TestKing.com uses SQL Server 2005. Users report with increasing frequency that they receive deadlock error messages in an order processing application. You need to monitor which objects and SQL Server session IDs are involved when deadlock conditions occur. You want information about each participant in the deadlock. What should you do?()A、Trace the Lock:Timeout event by using SQL Server Profiler.B、Observe the SQLServer:Locks - Number of Deadlocks/sec counter by using System Monitor.C、Trace the Lock:Deadlock event by using SQL Server Profiler.D、Trace the Lock:Deadlock Chain event by using SQL Server Profiler.
TestKing.com uses SQL Server 2005. Users report with increasing frequency that they receive deadlock error messages in an order processing application. You need to monitor which objects and SQL Server session IDs are involved when deadlock conditions occur. You want information about each participant in the deadlock. What should you do?()
- A、Trace the Lock:Timeout event by using SQL Server Profiler.
- B、Observe the SQLServer:Locks - Number of Deadlocks/sec counter by using System Monitor.
- C、Trace the Lock:Deadlock event by using SQL Server Profiler.
- D、Trace the Lock:Deadlock Chain event by using SQL Server Profiler.
相关考题:
View the Exhibit exhibit1 to examine the series of SQL commands. View the Exhibit exhibit2 to examine the plans available in the SQL plan baseline. The baseline in the first row of the Exhibit is created when OPTIMIZER_MODE was set to FIRST_ROWS.Which statement is true if the SQL query in exhibit1 is executed again when the valueof OPTIMIZER_MODE is set to FIRST_ROWS?()A. The optimizer uses a new plan because none of the plans in the exhibit2 are fixed plans.B. The optimizer uses the plan in the second row of the exhibit2 because it is an accepted plan.C. The optimizer uses the plan in the first row of the exhibit2 because it is the latest generated plan.D. The optimizer uses the plan in the first row of the exhibit2 because OPTIMIZER_MODE was set to FIRST_ROW during its creation.
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A. TestKing# show eigrp entriesB. TestKing# show protocolsC. TestKing# debug eigrp routesD. TestKing# show ip route eigrpE. TestKing# show route eigrp
TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()A、TestKing# show eigrp entriesB、TestKing# show protocolsC、TestKing# debug eigrp routesD、TestKing# show ip route eigrpE、TestKing# show route eigrp
You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.
TestKing.com has a server named SQL1 that runs SQL Server 2005 Enterprise Edition.SQL1 has 2 GB of RAM, 1.6 GB of which are used by the default SQL Server database engine instance. The average data growth of all databases combined is 100 MB a month. Users state that report execution times are increasing. You want to assess whether more RAM is needed. You need to use System Monitor to create a counter log that will help you decide whether to add RAM. Which performance object should you add to the counter log?()A、MSAS 2005:CacheB、MSAS 2005:MemoryC、MSAS 2005:Proactive CachingD、SQLServer:Buffer Manager
TestKing.com has multiple servers in a distributed environment. You work with two SQL Server 2005 computers named SQL1 and SQL2. Each server uses SQL Server Authentication and they use different logins.You need to write a distributed query that joins the data on SQL1 with the data on SQL2. What should you do?()A、Ensure that both SQL1 and SQL2 use the same login name as the security context for each server.B、Configure SQL2 as a remote server. Write the query on SQL1.C、Configure SQL2 as a linked server to impersonate the remote login.D、Configure SQL2 as a distributed server. Use pass-through authentication.
TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date. You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()A、DBCC CHECKTABLEB、ALTER INDEX REORGANIZEC、UPDATE STATISTICSD、CREATE STATISTICSE、DBCC SHOW STATISTICSF、DBCC UPDATEUSAGE
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you. So what action should you perform to achieve this goal?() A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules. What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously
You are designing the loan application process for the customer terminals. You need to design a Transact-SQL stored procedure that fulfills the business and technical requirements. Which type of Transact-SQL stored procedure should you use?()A、one that uses an internal SQL Server Web service endpointB、one that runs a SQL Server Integration Services (SSIS) packageC、one that uses Service BrokerD、one that runs a user-defined function
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? () A、You should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. B、You should identify whether the SQL Server Agent is started on the primary server. C、You should identify whether the AdventureWorks database uses the Simple recovery model. D、You should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server
TestKing.com uses SQL Server 2005. A user reports that an order processing application stopped responding in the middle of an order transaction. The users SQL Server session ID is 54. You need to find out if session 54 is blocked by another connection. If it is,you need to identify the blocking session ID. What are two possible ways to achieve this goal?()A、In SQL Server Management Studio, open the Activity Monitor. Open the Process Info page. View the blockedBy column for session 54.B、In SQL Server Management Studio,open the Activity Monitor. Open the Locks by Process page. View the Request Mode column for session 54.C、In SQL Server Management Studio, open a new query window and execute the following statement.SELECT * FROM sys.dm exec requests WHERE session id = 54View the blocking session id column.D、In SQL Server Management Studio, open a new query window and execute the following statement.SELECT * FROM sys.dm exec sessionsWHERE session id = 54View the status column.
You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run in an Exchange 2010 environment. The users at TestKing.com useMicrosoft Office Outlook 2010 to access the public folders. TestKing.com has joined with another company that also uses Microsoft Office Outlook 2010. You are now busy with a sharing solution for bothcompanies. You have received instructions from the CIO to propose a sharing information strategy thatensures corss-organizaional access to user contacts as well as free/busy information. What should you do?()A、The best option is to implementing Microsoft Modify LifeCyle Manager (ILM) 2007.B、The best option is to create cross forest trusts.C、The best option is to use the Microsoft Exchange Inter-Organization Replication tool.D、The best option is to implementing Federated Sharing.
TestKing.com has two SQL Server 2005 computers named SQL1 and SQL2. Transaction log shipping occurs from SQL1 to SQL2 by using default SQL Server Agent schedule settings. You need to reconfigure transaction log shipping to provide minimum latency on SQL2. What should you do?()A、On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, maintain default schedule settings for both the log shipping copy and the restore jobs.B、On SQL1,change the schedule type for the transaction log backup to Start automatically when SQL server Agent starts. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server gent starts.C、On SQL1, maintain default schedule settings for the transaction log backup job. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL server Agent starts.D、On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, reschedule both the log shipping copy and the restore jobs so that they occur every minute.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory. Which SQL Server database engine subdirectory should be backed up?()A、DATAB、INSTALL C、LOG D、BINN
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance on the same physical computer. Now users report that they are unable to connect to the named instances. You check and verify that they can only connect to the default instance. You also ensure that all SQL Server instances run normally. You have to start the service which is required to connect to the named instances. Which service should you start?() A、Server B、SQL Server Agent C、SQL Server Browser D、SQL Active Directory Helper
多选题TestKing.com uses SQL Server 2005. Users report that report execution is slow. You investigate and discover that some queries do not use optimal execution plans. You also notice that some optimizer statistics are missing and others are out of date. You need to correct the problem so that reports execute more quickly. Which two Transact-SQL statements should you use?()ADBCC CHECKTABLEBALTER INDEX REORGANIZECUPDATE STATISTICSDCREATE STATISTICSEDBCC SHOW STATISTICSFDBCC UPDATEUSAGE
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you migrate an application from Microsoft SQL Server 2000 to Microsoft SQL Server 2008. You have to monitor the SQL Server instance, and record the use of features which will be discontinued. What should you do? ()AThe SQL Server 2008 Upgrade Advisor should be used BYou should use a SQL server-side trace. The trace captures the Deprecation Announcement and Deprecation Final Support event classes CYou should use the SQL Server Profiler. The profiler captures the SQL:BatchCompleted and Exception event classes DYou should use a SQL server-side trace. The trace captures the SQL:BatchCompleted and Exception event classes.
多选题TestKing.com uses a SQL Server 2005 database. This database contains a trigger named trg InsertOrders, which fires when order data is inserted into the Orders table. The trigger is responsible for ensuring that a customer exists in the Customers table before data is inserted into the Orders table. You need to configure the trigger to prevent it from firing during the data import process. You must accomplish this goal while using the least amount of administrative effort. Which two Transact-SQL statements can you use to achieve this goal?()AALTER TABLE OrdersDISABLE TRIGGER trg InsertOrdersBDROP TRIGGER trg InsertOrdersCDISABLE TRIGGER trg InsertOrders ON OrdersDALTER TRIGGER trg InsertOrders ON Orders NOT FOR REPLICATION
多选题Which two statements regarding the Flashback Table feature are correct?()AFlashback Table can be performed on system tables.BFlashback Table operation does not shrink the segments.CFlashback Table uses log mining to extract SQL_REDO and SQL_UNDO statements.DFlashback Table operation acquires exclusive data manipulation language (DML) locks.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The instance contains a database named DB1. An application which is continuously connected uses DB1. The application extensively uses the INSERT command and triggers the population of multiple tables. Now you notice that the application has a poor performance. You doubt that this problem has something to do with blocking. You have to monitor the state of the instance at regular intervals while not affecting the application performance further. Which tool should you use? ()AYou should use Dynamic Management Views BYou should use SQL Server Resource Governor CYou should use SQL Server Profiler DYou should use Windows System Monitor
单选题TestKing.com has a large corporate network that uses multiple routing protocols.Hosts in a portion of the network that uses EIGRP have become unreachable.Which router command will allow you, the network technician, to view the status of these routes?()ATestKing# show eigrp entriesBTestKing# show protocolsCTestKing# debug eigrp routesDTestKing# show ip route eigrpETestKing# show route eigrp
单选题Application developers in TestKing.com create an assembly that contains a CLR function.This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?()ADefaultBSAFECEXTERNAL ACCESSDUNSAFE
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()AYou should use the Database Engine Tuning Advisor. BIn Microsoft SQL Server Management Studio, you should create a maintenance plan CYou should use the SQL Server Configuration Manager DIn Microsoft SQL Server Management Studio, you should create a policy
多选题TestKing.com uses SQL Server 2005. A user reports that an order processing application stopped responding in the middle of an order transaction. The users SQL Server session ID is 54. You need to find out if session 54 is blocked by another connection. If it is,you need to identify the blocking session ID. What are two possible ways to achieve this goal?()AIn SQL Server Management Studio, open the Activity Monitor. Open the Process Info page. View the blockedBy column for session 54.BIn SQL Server Management Studio,open the Activity Monitor. Open the Locks by Process page. View the Request Mode column for session 54.CIn SQL Server Management Studio, open a new query window and execute the following statement.SELECT * FROM sys.dm exec requests WHERE session id = 54View the blocking session id column.DIn SQL Server Management Studio, open a new query window and execute the following statement.SELECT * FROM sys.dm exec sessionsWHERE session id = 54View the status column.
多选题You are configuring SQL1 so that the distributed query in the Sales database can access data in the CRM database on SQL2. You create a linked server for SQL2, and you create a linked server login that uses impersonation.Now, you need to ask the network administrator to configure SQL1. Which two tasks should you ask the administrator to perform?()AAdd the user account that is used by the SQL Server service to the local Administrators group.BEnable the Do not trust this user for delegation Active Domain property for the user account that is used by the SQL Server service.CCreate a Service Principal Name (SPN) for the user account that is used by the SQL Server service.DEnable the Trusted for delegation Active Domain property for the user account that is used by the SQL Server service.
单选题TestKing.com has two SQL Server 2005 computers named SQL1 and SQL2. A user in TestKing.com named Eric writes many ad hoc queries against the company databases.Eric has access to the Customer database on SQL1. He does not have access to the Sales database on SQL2. You need to ensure that Eric can write queries that join information from both servers. What should you do first?()ACreate a linked server on SQL1 to SQL2. Configure the linked server to use impersonation.BCreate a linked server on SQL1 to SQL2. Configure the linked server to use mapped logins.CInstruct Eric to write the queries on SQL2 by using the OPENQUERY statement and specifying SQL1 as the server name.DInstruct Eric to specify SQL Server object names by using four-part notation.