单选题You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?()Aaffinity maskBaffinity I/O mask Cmax degree of parallelismDoptimize for ad hoc workloads

单选题
You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?()
A

affinity mask

B

affinity I/O mask 

C

max degree of parallelism

D

optimize for ad hoc workloads


参考解析

解析: 暂无解析

相关考题:

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which contains a database. According to the company requirement, you have to move the application from Microsoft SQL Server 2000 to Microsoft SQL Server 2008. You have to monitor the SQL Server instance to record the use of features.  These features will be discontinued. What should you do? ()A、The SQL Server 2008 Upgrade Advisor should be used. B、The SQL Server Profiler which captures the SQL:BatchCompleted and Exception event classes should be used. C、A SQL server-side trace that captures the Deprecation Announcement and Deprecation Final Support event classes should be used D、A SQL server-side trace that captures the SQL:BatchCompleted and Exception event classes should be used.

You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?()A、affinity maskB、affinity I/O mask C、max degree of parallelismD、optimize for ad hoc workloads

You administer a SQL Server 2008 instance. The instance runs on a computer that has the following features: A 64-GB RAM  Four quad-core processors  Several independent physical raid volumes  You plan to implement a transactional database on the instance. The database is expected to have a high volume of INSERT, UPDATE, and DELETE activities. The activities include creation of new tables. You need to optimize the performance of the database by maximizing disk bandwidth and reducing the contention in the storage allocation structures. What should you do?()A、Create multiple data files for the database.B、Place database and log files on the same volume.C、Configure the affinity mask option appropriately.D、Configure the affinity I/O mask option appropriately.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. Now you get a report from users saying that DB1 meets deadlock problems. As the technical support, you have to capture the deadlock information to the SQL Server error log. What should you do?()  A、For the AdventureWorks database, enable Server Auditing B、First you should set the appropriate trace flags as a startup parameter, and then restart the SQL Server instance C、You should configure the data collector and make it capture the deadlock graphsD、You should configure a SQL Profiler trace, and make it capture the deadlock graphs

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a SQL Server 7.0 database. You upgrade the database to the SQL Server instance. According to the company requirement, you must make sure that suspect pages can be detected in the database. So what action should you perform to achieve this goal?()A、For the database, you should turn on the TRUSTWORTHY database optionB、For the database, the PAGE_VERIFY database option should be set to CHECKSUMC、For the database, the database compatibility level option should be set to 10D、For the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.

You administer a SQL Server 2008 instance. You plan to deploy a new database to the instance. The database will be subject to frequent inserts and updates. The database will have multiple schemas. One of the schemas will contain a large amount of read-only reference data. You need to design the physical database structure for optimal backup performance. What should you do?() A、Create the database by using a single data file and a single log file.B、Create the database by using a single data file and multiple log files.C、Create the database by using a single log file and multiple filegroups.D、Create the database by using a single log file and a filegroup that has multiple data files.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a remote SQL Server 2008 instance. You notice that the application has a poor performance. On the remote SQL Server instance, you capture a workload of the remote instance to a trace table by using SQL Profiler. Now you have to use the Database Engine Tuning Advisor to analyze the workload of the remote SQL Server instance on a local SQL Server instance.  So what action should you perform to achieve this goal?()A、You should recapture the workload by using the data collector.B、You should enable the XP_MSVER stored procedure on the local server.C、You should enable the XP_MSVER stored procedure on the remote serverD、You should recapture the workload to a trace file by using SQL Profiler.

You administer a SQL Server 2008 infrastructure. An instance runs on a computer that has eight quad-core processors and 128-GB RAM. Four different applications use the instance. The instance experiences a low number of CXPACKET waits. The instance also experiences a large number of lazy writer waits. You need to optimize the performance of the instance. What should you do?()A、Configure the Resource Governor. B、Configure the Windows System Resource Manager. C、Configure software non-uniform memory access (soft-NUMA).D、Configure an increase in the maximum degree of parallelism option.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? () A、You should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. B、You should identify whether the SQL Server Agent is started on the primary server. C、You should identify whether the AdventureWorks database uses the Simple recovery model. D、You should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server

ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? () A、You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B、You should upgrade the SQL Server 2005 application to use SQL Server 2008 C、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D、You should install SQL Server 2008 as a named instance, and make the new application use the new instance.

You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()A、Symmetric key encryptionB、Asymmetric key encryptionC、Certificate-based encryptionD、Transparent data encryption

You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()A、Configure the default Web site on the instance to use the Integrated Security type.B、Configure the application pool used by the default Web site to use a domain account. C、Configure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.D、Register a service principal name (SPN) in the Active Directory directory service for the SSRSinstance.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a n On-Line Analytical Processing (OLAP) database named in the instance. The database contains a dimension table named Clients. Ever hour backup of data of the Clients table is performed. But the Clinets table contains redundant data. You must keep the disk space used to store the Clients table.  In the options below, which compression technology should you use?()A、You should use row compression B、You should use page compression C、You should use backup compression D、You should use windows NTFS file system compression

You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()A、You should install SQL Server 2008 as a named instance, and make the new application to use the new instance. B、You should install SQL Server 2008 as the default instance, and make the new application to use the default instance. C、You should upgrade the SQL Server 2005 application to use SQL Server 2008. D、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? ()AYou should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. BYou should identify whether the SQL Server Agent is started on the primary server. CYou should identify whether the AdventureWorks database uses the Simple recovery model. DYou should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server

单选题ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? ()AYou should install SQL Server 2008 as the default instance, and configure the new application to use the default instance BYou should upgrade the SQL Server 2005 application to use SQL Server 2008 CYou should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance DYou should install SQL Server 2008 as a named instance, and make the new application use the new instance.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()AYou should install SQL Server 2008 as a named instance, and make the new application to use the new instance. BYou should install SQL Server 2008 as the default instance, and make the new application to use the default instance. CYou should upgrade the SQL Server 2005 application to use SQL Server 2008. DYou should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

单选题You administer a SQL Server 2008 instance. You plan to deploy a new database to the instance. The database will be subject to frequent inserts and updates. The database will have multiple schemas. One of the schemas will contain a large amount of read-only reference data. You need to design the physical database structure for optimal backup performance. What should you do?()ACreate the database by using a single data file and a single log file.BCreate the database by using a single data file and multiple log files.CCreate the database by using a single log file and multiple filegroups.DCreate the database by using a single log file and a filegroup that has multiple data files.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a remote SQL Server 2008 instance. You notice that the application has a poor performance. On the remote SQL Server instance, you capture a workload of the remote instance to a trace table by using SQL Profiler. Now you have to use the Database Engine Tuning Advisor to analyze the workload of the remote SQL Server instance on a local SQL Server instance.  So what action should you perform to achieve this goal?()AYou should recapture the workload by using the data collector.BYou should enable the XP_MSVER stored procedure on the local server.CYou should enable the XP_MSVER stored procedure on the remote serverDYou should recapture the workload to a trace file by using SQL Profiler.

单选题You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()AConfigure the default Web site on the instance to use the Integrated Security type.BConfigure the application pool used by the default Web site to use a domain account. CConfigure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.DRegister a service principal name (SPN) in the Active Directory directory service for the SSRSinstance.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. Now you get a report from users saying that DB1 meets deadlock problems. As the technical support, you have to capture the deadlock information to the SQL Server error log. What should you do?()AFor the AdventureWorks database, enable Server Auditing BFirst you should set the appropriate trace flags as a startup parameter, and then restart the SQL Server instance CYou should configure the data collector and make it capture the deadlock graphsDYou should configure a SQL Profiler trace, and make it capture the deadlock graphs

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a SQL Server 7.0 database. You upgrade the database to the SQL Server instance. According to the company requirement, you must make sure that suspect pages can be detected in the database. So what action should you perform to achieve this goal?()AFor the database, you should turn on the TRUSTWORTHY database optionBFor the database, the PAGE_VERIFY database option should be set to CHECKSUMCFor the database, the database compatibility level option should be set to 10DFor the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.

单选题You administer a SQL Server 2008 infrastructure. An instance runs on a computer that has eight quad-core processors and 128-GB RAM. Four different applications use the instance. The instance experiences a low number of CXPACKET waits. The instance also experiences a large number of lazy writer waits. You need to optimize the performance of the instance. What should you do?()AConfigure the Resource Governor. BConfigure the Windows System Resource Manager. CConfigure software non-uniform memory access (soft-NUMA).DConfigure an increase in the maximum degree of parallelism option.

单选题You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?()Aaffinity maskBaffinity I/O mask Cmax degree of parallelismDoptimize for ad hoc workloads

单选题You administer a SQL Server 2008 instance. The instance runs on a computer that has the following features: A 64-GB RAM  Four quad-core processors  Several independent physical raid volumes  You plan to implement a transactional database on the instance. The database is expected to have a high volume of INSERT, UPDATE, and DELETE activities. The activities include creation of new tables. You need to optimize the performance of the database by maximizing disk bandwidth and reducing the contention in the storage allocation structures. What should you do?()ACreate multiple data files for the database.BPlace database and log files on the same volume.CConfigure the affinity mask option appropriately.DConfigure the affinity I/O mask option appropriately.

单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()ASymmetric key encryptionBAsymmetric key encryptionCCertificate-based encryptionDTransparent data encryption

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a n On-Line Analytical Processing (OLAP) database named in the instance. The database contains a dimension table named Clients. Ever hour backup of data of the Clients table is performed. But the Clinets table contains redundant data. You must keep the disk space used to store the Clients table.  In the options below, which compression technology should you use?()AYou should use row compression BYou should use page compression CYou should use backup compression DYou should use windows NTFS file system compression

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which contains a database. According to the company requirement, you have to move the application from Microsoft SQL Server 2000 to Microsoft SQL Server 2008. You have to monitor the SQL Server instance to record the use of features.  These features will be discontinued. What should you do? ()AThe SQL Server 2008 Upgrade Advisor should be used. BThe SQL Server Profiler which captures the SQL:BatchCompleted and Exception event classes should be used. CA SQL server-side trace that captures the Deprecation Announcement and Deprecation Final Support event classes should be used DA SQL server-side trace that captures the SQL:BatchCompleted and Exception event classes should be used.