sys.

com currently makes use of Microsoft SQL Server 2008 for hosting databases. This view displays information regarding memory nodes and the amount of physical memory reserved by SQL Server. Incorrect Answers: B: You should not use the sys. E: You should not use the sys.Microsoft 70-450: Practice Exam Explanation: Both views are new to SQL Server 2008.www. sts . You should consider using sys. You should consider using sys. D.dm_os_memory_nodes.com Ac What should you do? tua You receive an instruction from the CIO to test the SQL Server instance for memory leaks.dm_os_sys_memory. When managing SQL Server. you can use it to track the number of page fault count incurred by the SQL Server process. Answer: C Explanation: It also allows you to track memory objects allocated to the SQL Server 2008 instance.dm_os_memory_brokers view." . you can use this view to locate any possible memory leaks that may be occurring.dm_os_process_memory view. including total_phys .actualtests. This view is used for tracking memory allocation between the components of SQL Server.com. B.co m 159 . For instance. if there are performance issues related to memory. You should consider using sys. The sys. avail_phys .dm_os_sys_info view provides a simple display of physical and virtual memory that is available with the operating system. You thus need to determine the appropriate dynamic management view you need to use to accomplish this. and sys_hi_signal . Any Time. You should consider using sys.dm_os_memory_objects.dm_os_sys_memory view displays the memory usage in ten columns. CertKiller. This view is used to display the memory allocations for SQL Server process space.dm_os_memory_nodes view. The sys. which provide the state of the memory resource. Incorrect Answers: "Pass Any Exam. C. QUESTION NO: 163 A. lTe You work as a database administrator at CertKiller. This view also provides the information of the system resources available and consumed by SQL Server. You are responsible for administering a SQL server named CERTKILLER-DB01.dm_os_process_memory. D: You should not use the sys. sys_cache .dm_os_sys_memoiy view provides a more detailed view of the physical memory and the memory-resource notification bits. The sys.

The DAC model will use port 443 by default.Microsoft 70-450: Practice Exam A: You should not use the sys. This view is used to display memory allocations for the SQL Server process space. The sys.1. Incorrect Answers: A: Port 1433 is the port on which SQL Server listens for client requests. lTe sts . D: Port 80 is the default HTTP port. This view displays information about the memory nodes and the amount of physical memory reserved by SQL Server.co m 160 . D. The DAC model will use port 1443 by default.dm_os_memory_nodes view. For instance. along with port 1434. The DAC model will use port 80 by default." .dm_os_process_memory view. C.www. C: Port 443 is the default SSL port. CertKiller. This will enable DAC for the remote connections. What should you identify? Answer: B Explanation: By default. sys_cache and sys_hi_signal.com has hired you as a database administrator for their network. DAC uses the Ioopback address. QUESTION NO: 164 CertKiller. This port is not used for DAC connections. This view provides a detailed view of the physical memory and memory-resource notification bits. This port is not used for DAC connections.dm_os_sys_memory view displays memory usage in ten columns.actualtests. Any Time. You have received instruction from the CIO to test the Dedicated Administrator Connection (DAC) connection with CERTKILLER-DB01.0. You need to determine the correct port DAC will it use by default to connect to CERTKILLER-DB01. then you should run the sp_configure stored procedure. The DAC model will use port 1434 by default. To initialize DAC on the SQL Server. You are responsible for administering a database server named CERTKILLER-DB01.dm_os_sys_memory view. you should first use a client on the server itself.com currently makes use of Microsoft SQL Server 2008 for hosting databases. If you need to remotely connect to the SQL Server instance using DAC.0. avail_phys. This port is not used for DAC connections. which is 127. B. Some of the columns are total_phys. B: You should not use the sys. D: You should not use the sys. which provide the state of the memory resource. you can use it to track the number of page fault count incurred by the SQL Server process.com Ac tua A. "Pass Any Exam.

Answer: C Explanation: SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of the SQL Server Database Engine or Analysis Service services. SQL Server Profiler allows you to capture and save data about each event to a table or a file for analysis. such as databases or other SQL Server objects. What should you do? A. You have a suspicion that the performance error is a result of deadlocks. D: You should not create a Policy-Based Management policy because it cannot be used to collect information about deadlock events and save it in a file. CERTKILLERDB01 contains numerous databases that are accessed by aCertKiller.com Ac tua lTe sts . You receive an instruction from management to determine which transaction is causing the deadlocks. B. You should consider creating a Policy-based Management policy.co m 161 . Incorrect Answers: A: You cannot create a new trace flag in SQL Server 2008. C. You should consider creating a trace flag. A System Monitor counter would not allow you to capture information about deadlock events and save it in a table on the SQL server." . You can also replay the events captured by SQL Server Profiler to determine what exactly happened. System Monitor is primarily used for monitoring resource usage associated with server processes.Microsoft 70-450: Practice Exam QUESTION NO: 165 CertKiller. SQL Server 2008 does not allow you to create new trace flags. Any Time. Trace flags typically diagnose performance issues or debug stored procedures. QUESTION NO: 166 "Pass Any Exam. To trace deadlock events. you should add the Deadlock graph event class to a trace. You should consider creating a System Monitor counter.actualtests. You should consider creating a SQL Server Profiler trace. SQL Server contains some existing trace flags that can be used for this purpose. Policy-Based Management manages entities. Trace flags allow you to set particular characteristics of a server on a temporary basis or to turn off specific behavior.com has hired you as a database administrator for their network. D. B: You should not create a System Monitor counter.www. You receive numerous complaints from users regarding the poor performance of CERTKILLERDB01. you should create a new trace by using SQL Server Profiler. on an instance of SQL Server 2008. You are responsible for administering a Microsoft SQL Server 2008 server named CERTKILLER-DB01. To do this. You decide to collect the information regarding the deadlocks and save it in a file.com users.

This can be accomplished by rescheduling the backup job and alert job for log shipping D. copy job. You should only have the maintenance plan create full backups and differential backups. but by the log shipping and maintenance plan trying to create log backups of the same database. To maintain productivity you need ensure that log shipping functions properly. Incorrect Answers: B: You do not have to eliminate the full backups from the database maintenance plan. This can be accomplished by ensuring that the database maintenance plan does not create full backups C. You should use your log shipping backup folder to archive the log backups.com currently makes use of Microsoft SQL Server 2008 for hosting databases. The copy job resides on the secondary server instance and copies the backup files from the primary server to the secondary server. You should archive the logs to another media for longterm storage. When log shipping is implemented. differential backups as well as transaction log backups on CK_SALES.com has employed you as a database administrator.com Ac tua lTe sts Answer: A . The conflict is not caused by the full backup. This can be accomplished by ensuring that the database maintenance plan does not create transaction log backups.co m 162 . log shipping will not function correctly. You should also set the backup retention period to a longer time period to allow you to store the log files. The alert job is created on the monitor server instance. Any Time. The backup job performs the backup operation.actualtests. Changing the schedule of these jobs will not fix the problem. The restore job is created on the secondary server and restores the copied backup files to the secondary databases. You have received instruction from the CIO to create a maintenance plan in order to execute full backups. This can be accomplished by rescheduling the copy job and restore job for log shipping Explanation: In this scenario. B. CertKiller. C: You should not reschedule the any of the jobs for log shipping. "Pass Any Exam." . You are responsible for administering a database server named CERTKILLER-DB03 that hosts a database named CK_SALES. if the maintenance plan and log shipping both attempt to create transaction log backups of the Orders database. The problem is caused because the maintenance plan and log shipping are both attempting to create a transaction log of the same database. restore job.Microsoft 70-450: Practice Exam CertKiller. and removes old backup files and history information. logs history to the local server and the monitor server. This job raises alerts for the primary and secondary databases when the backup and restore operations have not completed successfully. During routine monitoring you discover that log shipping does not function properly on CK_SALES. four jobs are needed: the backup job. and alert job.www. What should you do? A. CK_SALES is configured as a log shipping database.

Any Time. Incorrect Answers: "Pass Any Exam. logs history to the local server and the monitor server.Microsoft 70-450: Practice Exam D: You should not reschedule the any of the jobs for log shipping. The problem is caused because the maintenance plan and log shipping are both attempting to create a transaction log of the same database. This job raises alerts for the primary and secondary databases when the backup and restore operations have not completed successfully. C. CertKiller. You are responsible for administering a database server named CERTKILLER-DB01. The command will have no effect.actualtests. The command will be automatically used as a global trace flag. The copy job resides on the secondary server instance and copies the backup files from the primary server to the secondary server. The alert job is created on the monitor server instance. . and alert job. four jobs are needed: the backup job. You need to determine what the result will be. The command will be applicable for the current session. You can also write a startup script to apply the global trace flag. When log shipping is implemented. restore job. A global trace flag is visible to every connection on the server.co m 163 .www. The trace flag will apply to the current session.com. To enable it globally. You enter command by omitting the -T parameter. What should you identify? Answer: B Explanation: A trace flag can be either a session trace flag or a global trace flag. The command will vary as applied using the dbcc traceon command. and removes old backup files and history information.com currently makes use of Microsoft SQL Server 2008 for hosting databases. tua lTe sts You have received instruction from the CIO to use the dbcc traceon 1222 command in order to enable a global trace. but not to any other sessions on the server. The backup job performs the backup operation. QUESTION NO: 167 You work as a database administrator at CertKiller. The -T parameter applies only to a global trace flag. A session trace flag is active for the current session only." . D. Changing the schedule of these jobs will not fix the problem.com Ac A. A trace flag can either be specific to a session or it can be a global trace flag. B. you should use the -T parameter at startup. copy job. A trace flag can be switched on or off by using the DBCC TRACEON and DBCC TRACEOFF commands. The restore job is created on the secondary server and restores the copied backup files to the secondary databases.

C. The global trace flag is never used automatically as a global trace flag.com has hired you as a database administrator for their network.Microsoft 70-450: Practice Exam A: The remaining options are incorrect. Any Time. The global trace flag is never used automatically as a global trace flag. "Pass Any Exam. The CHKPT wait will illustrate this.co CertKiller. The CXPACKET wait will illustrate this. What should you identify? Answer: B Explanation: The CXPACKET wait occurs when there is a wait on the data packets and the thread is waiting for the query to finish.dm_os_wait_stats view. This type of wait can be viewed using sys. A global trace flag is applicable globally and is not specific to a session. The behavior of the trace flag does not vary except that you need to use the -T parameter. The EXCHANGE wait will illustrate this. The behavior of the trace flag does not vary except that you need to use the -T parameter. To reduce wait. D. tua lTe You are in the process of monitoring the threads on CERTKILLER-DB01. you must use the -T parameter to mark it a global trace flag.www. B.com 164 Ac A. The thread is also waiting for the query to end. You need to determine the type of wait that will illustrate this. m QUESTION NO: 168 . The global trace flag is never used automatically as a global trace flag. This wait occurs when a checkpoint task is made to wait for the next checkpoint request.actualtests. A global trace flag is applicable globally and is not specific to a session. The behavior of the trace flag does not vary except that you need to use the -T parameter. or use the MAXDOP query hint to limit the number of processors used for the query." . You are responsible for administering a database server named CERTKILLER-DB01. The CHECKPOINT_QUEUE wait does not occur when there is a wait on the data packets and the thread is waiting for the query to finish. you can either reduce the degree of parallelism. C: The remaining options are incorrect. A global trace flag is applicable globally and is not specific to a session. D: The remaining options are incorrect. CertKiller.dm_os_wait_stats view. The CHECKPOINT_QUEUE wait will illustrate this.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You discover that there is a wait on the data packets. You accomplish this using the sys. sts . you must use the -T parameter to mark it a global trace flag. Incorrect Answers: A: The CHECKPOINT_QUEUE option is incorrect. you must use the -T parameter to mark it a global trace flag.

actualtests. QUESTION NO: 169 You work as a database administrator at CertKiller. Database Engine Tuning Advisor is not meant to capture information on deadlocks.co m 165 . CHKPT informs the checkpoint thread to start during a SQL Server start. the information regarding the processes and objects in the deadlock is added to the Text Data column. This type of wait occurs in the query processor exchange iterator when the synchronization phase of parallel queries is in process.com to view the deadlocks that have occurred on CERTKILLER-DB01 whilst extracting the information to a deadlock XML file. B. D. You should consider making use of Database Engine Tuning Advisor." . which is . You should consider making use of Performance Monitor.com. CertKiller. You can also use dynamic management views to diagnose a variety of performance-related issues that may arise while running the server. During the course of the day you receive instruction from CertKiller. The CHKPT wait does not occur when there is a wait on the data packets and the thread is waiting for the query to finish.com currently makes use of Microsoft SQL Server 2008 for hosting databases. The EXCHANGE wait does not occur when there is a wait on the data packets and the thread is waiting for the query to finish. xdl file. You can use SQL Server Profiler to trace specific events that take place in the database. The CHKPT wait occurs when SQL Server is starting up. You should consider making use of Dynamic management views. Dynamic management views are used for monitoring the health of a SQL Server and its resources. B: You should not use Database Engine Tuning Advisor to view the deadlocks that have occurred on the server.com Ac tua lTe A. sts . You can extract the XML document as a deadlock XML document. To be able to capture a deadlock event. What should you do? Answer: D Explanation: You should use the SQL Server Profiler to view deadlocks that have occurred on the server and to extract the information to a deadlock XML file. C.Microsoft 70-450: Practice Exam C: The CHKPT option is incorrect. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.www. you need to add the Deadlock graph event class to the trace that you use for tracking deadlock events. Any Time. "Pass Any Exam. You can then open the . When you add the Deadlock graph event. xdl file in the SQL Server Management Studio. D: The EXCHANGE option is incorrect. You should consider making use of SQL Server Profiler. Incorrect Answers: A: You should not use dynamic management views to view the deadlocks that have occurred on the server.

Any Time.www.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You can also use Database Engine Tuning Advisor to resolve unused or potential index issues. you must run the sp_configure procedure on the server to enable remote connections.Microsoft 70-450: Practice Exam Database Engine Tuning Advisor can work with different types of indexes. C.com Ac tua A. Performance Monitor is not meant to capture information on deadlocks. CertKiller. You have later created a Dedicated Administrator Connection with the server and attempt to connect to CERTKILLER-DB01 from the SQL Server Management Studio Query Editor. CertKiller.com recently discovered that CERTKILLER-DB01 is no longer accessible to its clients due to an error. You should consider making use of the sqlcmd command-prompt utility to use DAC. QUESTION NO: 170 You work as a database administrator at CertKiller. anyone trying to establish a DAC connection must have the sqladmin permission on the SQL Server." . It is not mandatory to connect using the sqlcmd command-prompt utility. lTe sts What should you do? . To initialize DAC on the SQL Server. C: You should not use Performance Monitor to view the deadlocks that have occurred on the server. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You should consider disconnecting before you attempt to connect. You should consider using port 80 as the default port.1.com. along with port 1434. If you want to connect remotely. Performance Monitor can capture performance-related information on the services running on the operating system and using operating system resources. D. You can connect either remotely or through the client on the server itself. However. this error does not occur. Answer: C Explanation: There can only be one DAC connection to the SQL Server instance. You must disconnect the first connection to be able to connect using DAC.actualtests. DAC uses the loopback address. but receive an error 17810. With a single connection. such as clustered or nonclustered. "Pass Any Exam. You should consider making use of the DAC to connect with the default database instead of the master database. Incorrect Answers: A: You can use either the sqlcmd command-prompt utility or the SQL Server Management Studio Query Editor to connect. CertKiller. B: You should not use port 80 as the default port to resolve this problem.0. Error 17810 occurs if you attempt another connection when an existing connection is alive. which is 127. Also. By default. The error in this scenario does not relate to the command. B.0.co m 166 .com wants you to resolve the error. such as RAM and the processor.

Lowering the degree of parallelism does not affect this wait.com wants you to identify which problem will be corrected taking the actions above? A. You can do this by issuing the sqlcmd A d master command. If you need to remotely connect to the SQL Server instance using DAC. CertKiller. By default.Microsoft 70-450: Practice Exam you should first use a client on the server itself.actualtests. you can either reduce the degree of parallelism or use the MAXDOP query hint to limit the number of processors used for the query. there is a provision to override the connection to the default database and directly connect to the master database. The EXCHANGE problem will be corrected.co m 167 . connections are made to the default database. D: The EXCHANGE option is incorrect. This type of wait occurs when there is a wait on the data packets and the thread is waiting for the query to finish." . CHKPT wait occurs when a SQL Server is starting up. CHKPT informs the checkpoint thread to start during a SQL Server start. After connecting to the default database.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Lowering the degree of parallelism does not affect this wait. This type of wait occurs in the query processor exchange iterator when the synchronization phase of parallel queries is in process.com to lower the degree of parallelism after discovering a wait problem in the sys. The error in this scenario does not relate to which database you are trying to connect. B. C: The CHKPT option is incorrect. Lowering the degree of parallelism does not affect this wait. The CHECKPOINT_QUEUE problem will be corrected. you can connect with the master database. However. To be able to reduce wait. This will enable DAC for remote connections. The CHKPT problem will be corrected. The error stated in the scenario does not relate to the port being used. Answer: A Explanation: Lowering the degree of parallelism will affect the CXPACKET wait. D: You should not try to make a connection to the default database.com Ac tua lTe sts . Incorrect Answers: B: The option CHECKPOINT_QUEUE is incorrect. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com. you should run the sp_configure stored procedure. The CXPACKET problem will be corrected.www. CertKiller. QUESTION NO: 171 You work as a database administrator at CertKiller. "Pass Any Exam. C. D. During the course of the day you receive instruction from CertKiller. Any Time.dm_os_wait_stats view. This wait occurs when the checkpoint task is made to wait for the next checkpoint request.

A. CertKiller. B. With a template. Saving traces in a file has the following benefits: Allows you to create a workload Allows you to capture events and replay them later Allows you to share traces in a file In SQL Server Profiler. For instance.www. xdl ).actualtests. you do not need to configure the trace definitions repeatedly. Any Time.com additionally wants you to create a template which will be used in another server named CERTKILLER-DB02. C. The advantage of using a trace template is that you will be allowed to capture events and replay them later. You can use SQL Server Profiler to trace specific events on the database that take place in the database. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com. you define trace definitions to monitor for a specific event.com Ac tua lTe sts . not benefits of creating a trace template. you can have either a trace file or a trace template. CertKiller. you can use SQL Server Profiler to view deadlocks that have occurred on the server and extract the information to a deadlock XML file (." . CertKiller. The same template can be exported from one server and imported onto the other server for reuse.Microsoft 70-450: Practice Exam QUESTION NO: 172 You work as a database administrator at CertKiller. Answer: A Explanation: The benefit of creating a trace template is that you will be able to capture the same event data each time you use the template. The advantage of using a trace template is that you will be allowed to create a workload. D. During the course of the day you receive instruction from CertKiller. The advantage of using a trace template is that you will be allowed to capture the same event data each time. When you define a trace template.co m 168 .com to make use of SQL Server Profiler to trace specific event on the database which took place.com wants to know the advantages of using a trace template. The other alternatives are benefits of saving traces in a file. The advantage of using a trace template is that you will be allowed to share the traces in a file. QUESTION NO: 173 "Pass Any Exam. SQL Server Profiler is typically used to trace specific events.com currently makes use of Microsoft SQL Server 2008 for hosting databases. The trace file contains the captured trace data and the trace template contains consistent trace definitions that can be used each time you run the template.

C. you can use the Database Engine Tuning Advisor to recommend indexes for a single or multiple databases. Answer: B Explanation: You should generate a script to apply the recommendations. Any Time. which can be done easily by exporting the script with the . From SQL Server 2005 onwards. C: You should not use SQL Server Profiler because it does not provide recommendations on the indexes in your database. A number of dynamic management views or functions are available to provide index status in a database. it has been replaced with SQL Server Management Studio." . What should you do? A.actualtests. QUESTION NO: 174 You work as a database administrator at CertKiller. The instance is located on a four-processor.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller. You can also use the Database Engine Tuning Advisor to resolve unused or potential index issues.www. D. You should consider making use of Dynamic management views. SQL Server Profiler is used for tracing certain events that take place within a database. these views or functions do not provide recommendations and generate a script for applying the recommendations. If you have a performance-related concern. An example of such an event is login failures that may occur when connecting to a database. You should consider making use of SQL Server Profiler.com. You should consider making use of Database Engine Tuning Advisor. It will also not be able to generate a script for the recommendations. The same script can then be run on a database in Query Editor.com currently makes use of Microsoft SQL Server 2008 for hosting databases. The instance includes an enormous "Pass Any Exam. B.co m .com 169 Ac tua lTe sts . You are responsible for administering a SQL Server 2008 instance. Incorrect Answers: A: You should not use dynamic management views. However. quad-core server named CERTKILLER-DB04. CERTKILLER-DB04 often experiences CPU pressure. The Database Engine Tuning Advisor can work with different types of indexes. During the course of the day you receive instruction from CertKiller. D: You should not use SQL Query Analyzer because it no longer exists in SQL Server 2008. such as clustered or nonclustered . This was part of the SQL Server 2000 or prior versions.com to generate performance recommendations for indexes available in the CK_SALES database on CERTKILLER-DB01 then generate a script to apply the recommendations. You should consider making use of SQL Query Analyzer. CertKiller. sql extension.com. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.

The maintenance strategy plan should also include the index maintenance operations. You should use the affinity mask option. Any Time. You consider the facts below prior to designing the strategy:The standard fragmentation for the clustered index of the CK_SALES is less than 3 percent. What should you do? A. D. You receive an instruction from management to make sure that the online index rebuilds does not use all the available CPU cycles.CK_SALES includes a column of the xml data type. scheduled or rebuilding operations." . You thus need to determine the configuration option that will ensure this.CK_SALES is accessed continuously.Microsoft 70-450: Practice Exam mission-critical database that is constantly being used. C.New rows are added to CK_SALES continuously. B. Answer: D QUESTION NO: 175 CertKiller. You are responsible for administering the SQL Server 2008 infrastructure of the organization. You should consider having the Storage Manager rebuilding montly. You should consider having CK_SALES reorganizing by configuring the NTFS quotas.actualtests. You should use the affinity I/O mask option.co m . You should consider stopping the clustered index of CK_SALES from reorganizing. B.www.com 170 Ac tua lTe sts . You should consider using the File Server Resource Manager (FSRM) on CK_SALES.com has employed you as a database administrator. What should you do? A. You should use optimize for ad hoc workloads option. D. You should use the max degree of parallelism option. Answer: B QUESTION NO: 176 "Pass Any Exam. C. To ensure productivity you need to use strategy to make sure that the performance of the queries on CK_SALES is at its best. You receive an instruction from management to implement a maintenance strategy plan for a critical database that includes a table named CK_SALES.

You gain a performance benefit because you will have fewer rows to work with. However. Incorrect Answers: A: In vertical partitioning. CK_ PRODUCTS contains over three million rows and six columns with information for the year. You should consider using vertical partitioning. Answer: B Explanation: When you apply horizontal partitioning on a table that contains a large number of rows.www. You should consider using Normalization partitioning. the number of rows is split across multiple tables but the number of columns remains the same. C. You are responsible for managing a database server named CERTKILLER-DB01 that hosts a database named CK_PRODUCTS. fewer columns are retained.com currently makes use of Microsoft SQL Server 2008 for hosting databases. redundant columns are removed from the primary table and moved into secondary tables. You should consider using Row-Splitting partitioning. which means that each row contains a portion of the logical row in the partitioned table. When you join the rows from the partitioned tables based on a UNIQUE KEY column. The redundant columns are then linked with the primary table using the primary or foreign key.co m 171 . Vertical partitioning can be of two types: C: In row splitting.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller. In vertical partitioning. You decide to divide the table into multiple partitioned tables. As an example.actualtests. D: In normalization. You receive an instruction from the CIO to replicate the information to numerous subscribers. the columns are divided among multiple tables with the same number of rows. You should consider using horizontal partitioning. in this type of partitioning. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs. it becomes the original row with the complete data.com. Any Time. you can split the table into four different tables where each table represents data for a specific quarter for the year. D. You need to make sure that every table hold data for a specific quarter is included in a table." . you will be able to split the table into fewer rows with the same number of columns. CertKiller. With horizontal partitioning. What should you do? A. QUESTION NO: 177 "Pass Any Exam.com Ac tua lTe sts . B. the number of columns always remains the same across multiple tables. You make use of transformable subscriptions that exclude certain rows on a per subscriber basis to accomplish this. you will have the same number of rows but fewer columns.

B. QUESTION NO: 178 "Pass Any Exam.www. You receive an instruction from the CIO to replicate the information to numerous subscribers. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.co m 172 .com Ac tua lTe sts . C. You gain a performance benefit because you will have fewer rows to work with. You need to make sure that every table hold data for a specific quarter is included in a table.com.com currently makes use of Microsoft SQL Server 2008 for hosting databases. However. you will be able to split the table into fewer rows with the same number of columns. Any Time. In vertical partitioning. The redundant columns are then linked with the primary table using the primary or foreign key. With horizontal partitioning. redundant columns are removed from the primary table and moved into secondary tables. You make use of transformable subscriptions that exclude certain rows on a per subscriber basis to accomplish this. the columns are divided among multiple tables with the same number of rows. you can split the table into four different tables where each table represents data for a specific quarter for the year. in this type of partitioning. D. you will have the same number of rows but fewer columns. You should consider using vertical partitioning. CK_RESEARCH contains over four million rows and eight columns with information for one annum.actualtests. You should consider using Normalization partitioning. it becomes the original row with the complete data. You are responsible for managing a database server named CERTKILLER-DB01 that hosts a database named CK_RESEARCH." . When you join the rows from the partitioned tables based on a UNIQUE KEY column. You should consider using horizontal partitioning. You decide to divide the table into multiple partitioned tables. CertKiller. the number of columns always remains the same across multiple tables.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller. Incorrect Answers: A: In vertical partitioning. C: In normalization. which means that each row contains a portion of the logical row in the partitioned table. What should you do? A. the number of rows is split across multiple tables but the number of columns remains the same. As an example. You should consider using Row-Splitting partitioning. Answer: D Explanation: When you apply horizontal partitioning on a table that contains a large number of rows. Vertical partitioning can be of two types: B: In row splitting. fewer columns are retained.

you can split the table into four different tables where each table represents data for a specific quarter for the year. Any Time. the number of columns always remains the same across multiple tables. Answer: A In vertical partitioning. QUESTION NO: 179 CertKiller.com has employed you as a database administrator. You "Pass Any Exam.actualtests. In row splitting.. The remaining two options are incorrect. In normalization. CertKiller. It will result in the table having fewer columns and fewer rows. However. You gain a performance benefit because you will have fewer rows to work with. The redundant columns are then linked with the primary table using primary or foreign key. Your duties at CertKiller. What should you identify? A. C.com has hired you as a database administrator for their network. When you join the rows from the partitioned tables based on a UNIQUE KEY column. which means that each row contains a portion of the logical row in the partitioned table. B. Vertical partitioning can be of two types: normalization and row splitting. it becomes the original row with the complete data.com 173 Ac tua Explanation: When you apply horizontal partitioning on a table that contains a large number of rows. It will result in the table having fewer rows and same amount of columns. In vertical partitioning. the number of rows is split across multiple tables but the number of columns remains the same. you will be able to split the table into fewer rows and the same number of columns. lTe sts . You need to determine how the subscribers will receive the subscription during the replication process. As an example. You receive an instruction from the CIO to replicate the data to a number of subscribers. fewer columns are retained. the columns are divided amongst multiple tables with the same number of rows.com are the administering a Microsoft SQL Server 2008 that contains a database with a huge amount of data.com currently makes use of Microsoft SQL Server 2008 Enterprise Edition for hosting databases.co m . It will result in the table having same amount of columns and same amount of rows. D. They cannot be achieved by applying horizontal partitioning. With horizontal partitioning.Microsoft 70-450: Practice Exam CertKiller." . in this type of partitioning. You decide to partition the information in a horizontal manner for a transformable subscription. you will have the same number of rows but fewer columns. It will result in the table having same amount of rows but less columns. Horizontal partitioning allows you to split the rows across multiple tables depending on your needs. A table in the database contains more than 6 million rows and 6 columns.www. redundant columns are removed from the primary table and moved into secondary tables.

while I/O utilization and memory utilization is decreased.dm_db_index_physical_stats. The two types of data compression are row and page compression.dm_db_index_usage_stats dynamic management function because this function does not provide page compression statistics for a partition. The possible values for this parameter are: DATA_ COMPRESSION = { NONE | ROW | PAGE } Configuring row and page compression can affect the performance of your sever. D: You should not query the sys. You can use the data_compression parameter of the create table. dm_db_index_operational_stats dynamic management function to obtain page compression statistics. CPU utilization is increased. During routine monitoring you discover that the performance of CERTKILLER-DB01 has degraded after page compression was configured. The sys. you can configure different types of compression for each partition.www. You should consider using sys.dm_db_index_physical_stats function contains information about the size and fragmentation "Pass Any Exam. and alter index Transact-SQL statements to configure data compression. You should consider using sys. C. The sys.co m 174 . The sys.dm_db_index_physical_stats dynamic management function because this function does not provide page compression statistics for a partition. Incorrect Answers: B: You should not query the sys." . B.dm_db_index_usage_stats function provides information about the number of different types of index operations along with the time each type of operation was last performed. C: You should not query the sys.Microsoft 70-450: Practice Exam are responsible for administering a database server named CERTKILLER-DB01 that hosts a database named CK_ACCOUNTS. You can query the sys. You need to determine the dynamic management function you should use in order to monitor the page compression statistics for the partition. You should consider using sys.dm_db_index_usage_stats.dm_db_partition_stats dynamic management function because this function does not provide page compression statistics for a partition.com Ac tua lTe sts . create index .dm_db_partition_stats. D. When you have configured partitions on a table or index. When you configure row and page compression. You are in the process of creating a partition for a column named ItemID in the Items table that is located in CK_ACCOUNTS.actualtests. You decide to configure page partition on the partition. Any Time.dm_db_partition_stats function provides information about page and row-count for every partition in the current database. What should you do? A. Answer: A Explanation: SQL Server 2008 Enterprise and Developer editions allow you to configure compression for tables and indexes.dm_db_index_operational_stats. You should consider using sys. alter table.

You receive an instruction from the CIO to create a partitioned data warehouse fact table. you can rebuild the table on all partitions. 2 and 3 are rebuilt with page-level compression.Microsoft 70-450: Practice Exam for the data and indexes of the specified table or view. Any Time.com Ac Explanation: The alter table statement rebuilds one or all partitions.com has employed you as a database administrator. You can specify a single partition to rebuild. C: You should not use any option with the alter partition function statement. The rebuild partition option specifies the number of the partition to be rebuilt. If you specify rebuild partition = all. D. C.co m 175 . and 6 are rebuilt with row-level compression. DATA_COMPRESSION = ROW ON PARTITIONS (4 TO 6) ) tua lTe sts . QUESTION NO: 180 CertKiller. You should make use of ALTER TABLE and REBUILD PARTITION = ALL. B. You need to make sure that the partitions are all compressed.actualtests. The number of the partition cannot be zero. or you can specify multiple partitions. ALTER TABLE Orders REBUILD PARTITION = ALL WITH (DATA_COMPRESSION = PAGE ON PARTITIONS (1 TO 3). Splits and merges are handled through the alter partition function statement. Partitions 1. Due to the size of the table you need to store the information over a number of disks." . Part 2: Design a solution to govern resources (2 Questions) "Pass Any Exam. The following code rebuilds all partitions for the Orders table on partitions. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = ALL. 5. CertKiller. Partitions 4. not the alter partition function statement. What should you do? A.com include administering the SQL Server 2008 servers. Your duties at CertKiller. You should make use of ALTER TABLE and REBUILD PARTITION = 0. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = 0. B. You can only rebuild a partition for a table with the alter table statement. Answer: D In correct Answers: A: You should not use the alter table statement and the rebuild partition = 0 option.www.com has partitioning functions that split the tables horizontally based on the value in a particular column.

You should consider creating a resource pool. This can be accomplished by configure Background Intelligent Transfer Service (BITS) server extensions.com. CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. . It is important that you make sure that the backup jobs have a little effect on the performance of CERTKILLER-DB01. You should consider creating a counter log C. D. CertKiller. C.actualtests. CertKiller. D. Any Time. This can be accomplished by using a resource-allocation policy. "Pass Any Exam. You send a proposal to management outlining your plans to implement an incremental backup strategy for TESTDATA as well as using backup compression. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com wants you to configure the Resource Governor. F. You should consider creating a classifier function.com. This can be accomplished by ensuring that the Resource Governor is used. What should you do? You work as a database administrator at CertKiller. E. B. You should consider creating a workload file. You should consider creating a trace log B.Microsoft 70-450: Practice Exam QUESTION NO: 181 You work as a database administrator at CertKiller. You should consider creating a workload group. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named TESTDATA. During the course of the day you discovered that the high-priority application used with the database performs poorly when run at the same time with lower-priority resource intensive applications on CERTKILLER-DB01. This can be accomplished by configure the Distributed File System (DFS).co m . What should you do? (Choose all that apply) A." .com 176 Ac tua QUESTION NO: 182 lTe Answer: D sts A.www. During routine monitoring you discover that TESTDATA is experiencing high volumes of queries and transactions that affect the performance of the processor.com currently makes use of Microsoft SQL Server 2008 for hosting databases.

Part 3: Design policies by using Policy-Based Management (10 Questions) You work as a database administrator at CertKiller. you should then create a classifier function.com currently makes use of Microsoft SQL Server 2003 for hosting databases.All the stored procedures in the user databases must begin with DS_Disabling Database Mail on CERTKILLERDB01." . You need to determine a way to solve the problem.Microsoft 70-450: Practice Exam Answer: D. Any Time.E. To control resources effectively. After creating the workload group. Trace logs and counter logs are not configured in the Resource Governor.com.co m . You are responsible for administering a database server named CERTKILLER-DB01. applications can be grouped by priority into resource pools using the Resource Governor.F Explanation: You should perform the following steps in this order: Create a resource pool. Define a classifier function. You do not need a workload file to configure the Resource Governor. You have received instruction from the CIO to add the Policy-Based Management policies below on CERTKILLER-DB01:All the tables in the user databases must have an index. CertKiller. "Pass Any Exam. You can then limit the resource usage by application pool to prevent the lower-priority applications from taking resources from high-priority applications. The classifier function groups applications into workload groups so that limits can be applied to the workload groups for their resource usage. After the Resource Governor has been enabled.com 177 Ac QUESTION NO: 183 tua lTe sts .actualtests. you can create a resource pool to set limits on resource usage. Trace logs and counter logs are not configured in the Resource Governor. Incorrect Answers: A: You should not create a trace log or a counter log. C: You should not create a workload file.Only encrypted views must be created on the user databases. Resource Governor must first be enabled. It has come to your attention that transactional replication fails between CERTKILLER-DB01 and several other SQL servers after the policies were implemented. B: You should not create a trace log or a counter log.www. Create a workload group. A workload file can be used by the database engine tuning advisor to determine the usefulness of indexes. You should create a workload group for the resource pool to specify limits and policies.

Answer: D Explanation: When Policy-Based Management is applied on a SQL Server instance. A CertKiller. You should consider disabling the policy that only permits encrypted views on the user databases. You should consider disabling the policy that disables Database Mail on CERTKILLER-DB01. You should consider disabling the policy that indicates that all tables in the user databases must have an index. This table does not have an index. You can replicate both views and stored procedures in transactional replication. D.com store information regarding their clients in SQL Server 2008 databases. the policy that forces every table to have an index will cause a problem with transactional replication. and the log reader agent. subscription database. CertKiller. You have to make sure that the strategy allows custom policies to be distributed to all instances "Pass Any Exam.com has headquarters in London and branch offices in Paris.Microsoft 70-450: Practice Exam What should you do? A. B: Specifying that encrypted views must only be created in a database or specifying a stored procedure must be named a certain way will not conflict with transactional replication. Incorrect Answers: A: Disabling Database Mail will not cause transaction replication to fail. distribution database. Stockholm. Berlin.com.com 178 Ac tua lTe sts . Any Time. You make use of the Policy Based Management feature to design a strategy for the custom policies that are in XML format. You are responsible for administering a SQL Server 2008 infrastructure. and Athens. Transactional replication uses the systtanschemas table. QUESTION NO: 184 You work as a database administrator at CertKiller. Milan. Transactional replication relies on the publication database. Madrid.co m ." .www. B. You should consider disabling the policy that indicates that the stored procedures in user databases must begin with DS_.com security policy states that client information stored across numerous database instances should be security compliant. the policies can affect the functionality of the server. The branch offices of CertKiller. In this scenario.actualtests. C: Specifying that encrypted views must only be created in a database or specifying a stored procedure must be named a certain way will not conflict with transactional replication. No other policies will cause problems with transactional replication. Database Mail is not a part of transactional replication. The policy that forces all tables to have an index will conflict with the systranschemas table and cause transactional replication to fail. Warsaw. C. You can replicate both views and stored procedures in transactional replication.

"Pass Any Exam.actualtests. Your best option would be to create Policy-Based Management policies. CertKiller. Your best option would be to use the varbinary(MAX) data type with FILESTREAM storage of the DDL triggers. Due to the lack of staff you need to accomplish this with the least amount of programming and administrative efforts. Any Time. D. B. You thus decide to implement a way to enforce naming standards. What should you do? A. Answer: B QUESTION NO: 185 Answer: D QUESTION NO: 186 You work as a database administrator at CertKiller.com acquired another company named Courseware Publishers. Your best option would be to make use of multiple downstream servers.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com. tua lTe What should you do? sts You receive an instruction from management to enforce naming standards for the database objects.co m You work as a database administrator at CertKiller. B. C. Your best option would be to make use of IPsec domain isolation. Your duties include administering the SQL Server 2008 infrastructure. Thereafter you should use the configuration server and distribute the policies. Prior to acquiring the company you created a Policy-Based Management policy on CERTKILLERDB01. Your best option would be to execute the DBCC CHECKDB command on the SSMS. Due to company growth CertKiller. D. Your best option would be to make use of cluster quorum drive. You are responsible for administering a database server named CERTKILLER-DB01. You receive an instruction from the CIO to apply the policy to the SQL 2008 servers in the courseware.Microsoft 70-450: Practice Exam and that the policies are implemented on all the instances. Your best option would be to make use of a configuration server. . You need to accomplish this with the minimum of administrative effort.com.com 179 Ac A. Your best option would be to make use of Event Viewer tasks. C." . .www.com domain.

D. This can be accomplished by forcing replication between the domains.actualtests.com domain as well as the courseware. This can be accomplished by evaluating the policy against all the instances of SQL Server in the server group. "Pass Any Exam. This can be accomplished by creating a Central Management Server group that will include the instances of the SQL Servers in the CertKiller. not the Group Policy Management console. Any Time.Microsoft 70-450: Practice Exam What should you do? (Choose all that apply.com currently makes use of Microsoft SQL Server 2008. This can be accomplished by creating a Central Management Server group that will hold the instances of the SQL Servers in the courseware. B.com domain.com domain. G. The Central Management Server group can contain server instances from different domains or workgroups. You decide to create a condition for the Policy-Based Management policy.com domain.) A.com domain. E. QUESTION NO: 187 CertKiller. You receive an instruction from the CIO to create a policy that requires all databases on CERTKILLER-DB01 have the full recovery model and the Trustworthy property set. A Policy-Based Management policy is not active directory based like a group policy object (GPO).www.D.com domain and the CertKiller. CertKiller. C. You are responsible for administering a database server named CERTKILLER-DB01.com domain and CertKiller. You should have servers in both domains in the Central Management Server group. This can be accomplished by exporting the Policy-Based Management policy from CERTKILLER-DB01 to an XML file. Answer: A.com domain and you do not have to force replication between the domains.F Incorrect Answers: B: You should not use the Group Policy Management console to import the policy to the courseware.com domain. F. You should use the SQL Server Management Studio to import the policy.com 180 Ac tua lTe sts .co m . E: You do not have to create a two-way trust between the courseware. This can be accomplished by creating a two-way trust between the courseware. This can be accomplished by importing the policy to the courseware.com domain using the Group Policy Management console." . G: You should not create a Central Management Server group that contains only instances of the SQL servers in the courseware.com has hired you as a database administrator for their network. C: Policy-Based Management policy is not based on active directory thus you do not need a trust between the domains.

You should consider using Database Maintenance facet. B. This facet contains property for the name. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. B. CLR integration.www. ID. What would your reply be? A. QUESTION NO: 188 You work as a database administrator at CertKiller." . B: You should not use the Schema facet. CertKiller. This facet includes the property for the recovery model but does not allow you to set the Trustworthy property on the database. CertKiller. You have decided to have a user named Rory Allen create and test the policy. and owner of the schema. This facet allows you to enable support for the OPENROWSET and OPENDATASOURCE functions. You should consider using Database Options facet. and the xp_cmdshell. "Pass Any Exam. Database Mail or SQL Mail.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Rory Allen should have the dc_admin role in the msdb database. The facet does not contain properties for the recovery model of the database or the Trustworthy property of the database. You should consider using the Surface Area Configuration facet. A. Incorrect Answers: A: You should not use the Surface Area Configuration. During the course of the day you receive instruction from CertKiller.com.com to institute a naming convention which requires all stored procedures in the CK_SALES database to start with the letters KING. Answer: D Explanation: The Database Options facet specifies options that can be set with the sp_dboptions stored procedure as well as by configuring the Trustworthy property on the database and the recovery model of the database. C.actualtests.com wants to know which membership role would be required to create the policy. D.com 181 Ac tua lTe sts .Microsoft 70-450: Practice Exam What should you do? What facet must you use to? . Any Time. The facet does not contain properties for the recovery model of the database or the Trustworthy property of the database. C: You should not use the Database Maintenance facet. Rory Allen should have the dc_admin role in the master database.co m . You should consider using the Schema facet.

CERTKILLER-DB03 and CERTKILLER-DB03 as part of the Central Management Server group.com 182 Ac tua You work as a database administrator at CertKiller. C: You cannot add the user to the PolicyAdministratorRole role in the master database. D.You have added CERTKILLER-DB02. The PolicyAdministratorRole role only exists in the msdb database. where policies are stored. CertKiller." . This role cannot be used to manage policies in Policy-Based Management. What should you do? A. lTe sts QUESTION NO: 189 . Any Time.com additionally wants you to ensure that the policy applies to all SQL Servers. The dc_admin role only exists in the msdb database.www. Rory Allen should have the PolicyAdministratorRole role in the master database. Incorrect Answers: A: You cannot add the user to the dc_admin role in the master database. CertKiller. You later made use of the Policy-Based Management for creating and testing a policy on CERTKILLER-DB01. Members of this role can use. maintain. Rory Allen should have the PolicyAdministratorRole role in the msdb database.com wants you to ensure that the naming convention policy from CERTKILLER-DB01 applies to all the database servers by taking the action below: You have set CERTKILLER-DB01 as the Central Management Server. B: You should not add the user to the dc_admin role in the msdb database. CERTKILLER-DB03 and CERTKILLER-DB04.co m .com currently makes use of Microsoft SQL Server 2008 for hosting databases. "Pass Any Exam.actualtests. You should consider having the policy exported from CERTKILLER-DB01 and use DFS to replicate the policy file to every server in the group.com to enforce a naming convention policy which has all tables beginning with the name CK and all views beginning with the name CKing. as well as perform all configuration and maintenance activities on Policy-Based Management policies and the conditions associated with the polices. CertKiller.Microsoft 70-450: Practice Exam C. and administer the data collector for the SQL Server 2008 server instance. Answer: D Explanation: Members of this role can create and test a policy for Policy-Based Management. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. After testing the policy you decided to have the policy applied to CERTKILLER-DB01 and new servers CERTKILLER-DB02.com. During the course of the day you receive instruction from CertKiller.

You should consider having Rory Allen added to the sysadmin role in the model database. Any Time. Answer: D QUESTION NO: 190 You work as a database administrator at CertKiller. enable. D.co m .www. and disable Policy-Based Management policies on the SQL server. lTe sts . create.Microsoft 70-450: Practice Exam B. enable.com currently makes use of Microsoft SQL Server 2008 for hosting databases.actualtests. CertKiller. You should consider having the Export the policy exported from CERTKILLER-DB01. C.com 183 Ac tua A. You should consider having Rory Allen added to the db_securityadmin role in the master database. The user needs to be a member of the PolicyAdministratorRole to perform this function. or disable Policy-Based Management policies. enable. create. You should consider having the policy exported from CERTKILLER-DB01. You should consider having Rory Allen added to the db_owner role in the master database. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You should then have a GPO created that will apply all the naming convention policy to all the servers in the group. Making a user a member of the db_owner role will not give a user the ability to add. B. This role is a "Pass Any Exam.com hires a new assistant administrator named Rory Allen to assist you. You want to allow Rory Allen to be able to disable any Policy-Based Management policies that he thinks should not be applied. or disable PolicyBased Management policies. You should then select the exported policy and then evaluate the policy against all servers in the group on the server group.com. B: Members of the db_securityadmin role can modify database role memberships and manage permissions." . What should you do? Answer: C Explanation: A member of the PolicyAdministratorRole role can create. D: Members of the sysadmin role have full access to all system and user databases. D. You should consider having the Back up the msdb database from CERTKILLER-DB01 backed up and restore the database on all the other SQL servers. Incorrect Answers: A: The db_owner role specifies the owner of the database. CertKiller. This role does not give a user the ability to add. C. You should consider having Rory Allen added to the PolicyAdministratorRole in the msdb database.

set the expression as @ DatabaseMailEnabled =True. You should consider having a condition created that uses the Surface Area Configuration facet. In the condition. You should consider having the expression as @DatabaseMailEnabled=True set in the condition. You should consider having the expression as @DatabaseMailEnabled=False set in the facet. there is not a sysadmin role in the model database. F.com currently makes use of Microsoft SQL Server 2008 for hosting databases. The following screenshot shows a policy named DBMail using the condition of RestrictDBmail . Incorrect Answers: A: You should not create a facet that uses the Surface Area Configuration condition.F You should use the Surface Area Configuration facet to configure whether database mail is enabled.E. Once the RestrictDBmail condition has been created.com 184 Ac Explanation: You should create and configure the policy in this manner: Create a condition that uses the Surface Area Configuration facet. You create conditions from facets. B. In the "Pass Any Exam.Microsoft 70-450: Practice Exam server role and not a database role. This role is only on the server.com. E.co m . During the course of the day you receive instruction from CertKiller. You should consider having a policy named DBMail created to include the RestrictDBmail facet.actualtests. tua lTe sts . Answer: D. You should consider having a facet created that uses the Surface Area Configuration condition. B: You should not set the expression as @DatabaseMailEnabled=False in the facet. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. Any Time. You do not create a facet from a condition. Also. C." . CertKiller. the condition is called RestrictDBmail . you can create a policy to use the condition. What should you do? (Choose all that apply) A.com to have a policy to prohibit the enabling of Database Mail on CERTKILLER-DB01. There is no server restriction set on the policy. You should specify the condition to use the Surface Area Configuration facet.www. D. In the following example. Create a policy named DBMail to include the RestrictDBmail condition. QUESTION NO: 191 You work as a database administrator at CertKiller. In this scenario. You should consider having a policy named DBMail created to include the RestrictDBmail condition. the RestrictDBmail condition uses the Surface Area Configuration facet and forces Database Mail to be disabled on a server.

You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_DATA. "Pass Any Exam.com 185 Ac A. Policies do not include facets. tua lTe sts . You should consider making use of the Now execution mode.co m . You have created the policy named CK_DATA names which included both of the conditions. B. and conditions are derived from facets. CertKiller. What should you do? Answer: B Explanation: You can specify the execution mode of a policy as follows: On Demand: When you choose this execution mode. During the course of the day you receive instruction from CertKiller. you should pick the DatabaseMailEnabled property of the Surface Area Condition facet. D.com wants you to decide which execution mode should be set.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You should consider making use of the On Demand execution mode.actualtests. C: You should not create a policy named DBMail to include the RestrictDBmail facet. all other policy execution modes are automated. On Schedule: Choosing this execution mode allows you to define a schedule when the policy will be evaluated automatically. Policies include conditions. You should consider making use of the On Change -Prevent execution mode. CertKiller." .com to create a policy that will require all tables in the CK_DATA database to use the prefix CK_. You should consider making use of the On Schedule execution mode. This mode is an automated mode and logs any violations of the policy in the Windows Event log. Any Time.You additionally decided to create a condition called CK_DATA Database which includes the facet of Database with the expression of @Name='CK_DATA'. C. the policy will be evaluated when the user manually runs the policy. Except for this policy execution mode. QUESTION NO: 192 You work as a database administrator at CertKiller. The automatic evaluation of the policy is carried out by a SQL Server Agent job. You should set the expression as @DatabaseMailEnabled=False in the condition. You decide to complete the tasks listed below: You have decided to create a condition called CK_Table which includes the facet of Multipart Name with the expression of @Name like 'CK_'. You should not do this in the facet.www. The policy must be implemented and should take effect immediately. In this scenario.Microsoft 70-450: Practice Exam condition. you should pick the property of the facet and set the expression.com.

SqlServer. Your job function includes administering a SQL Server 2008 instance. You deploy a new database named CK_RESEARCH that will be used to administer large documents. Answer: B.Management. These documents will be revised from time to time.ConflictingPropertyValuesException' was thrown.com 186 Ac What should you do? (Choose all that apply. B.C QUESTION NO: 194 CertKiller. you wanted the policy to be applied immediately and not on a schedule. It is important that you reduce the storage space requirement. C. This can be accomplished by utilizing the NTFS file system compression on the volume. This mode is also an automated mode. This can be accomplished by utilizing the varbinary(MAX) data type with FILESTREAM storage.Microsoft 70-450: Practice Exam On Change -Log Only: With this mode.com has employed you as a database administrator. This mode also prevents policy violations by using DDL triggers. D: The On Schedule evaluation mode requires that a schedule should be defined. the evaluation mode of On Change -Prevent will create a database trigger on the CK_DATA database to prevent a table from being named anything that does not begin with 'CK_'. In this scenario. This can be accomplished by utilizing caching on the shared folder. On Change -Prevent: With this mode. A. the policy is evaluated only when a relevant change occurs. Execution Mode 'On Demand' does not support Enabled 'True'".) tua lTe sts ." . This mode is also automated and logs any violations of the policy. D. "Pass Any Exam. Incorrect Answers: A: You cannot specify the evaluation mode Now.com are the administrating a SQL Server 2008 infrastructure. This can be accomplished by utilizing the resource-allocation policy for process-based management.co m . Part 4: Design a data compression (6 Questions) QUESTION NO: 193 You are the newly appointed database administrator at CertKiller. This is not a valid evaluation mode.www. In this scenario. You receive an instruction from the CIO to implement a table structure that will enable fast read access. Your duties at CertKiller.com. Any Time. C: The On Demand evaluation mode will result in an error stating "Exception of type'Microsoft.actualtests.Dmf. the policy is evaluated when a relevant change occurs in the associated target entity.

actualtests. sts .E QUESTION NO: 196 "Pass Any Exam.The third partition is often queried by several reports. Management wants you to decrease the space taken by CK_SALES.com users retrieve the data in the column. Microsoft Office Word 2003 documents is stored in CK_SALES. C." . C. The database in turn includes a table named KINGDATA which has a column named CK_SALES. Your best option would be to enable individual node.The fourth partition is heavily queried and repeatedly modified lTe CertKiller.) A. This can be accomplished by ensuring that CK_SALES is stored using filestream storage. Any Time. You have to make sure that this action does not have a great impact on the query performance. E. This can be accomplished using the Job Activity Monitor tool for KINGDATA. tua You partition this table into four equal parts. Your best option would be to use the Windows System Monitoring tool. Your duties include administrating the SQL Server 2008 infrastructure. Your best option would be for the third partition to enable ROW compression.The second partition is hardly ever queried. average performance is needed sot be kept when the CertKiller. You are in the process of partitioning the biggest table in a database. D. What should you do? A. D.co m .www. Your best option would be to use the Database Engine Tuning Advisor tool. Your best option would be for the first two partitions to enable PAGE compression. This can be accomplished by using folder redirection. Answer: D. B. Answer: B QUESTION NO: 195 What should you do? (Choose all that apply. B.com 187 Ac You have received instruction from the CIO to minimize the disk space of the table. During routine monitoring you discover that:The first partition is hardly ever queried.Microsoft 70-450: Practice Exam An instance on the infrastructure contains a database. However. This can be accomplished by using the vardecimal() data type.com has hired you as a database administrator for their network. Thereafter the NTFS file system compression should be used.

D During routine monitoring you detect the subsequent performance errors on CK_SALES:Performance of the application queries is poor against Stock.Maintenance tasks against the database take a very long. What should you do? A.www. CertKiller. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.com.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller. Your best option would be to use the sys.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You should consider making use of row-level compression on all columns that use the vardecimal() data type.Index defragmentation takes very long. B. sts QUESTION NO: 197 . C. lTe You work as a database administrator at CertKiller.com Ac tua You are assigned a database server named CERTKILLER-DB06 with an instance that hosts a database named CK_SALES.com.dm_exec_requests dynamic management view another table older than two months and shift the information.com wants you to design a table structure allowing for fast read access whilst minimizing the storage requirements." .dm_exec_sessions dynamic management view. Any Time.actualtests. You receive an instruction from the CIO to ensure performance without affecting the performance of CERTKILLER-DB06. Administrative audits on data older than two months are conducted on a monthly basis. Your duties include administrating the SQL Server 2008 infrastructure of the organization. D. At present DML statements on the last two months data is executed by the application queries. You should consider making use of row-level compression on the document table. You should consider making use of the NTFS file system compression on the volume. What should you do? (Choose two) A. You should consider making use of the varbinary(MAX) data type with FILESTREAM storage. B. Thereafter another table named StockHistory should be created for data older than two months. During the course of the day you receive instruction from CertKiller. "Pass Any Exam. Your best option would be to use the sys. Answer: B.co m 188 . CK_SALES includes a table named Stock.com to deploy a new database named CK_PRODUCTS which will occasionally require having large documents revised. CertKiller.

" . C.sp_estimate_data_compression_savings.com 189 Ac A. Your best option would be to create another table named StockHistory for information that is older than two months.sp_clean_db_free_space. Your best option would be to use the sys. Page compression looks at redundant data in one or many rows on a given page.sp_clean_db_file_free_space. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. Page compression occurs when the page is full.. During the course of the day you receive instruction from CertKiller..co m . You should also use the OrderDate column and partitioned Stock and StockHistory in two parts.Microsoft 70-450: Practice Exam C.actualtests.SWITCH Transact-SQL statement to shift the information older than two months to the StockHistory.sp_autostats.www. tua lTe sts . Row compression does not take any disk space for zero or null values.dm_exec_query_stats dynamic management view to shift the information older than two months to the StockHistory. Thereafter a SQL Server Agent job should be created that runs monthly and uses the ALTER TABLE. You should consider making use of the stored procedure: sys. CertKiller.sp_clean_db_free_space.com. You should consider making use of the stored procedure: sys. D. This stored procedure removes residual information left on database pages on a database when a data modification has been completed. Answer: D QUESTION NO: 198 You work as a database administrator at CertKiller. You should consider making use of the stored procedure: sys. It takes into account variable data type structures in a row.com currently makes use of Microsoft SQL Server 2008 for hosting databases. What should you do? Answer: A Explanation: This stored procedure can determine which level of compression will give you the most space before actually implementing compression. Incorrect Answers: B: You should not use sys. "Pass Any Exam. You can also use the Data Compression Wizard in the SQL Server Management studio. Any Time. D. You should consider making use of the stored procedure: sys. B.com to implement either row compression or page compression depending which method yields the most free space recovered.

com users should be added to the MSDB database.com. You receive numerous complaints from CertKiller. D.sp_autostats.co m . This can be achieved by using varbinary(MAX) data type in the MSDB database." . Your duties at CertKiller. Thereafter the CertKiller. not just a particular database file. B. C. The database application will hold the stored procedures required to perform stored procedures in the MSDB database. Your duties include administrating a SQL Server 2008 instance named CERTKILLER-DB01. CERTKILLER-DB01 will be used to host the new database application.com 190 Ac tua lTe sts SQL Agent jobs will be scheduled by the stored procedures in the MSDB database. D: You should not use sys. Any Time.actualtests. Answer: A QUESTION NO: 200 You work as a database administrator at CertKiller.sp_clean_db_file_free_space.Microsoft 70-450: Practice Exam This stored procedure is similar to sys. This can be achieved by setting the appropriate trace flags as a startup parameter in the MSDB database.com. You have to make sure that the stored procedures is performed using the security context of the application user. What should you do? A.com include administering a SQL Server 2880 instance. You check whether there are any long running "Pass Any Exam. This stored procedure displays or changes the UPDATE STATISTICS setting for an index or all indexes on a table. Part 5: Design a management automation strategy (4 Questions) QUESTION NO: 199 You work as a database administrator at CertKiller. C: You should not use sys. This stored procedure removes residual information left on database pages on a database file when a data modification has been completed.www.com users all have their own unique login to CERTKILLER-DB01. . You are in the process of implementing the security applications for the new database application.sp_clean_db_file_free_space.com users regarding server's slow performance after a process was implemented on the instance. but it removes residual information left on database pages for the entire database. The CertKiller. This can be achieved by configuring the resource database and add the users to the MSDB database. This can be achieved by using the TRUSTWORTHY option on the new database.

Any Time. You should consider using the Execute Package Utility in order to run the package. you can run the package using either the dtexec utility or the SQL Server Agent. but you must install Integration Services to have a 64-bit version of the dtexec utility. This utility can run packages only in 32-bit mode. Incorrect Answers: B: You do not have to upgrade the package to 64-bit and run it using the Execute Package Utility. Your best option would be to make use the VIEWDELETE log. C: You do not have to run the package using the SQL Server Agent only. B. You need to do this with the least amount of administrative effort.com. Your best option would be to make use of the ServerManagerCMD utility. Your best option would be to make use of SQL Server Profiler as well as System Monitor. C. What should you do? A.exe).Microsoft 70-450: Practice Exam queries. To achieve this you make use of the Execute Package Utility (dtexecui." . You do this using the Dynamic Management Views to confirm that no long queries are running.actualtests. Your best option would be to make use of the Transaction Logs.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Answer: B QUESTION NO: 201 You work as a database administrator at CertKiller. CertKiller.com 191 Ac tua lTe sts . The SQL Server Agent is available in 64-bit editions of SQL Server 2008. You should consider using the SQL Server Agent in order to run the package. C. Answer: A Explanation: To execute the package on a 64-bit version of SQL Server 2008. What should you do? A. On a 64-bit version of SQL Server 2008. you can use either the dtexec utility or the SQL Server Agent.www. You decide to compare the performance data of the OS with the query execution trace. You should consider using the dtexec utility or the SQL Server Agent in order to run the package. You should consider upgrading the package to 64-bit thereafter you can run it using the Execute Package Utility. B. You need to use the same package on a 64-bit edition of SQL Server 2008.co m . You are responsible for managing a 32-bit edition of SQL Server 2008 You are in the process of executing a 32-bit package. D. You can also use the "Pass Any Exam. D.

What should you do? A CertKiller. However. What should you do? A.www. Your best option would be to use the Hyper-V feature on the server and install the project.com currently makes use of Microsoft SQL Server 2008 for hosting databases. .actualtests. You should consider making use of Event Nitifications. The SQL Server 2008 Integration Services (SSIS) packages are in a shared project.sp_cdc_enable_db stored procedure. You need to make sure that Rory Allen is able to install the project to the production server. D.com currently makes use of Microsoft SQL Server 2008 for hosting databases. Any Time. Your best option would be to use the Windows Deployment Services (WDS) for all packages." . The packages will be deployed to the production server as soon as the development is completed. Your best option would be to use the Microsoft Multipath I/O to save the packages. B. you need to use a fixed cache file on one of the packages. You should consider making use of DML triggers. Rory Allen creates the SQL Server 2008 Integration Services (SSIS) packages on the test server residing in the Test Lab.com. "Pass Any Exam.com. You are responsible for administering a SQL Server 2008 instance.com employee named Rory Allen works as an application developer. tua QUESTION NO: 203 lTe Answer: D sts A. QUESTION NO: 202 You work as a database administrator at CertKiller. C. CertKiller.com to have the network user Rory Allen e-mailed when another user has created or deleted a view in the CK_SALES database whilst ensuring the mechanism is processed in the local server and can be rolled back. CertKiller. C. During the course of the day you receive instruction from CertKiller. You should consider making use of sys.exe). This utility can run packages only in 32-bit mode. D: You cannot run this package in 64-bit mode using the Execute Package Utility (dtexecui.Microsoft 70-450: Practice Exam dtexec utility to run this package. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.co m .com 192 Ac You are the newly appointed database administrator at CertKiller. B. You should consider making use of DDL triggers.

Your best option would be to ensure that an installation utility is set up for the SSIS project. You should consider making use of the 32-bit Execution Package Utility.com 193 Ac tua lTe sts .C Explanation: To meet the required goal in the scenario. You should consider making use of the 32-bit runtime on the Execution options tab of the New Job Setup dialog box. During the course of the day you receive instruction from CertKiller. This utility would not be available on CERTKILLER-DB01 because it is running the SQL Server 2008 64-bit edition. CertKiller. You also can use 32-bit version of the dtexec utility installed on CERTKILLER-DB01.com. You should consider making use of the 32-bit version of the dtexec utility on CERTKILLERDB01. D. For 32-bit packages. CertKiller. You could use the 32-bit Execute Package Utility from a SQL Server instance that is using the 32-bit edition of SQL Server 2008. you can select Use 32 bit runtime on the Execution options tab of the New Job Step dialog box. What should you do? (Choose two) A.Microsoft 70-450: Practice Exam D. you will not be able to run the 32-bit package on a 64-bit edition of SQL Server 2008. You should consider having the package converted to 64-bit.co m . Any Time. QUESTION NO: 205 "Pass Any Exam.com currently makes use of Microsoft SQL Server 2008 for hosting databases. D: You cannot select the 32-bit Execute Package Utility because it is available only in the 32-bit version of SQL Server 2008.com to automate the execution of an SQL Server Integration Services (SSIS) package by making use of SQL Server Agent. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. Without enabling this option. On a 64-bit version of SQL Server 2008. Answer: D QUESTION NO: 204 You work as a database administrator at CertKiller. B. C. Incorrect Answers: B: You do not have to convert the package to a 64-bit version. you will need to install it using Client Tools or Business Intelligence Development Studio when you are setting up SQL Server.www." . you can simply run the package in 32-bit mode by selecting the Use 32 bit runtime option on the Execution options tab of the New Job Step dialog box. Answer: A.actualtests.com wants you to run the package in 32-bit mode.

Order table as well as the Sales. C: The OnPreExecute event handler is an incorrect option.OrderHistory table. An event handler is comprised of tasks and containers that form a sequence of execution.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com is using a linked server to update Exams. Any Time. You should consider making use of the OnError event handler. the OnError event handler will be triggered. C. B. Your duties include administering the SQL Server 2008 infrastructure as well as two instances named CK_PRODUCT and CK_FINANCE. This event handler is meant only to report information regarding the validation and execution.dbo.com to deploy a new SQL Server Integration Services (SSIS) package which should make use of an event handler when the package fails to execute. such as OnError event handler for failure of execution of a package. "Pass Any Exam.co m . You should consider making use of the OnPreExecute event handler. D.com has hired you as a database administrator for their network.actualtests. CertKiller. You can execute OnError to detail the problems related to the package execution." . D: The OnTaskFailed event handler is an incorrect option.com.com 194 Ac tua lTe sts . This type of event handler is executed in the validation and execution stages of the package.www. You should consider making use of the Onlnformation event handler. A procedure in the Exams database starts a transaction. You can use the OnError event handler for logging the error condition that caused the package execution to fail.dbo. What should you do? A. This type of event handler is executed before the package is executed. During the course of the day you receive instruction from CertKiller. If a specific event handler is defined for an event. This type of event handler is executed when a task is failed. CertKiller. You should consider making use of the OnTaskFailed event handler. a series of tasks are performed. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES.Microsoft 70-450: Practice Exam You work as a database administrator at CertKiller. Part 2: Design a strategy to use linked servers (3 Questions) QUESTION NO: 206 CertKiller. CK_PRODUCT contains the Exams database and CK_FINANCE the Sales database. Answer: A Explanation: When you attempt to execute a package and an error occurs. You receive an instruction from the CIO to make sure that a two-phase commit in used in the transaction. Incorrect Answers: B: The Onlnformation event handler is an incorrect option.

You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. These steps are as follows: In the initial stage. which can be either a commit transaction or a rollback transaction. CERTKILLER-DB01 Answer: E Explanation: In a distributed transaction scenario.com 195 Ac tua lTe sts . CertKiller.actualtests. The server issuing the begin distributed transaction statement is always in command of the entire transaction. B. CERTKILLER-DB05 D. CertKiller. This can be achieved by using the VPN solution.com is aware that the stored procedure on CERTKILLER-DB02 triggers a distributed query for CERTKILLER-DB04 and the stored procedure on CERTKILLER-SR03 triggers a distributed query on CERTKILLER-DB05. This can be achieved by using the Windows System Resource Manager (WSRM) for delegation.Microsoft 70-450: Practice Exam What should you do? A." . CERTKILLER-DB03 C. This can be achieved by having a linked server configured in order to make use of distributed transactions. CERTKILLER-DB02 E. C.com wants to know which server is acting as the transaction originator in this scenario? A. During the course of the day you issue a begin distributed transaction statement on CERTKILLER-DB01. a Transact-SQL script or an application connect uses a statement. CERTKILLER-DB04 B. CertKiller.com.co m .com currently makes use of Microsoft SQL Server 2008 for hosting databases. The session which is initiated connects with stored procedures located on CERTKILLER-DB02 and CERTKILLER-DB03. the transaction originator uses Microsoft Distributed Transaction Coordinator (MS DTC) to complete the transaction on all the servers that are involved in the transaction. Answer: B QUESTION NO: 207 You work as a database administrator at CertKiller. Any Time.www. A series of steps are performed in the distributed transaction process. which is a "Pass Any Exam. any server that executes the query containing the begin distributed transaction statement will be the transaction originator. This can be achieved by using the Delegation of Control Wizard to enable the correct transaction control. Upon the completion of the transaction. D.

actualtests. sts .com.com currently makes use of Microsoft SQL Server 2008 for hosting databases.co m 196 . in which either distributed queries or the remote stored procedures are executed. MS DTC is called by the controlling server. The controlling server calls MS DTC.com Ac tua lTe You work as a database administrator at CertKiller. In this step. the server that is executing the statements is considered the controlling server in the distributed transaction. Any Time. In this step. QUESTION NO: 208 CORRECT TEXT What should you do? (Click and drag the required steps from the left column in the correct order on the column to the left) "Pass Any Exam. Depending on distributed queries and remote procedures execution. MS DTC is used to complete the two-phase commit process or rollback transactions. In this step. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. CertKiller. The distributed query is executed against linked server.www. The controlling instance uses MS DTC to perform a two-phase commit. CertKiller. The SQL Server Database Engine that executes the statement becomes the controlling server or the transaction originator. This is the third step." . Distributed queries are executed against the linked servers and remote procedures are executed against the remote servers. This is the second step of the distributed transaction. a commit or rollback statement is issued using the script.com additionally requested that you initiate distributed transactions making use of the linked servers. to initiate a distributed transaction.Microsoft 70-450: Practice Exam Transact-SQL statement. During the course of the day you receive instruction from CertKiller. the remote and linked servers are listed.com to setup multiple linked SQL Servers.

" .actualtests. sts . Thereafter the partitions should be changed into CK_SALES.The Telemarketing team must not be able to update confidential information. This can be accomplished by create an ADMX file that should be used in CK_SALES and the publication reinitialized. The Tele-marketing team makes use of notebook computers to update customer orders in a local database. You receive an instruction from the CIO to implement a replication strategy in order to reduce latency. C. CertKiller.com. This can be accomplished by using the BULK INSERT command in multiple staging tables. CERTKILLER-DB01 is in a peer-to-peer transactional replication topology with three other servers. You are responsible for administering a SQL Server 2008 database server named CERTKILLER-DB01.co m . You need to make sure that the replication model has the following criteria:The Tele-marketing team must be able to synchronize data at scheduled times as well as on demand.com 197 Ac tua lTe A.Microsoft 70-450: Practice Exam Answer: QUESTION NO: 209 CertKiller. You need to make sure that the local database is able to synchronize with CK_MARKETING when the notebook computers connect to the London office. This can be accomplished by configuring the File Server Resource Manager (FSRM). This can be accomplished by configuring the resource-allocation policy for process-based management. In turn CK_SALES encompasses of 200 GB of information across several partitions. What should you do? Answer: A QUESTION NO: 210 You work as a database administrator at CertKiller.The model must be able to "Pass Any Exam. Any Time. You decide to set up the creation of a replication model that will be used to copy the local database to CK_MARKETING. B. You are responsible for administering the SQL Server 2008 infrastructure.www. You are located at the London office and are assigned a SQL Server 2008 instance named CK_MARKETING. The publication contains a table named CK_SALES. From time to time a batch process bulk loads 10 GB of information to CK_SALES.com has its headquarters in London and branch offices in Paris and Athens.com has employed you as a database administrator. D.

You thus need to use the best type to replicate the information. In data filtering. You should consider using folder redirection with the notebook computers. You are responsible for administering multiple SQL Server 2008 servers that hosts a multiple databases. B. sts You work as a database administrator at CertKiller.www. You should consider setting up the notebook computers as a subscriber and use merge replication.actualtests. You should consider using the LUN Management settings with the SSIS packages. D." . C. You should consider using Transactional replication. You should consider using Merge replication. B. You should consider using Peer-to-peer replication.Microsoft 70-450: Practice Exam handle data conflicts when quite a few users update the same data. You should consider setting up caching on the shared folder.Replicate a certain set of information to one subscriber as well as another set to another subscriber. you can filter different updates to different subscribers at "Pass Any Exam.com 198 Ac tua lTe You receive the subsequent instructions from the CIO to:Configure replication whereby you are able to send different updates to different subscribers at different locations. What should you do? A. merge replication would be able to meet the required goal. What should you do? A. You use merge replication typically when you need to meet the following requirements: Allow subscribers to modify information in an offline state and then replicate it back to the publisher.com. Provide data filtering. C. .Ensure that subscribers are able to work offline and later synchronize the modifications with the publisher. Any Time. You should consider using Snapshot replication. Answer: D Explanation: In this scenario.co QUESTION NO: 211 m . D. Answer: B You thus need to determine the appropriate replication type that will meet the requirements. This needs to be accomplished with the least amount of development efforts. A subscriber can also replicate information to other subscribers. These databases contain the networks critical information.

QUESTION NO: 212 CertKiller. All the servers in the environment are configured to run Microsoft SQL Server 2008. You need to make sure that the data replication offers the network high availability and scalability with the minimum of latency. This replication also does not have the flexibility to filter data during replication. Provide the ability to resolve conflicts that occur during replication. You should make use of Peer-to-peer transactional replication. Berlin and Milan. This replication also does not have the flexibility to filter data during replication. every change will be replicated to its partner. This type of replication is typically used when you need high availability and scalability. This replication also does not have the flexibility to filter data during replication.com has its headquarters in Paris and branch offices in London. What should you do? A.com Ac tua lTe sts .com has hired you as a database administrator for their network.actualtests. You have received instruction from the CIO to configure data replication.co m 199 . You should thus determine the type of transactional replication that will accomplish this. This type of replication does not have the ability to allow subscribers to work offline and then replicate changes when they are back online. For instance. Any Time. the data is replicated immediately to its partners. This type of replication is used when you need to replicate a large volume of information. This type of replication does not have the ability to allow subscribers to work offline and then replicate changes when they are back online. D. You should make use of Merge transactional replication. C. This type of replication does not have the ability to allow subscribers to work offline and then replicate changes when they are back online. B: You should not use snapshot replication." . You should make use of Snapshot transactional replication. if there is a row value that changes multiple times.Microsoft 70-450: Practice Exam different locations. B. Incorrect Answers: A: You should not use transactional replication. Allow information to be replicated to users who are mobile and are not always connected to the SQL Server.www. Answer: A "Pass Any Exam. there are typically fewer subscribers keeping the read-only copy of replicated data. You would typically use this type of replication to propagate incremental changes to from one server to another server immediately. You should make use of Standard transactional publication transactional replication. As soon as a change occurs in a database. CertKiller. In this type of replication. C: You should not use peer-to-peer replication.

which will not provide high availability and scalability because the changes are replicated rarely.www. In this type of replication.Microsoft 70-450: Practice Exam Explanation: This type of replication is based on transaction publication. Merge replication is not a type of transactional replication. You are responsible for administering numerous Microsoft SQL Server 2008 servers that hosts multiple databases. C: You should not use merge replication in this scenario. This type of replication is used when you need to replicate large volume of information. If a node failure occurs." . as the Subscribers keep read-only data. Peer-to-peer replication provides redundancy because data is maintained across multiple nodes. and typically is used when you need high availability and scalability. The replication solution should be configured so that the slightest change will trigger instant replication to the replicated copy. you should not use this replication in this scenario.co m . and the replicated data may be outdated. data is replicated more frequently to the Subscriber and therefore requires high latency. You have received instruction from the CIO to configure a replication solution for these servers in order to replicate database information to each other. Incorrect Answers: B: You should not use standard transactional publication. Peer. You can also use this replication when there is a requirement of data filtering. Snapshot replication is very infrequent. this type of replication will not be useful.actualtests. This type of replication is not used for high availability and scalability. Any Time. You typically require minimal latency for peer-to-peer replication. QUESTION NO: 213 You work as a database administrator at CertKiller. this replication will not be suitable in this scenario. The databases hold the companies critical information. In merge replication. You use merge replication typically when you need information to be replicated to users who are mobile and are not always connected to the SQL Server. What should you do? Which replication strategy should you use in this situation? A. Therefore. Merge replication has the ability to resolve conflicts that may occur during the replication. Therefore.com. fewer Subscribers keep the read-only copy of the replicated data. you can filter different updates to different Subscribers at different locations. This type of replication will not be useful in this scenario because you need high availability and scalability with minimal latency. Queries and other reads from Web applications can be spread across the multiple nodes. Snapshot replication is not a type of transactional replication. You should consider using Peer-to-Peer Replication. in this scenario. "Pass Any Exam.topeer replication does not have the ability to resolve conflicts during replication updates. D: You should not use snapshot replication.com 200 Ac tua lTe sts . Therefore. the request is redirected by the application layer to another node. but it can detect replication conflicts. In data filtering.

For instance. B: You should not use merge replication. Merge replication has the ability to resolve conflicts that may occur during the replication.actualtests. This type of replication does not have the ability to replicate all updates to its partners. only the tenth value will be replicated. You should also use this replication when you need the ability to resolve conflicts that occur during replication.com currently makes use of Microsoft SQL Server 2008 for hosting databases.com implemented an additional server named CERTKILLER-DB02 in a peer-to-peer transactional replication topology. QUESTION NO: 214 You work as a database administrator at CertKiller. For instance. subscribers make changes to the data and later synchronize the changes with the publisher. This type of replication is used when you need to replicate a large volume of information. In this type of replication.com additionally wants you to add a new node to the peer-to-peer transactional replication whilst ensuring all relevant transactions are replicated to the new node. You should consider using Snapshot Replication.com Ac tua lTe sts . if there are ten value changes to a field in a row at the subscriber before synchronizing with the publisher. You should consider using Transactional Replication. You use merge replication typically when you need information to be replicated to users who are mobile and are not always connected to the SQL Server. As soon as a change occurs in a database. CertKiller. This type of replication does not have the ability to resolve conflicts during replication updates. In this type of replication. C. This type of replication does not have the ability to replicate all updates to its partners. not all ten values. C: You should not use snapshot replication. only the last updated value will be replicated to the partners.co m 201 . What should you do? "Pass Any Exam.www. every change will be replicated to its partner. Answer: D Explanation: You would typically use this type of replication when you need to propagate incremental changes to from one server to another server immediately. Incorrect Answers: A: You should not use peer-to-peer replication. Any Time.com. the data is replicated to its partners. This type of replication is typically used when you need high availability and scalability. if there is a row value that changes multiple times. CertKiller. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. During the course of the day CertKiller.Microsoft 70-450: Practice Exam B. You should consider using Merge Replication. there are typically fewer subscribers keeping the read-only copy of replicated data. D. In merge replication." .

C. tua What should you do? lTe You work as a database administrator at CertKiller. CertKiller. You should consider making use of transactional replication.com wants to have the information replicated so the smallest change will trigger immediate replication to the replicated copy. Answer: D Answer: D QUESTION NO: 216 You work as a database administrator at CertKiller. sts . B. D.co QUESTION NO: 215 m ." . You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: replication support only.actualtests. CERTKILLER-DB03 and CERTKILLER-DB04.com recently deployed an additional three servers to the network named CERTKILLER-DB02. During the course of the day you receive instruction from CertKiller.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You should consider making use of merge replication. CertKiller. "Pass Any Exam.Microsoft 70-450: Practice Exam A. CertKiller.com 202 Ac A. C. CertKiller. You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: initialize from Isn.com currently makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a database server named CERTKILLER-DB01 with an instance that hosts a database named CK_SALES. You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: initialize with backup. You should consider configuring the value below for the @sync_type parameter of the sp_addsubscription stored procedure: automatic. D. You should consider making use of snapshot replication. You are responsible for administering multiple database servers hosting multiple databases containing company sensitive data.www.com. Any Time. B.com. CertKiller.com to configure a replication solution for the databases to replicate with each other. You should consider making use of peer-to-peer replication.com wants you to configure peer-to-peer replication between the servers whilst having conflict detection enabled on the servers.

data changes at different nodes could conflict with each other. and detection must be enabled for all nodes. You can also enable and disable conflict detection by using the sp_addpublication or sp_configure_peerconflictdetection stored procedures. This option helps you prevent the issues that are caused by undetected conflicts.Microsoft 70-450: Practice Exam What should you do? A. Answer: B. a conflicting change is considered a critical error that causes the Distribution Agent to fail.actualtests. When you enable conflict detection. In the event of a conflict. B. You should make use of the sp_addsubscriber stored procedure. D.com Ac tua lTe sts . Incorrect Answer: A: The sp_help_peerconflictdetection stored procedure returns information about the conflict detection settings for a publication that is involved in a peer-to-peer transactional replication topology. You should make use of the sp_configure_peerconflictdetection stored procedure. You can enable and disable detection in Management Studio either by using the Subscription Options page of the Publication Properties dialog box or the Configure Topology page of the Configure Peer-to-Peer Topology Wizard. all nodes must be running SQL Server 2008 or a later version. update. You should make use of the sp_help_peerconflictdetection stored procedure.D Explanation: Peer-to-peer transactional replication allows you insert. You should make use of the sp_addpublication stored procedure. or delete data at any node in a topology and have data changes propagated to the other nodes. Any Time.co m 203 . C: You cannot use the sp_addsubscriber stored procedure or the sp_help_peerconflictdetection stored procedure because these stored procedures cannot be used to enable conflict detection. Because you can change data at any node. To use conflict detection. the topology remains in an inconsistent state until the conflict is resolved and the data is made consistent across the topology. peer-to-peer replication introduces the option to enable conflict detection across a peer-to-peer topology." . In SQL Server 2008. "Pass Any Exam. The sp_addsubscriber stored procedure is used to add a new subscriber to a publisher.www. C. enabling it to receive publications.

Sign up to vote on this title
UsefulNot useful