单项选择题

You administer a SQL Server 2008 instance. The instance runs on a computer that has the following features: A 64-GB RAM  Four quad-core processors  Several independent physical raid volumes  You plan to implement a transactional database on the instance. The database is expected to have a high volume of INSERT, UPDATE, and DELETE activities. The activities include creation of new tables. You need to optimize the performance of the database by maximizing disk bandwidth and reducing the contention in the storage allocation structures.
What should you do?()

A.Create multiple data files for the database.
B.Place database and log files on the same volume.
C.Configure the affinity mask option appropriately.
D.Configure the affinity I/O mask option appropriately.


您可能感兴趣的试卷

你可能感兴趣的试题

最新试题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed by you. The computer on which the instance run has the following three features: a 64-GB RAM, four quad-core processors, and several independent physical raid volumes. A transactional database will be implemented on the instance. In addition, the database should have a high volume of INSERT, UPDATE, and DELETE activities. Creation of new tables is contained by the activities. You need to maximize disk bandwidth and decrease the contention in the storage allocation structures so as to have the performance of the database optimized.   Which action will you perform to finish the task?()

题型:单项选择题

You administer a SQL Server 2008 instance. You plan to design the security requirements for a new database application that will be deployed to the instance.  The new database contains a table that is created by using the following code segment: You need to ensure that the BonusPlan column is protected from unauthorized access by using the most secure method.What should you do?()

题型:单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application, and the application will be deployed to the instance. A table is consisted by the new database, and the table is created by utilizing the following code segment:  Since you are the technical support, you should utilize the maximum secure method to protect the BonusPlan column from the access of unauthorized users.  Which action will you perform to finish the task?()

题型:单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 servers on a single site are managed by you. Two SQL Server 2008 instances are contained by the site. One is an Enterprise Edition server, and it is on a server that has a redundant array of ndependent disks (RAID) 10 disk system. The other is a Standard Edition server, and it is on a server that has a RAID 5 disk system. A single application is hosted by each instance. A high-availability solution should be recommended for the site to satisfy the business requirements listed below. First, the solution can be implemented on the current systems. Secondly, the database is available with least downtime. Thirdly, Data loss should be cut to the least. Fourthly, the existing system should be with least impact.   Which solutions should be utilized to finish the task?()

题型:多项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security,troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A database is included by the instance, and a table named EmployeeData is contained by the database. There is a column named Profile in the EmployeeData table. Microsoft Office Word 2003 documents are stored in the column. The space utilized by the Profile column should be cut to the least. In addition, a reasonable performance should be maintained to retrieve the content of the column.Which action will you perform?()

题型:单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed. It is reported by the customers that the server performance degraded due to a newly implemented process. Dynamic Management Views is utilized to confirm that no long running queries exist. The operating system performance data should be correlated with the actual query execution trace, and the least administrative effort should be utilized. Which action will you perform to finish the task?()

题型:单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A corporate backup and recovery strategy that has to be validated is designed. You are required to make sure that any single database can be restored successfully from a severe failure, and during the restoration, a backup data center should not be required in a different location.Which three actions should be contained by your solution?()

题型:多项选择题

You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol.What should you do?()

题型:单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 instances at five sites are managed by you.A mission-critical database is shared by the five sites. According to the business requirements, the users at each site should be enabled to access and change data on all sites with minimal latency.In addition, data loss should be minimized if a server fails. A high-availability solution should be designed, and the business requirements should be satisfied.   Which action should be included in your solution?()

题型:单项选择题

You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time.Which encryption type should you use?()

题型:单项选择题