单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A new database should be deployed, and the capacity requirements listed below should be satisfied. There should be 275 GB for the database data file, while there should be 50 GB for the transaction log file. There are six 100-GB disk drives which are accessible for the database in the storage array. The six disks are attached to a redundant array of independent disks (RAID) controller, and the controller supports RAID levels 0, 1, 5, and 10. Since you are the technical support, you are required to maximize the write performance of the transaction log. In addition, you should protect the database and transaction log files, when a drive fails. The storage system should be designed.  
From the following four storage configuration, which one should you utilize?()

A.A single RAID 5 volume should be utilized. 
B.A RAID 1 volume and a RAID 5 volume should be utilized.
C.A single RAID 10 volume should be utilized. 
D.A RAID 0 volume and a RAID 5 volume should be utilized.


您可能感兴趣的试卷

你可能感兴趣的试题

3.单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international 
corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application, and the application will be deployed to the instance. A table is consisted by the new database, and the table is created by utilizing the following code segment:  Since you are the technical support, you should utilize the maximum secure method to protect the BonusPlan column from the access of unauthorized users.  
Which action will you perform to finish the task?()

A.To finish the task, Transparent data encryption should be utilized. 
B.To finish the task, the NTFS file system security should be utilized and the access of the database files should be limited to the SQL Server 2008 Service account. 
C.To finish the task, the Trustworthy option for the database should be utilized. 
D.To finish the task, the Advanced Encryption Standard encryption should be utilized on all columns in the database.

4.单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.   
Which action will you perform?()

A.The SAFE code access security should be utilized for the assembly.
B.All public static fields should be replaced with public fields.
C.All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
D.All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.

5.单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A maintenance strategy should be designed for a mission-critical database, and a large table named Orders is contained by the database. Index maintenance operations are contained in the design plan. When you design the strategy, the facts listed below should be taken into consideration. First, the users continuously access to the Orders table in the database. Secondly, a column of the xml data type is contained by Orders table.  Thirdly, the new rows are regularly added to the Orders table. Fourthly, the average fragmentation for the clustered index of the Orders table is no more than 2 percent.   
A strategy should be designed to have the performance of the queries on the table optimized.   
Which action will you perform?()

A.The clustered index of the Orders table should be dropped.
B.The clustered index of the Orders table offline should be rebuilt once a month.
C.The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.
D.The clustered index of the Orders table should be reorganized by reducing the fill factor.

7.单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log. 
Which action should you perform to finish the task?()

A.To finish the task, hourly database snapshots should be utilized. 
B.To finish the task, the full-recovery model along with transaction log backups should be utilized.
C.To finish the task, the full-recovery model along with differential backups should be utilized.
D.To finish the task, the simple-recovery model along with differential backups should be utilized. 

8.单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There are 30 branch offices in DoubleSecurity Insurance, and in the branch offices, customer data are stored in SQL Server 2008 databases. Customer data should be security compliant if it is stored through multiple database instances. You intend to utilize the Policy-Based Management feature to design a strategy for custom policies. And the format of custom policies is XML format. The requirements listed below should be satisfied. The company distributes custom policies to all instances. In addition, the company enforces the policies on all instances. A strategy should be thought out and the minimum amount of administrative effort should be utilized.   
Which action should you perform to finish the task?()

A.To finish the task, the Distributed File System Replication service should be utilized.
B.To finish the task, a configuration server should be utilized. 
C.To finish the task, the policies should be distributed by utilizing Group Policy Objects. 
D.To finish the task, the policies should be distributed by utilizing the Active Directory directory service.

9.单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task.   
Which tool will you utilize to finish the task?() 

A.To finish the task, you should utilize Resource Governor. 
B.To finish the task, you should utilize Database Engine Tuning Advisor.
C.To finish the task, you should utilize Extended Events. 
D.To finish the task, you should utilize Performance Monitor (SYSMON). 

10.单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed by you. The computer on which the instance run has the following three features: a 64-GB RAM, four quad-core processors, and several independent physical raid volumes. A transactional database will be implemented on the instance. In addition, the database should have a high volume of INSERT, UPDATE, and DELETE activities. Creation of new tables is contained by the activities. You need to maximize disk bandwidth and decrease the contention in the storage allocation structures so as to have the performance of the database optimized.   
Which action will you perform to finish the task?()

A.To finish the task, database and log files should be placed on the same volume.
B.To finish the task, the affinity mask option should be configured properly.
C.To finish the task, multiple data files should be create for the database. 
D.To finish the task, the affinity I/O mask option should be configured properly.

最新试题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance of your company is managed by you. There is a team of database administrators in your company. SQL Server 2008 Integration Services (SSIS) packages are created on the test server in a shared project by a team of application developers. A fixed cache file is required by one of the packages. The company will deploy the packages to the production server on completion of development. The production server is available only to the database administrators.  Since you are the technical support, you need to confirm that the project can be deployed successfully to the production server by the application developers.   Which action will you perform to achieve the goal?()

题型:单项选择题

You administer a SQL Server 2008 instance. You plan to design the security requirements for a new database application that will be deployed to the instance.  The new database contains a table that is created by using the following code segment: You need to ensure that the BonusPlan column is protected from unauthorized access by using the most secure method.What should you do?()

题型:单项选择题

You administer a SQL Server 2008 infrastructure. An instance runs on a computer that has eight quad-core processors and 128-GB RAM. Four different applications use the instance. The instance experiences a low number of CXPACKET waits. The instance also experiences a large number of lazy writer waits. You need to optimize the performance of the instance.What should you do?()

题型:单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 servers on a single site are managed by you. Two SQL Server 2008 instances are contained by the site. One is an Enterprise Edition server, and it is on a server that has a redundant array of ndependent disks (RAID) 10 disk system. The other is a Standard Edition server, and it is on a server that has a RAID 5 disk system. A single application is hosted by each instance. A high-availability solution should be recommended for the site to satisfy the business requirements listed below. First, the solution can be implemented on the current systems. Secondly, the database is available with least downtime. Thirdly, Data loss should be cut to the least. Fourthly, the existing system should be with least impact.   Which solutions should be utilized to finish the task?()

题型:多项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log. Which action should you perform to finish the task?()

题型:单项选择题

You administer a SQL Server 2008 instance. You plan to deploy a third-party database application to the instance. The application uses stored procedures that are developed by using SQL CLR integration. The application must be configured to enable the EXTERNAL_ACCESS code access security setting. You need to ensure that the application is deployed to the instance without loss of functionality.What should you do first?()

题型:单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security,troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A database is included by the instance, and a table named EmployeeData is contained by the database. There is a column named Profile in the EmployeeData table. Microsoft Office Word 2003 documents are stored in the column. The space utilized by the Profile column should be cut to the least. In addition, a reasonable performance should be maintained to retrieve the content of the column.Which action will you perform?()

题型:单项选择题

You administer a SQL Server 2008 instance. You deploy a new database named Engineering. The Engineering database manages large documents that will be revised occasionally. You need to design a table structure that allows fast read access. You also need to minimize storage space requirements. Which two actions should you perform?()

题型:多项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There is a database in the instance, and the day-to-day business of your company requires the database. When reports are executed, slow response time will be experienced by Users. A performance monitoring strategy will be implemented by you so as to have three aspects of data captured and stored: Blocking and deadlock information,  Executed Transact-SQL statements  Query activity and Counters for disk, CPU, and memory. You are required to utilize the least amount of administrative effort to implement the monitoring process.    Which action will you perform to finish the task?()

题型:单项选择题

You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time.Which encryption type should you use?()

题型:单项选择题