单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()ASymmetric key encryptionBAsymmetric key encryptionCCertificate-based encryptionDTransparent data encryption

单选题
You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()
A

Symmetric key encryption

B

Asymmetric key encryption

C

Certificate-based encryption

D

Transparent data encryption


参考解析

解析: 暂无解析

相关考题:

You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?()A、affinity maskB、affinity I/O mask C、max degree of parallelismD、optimize for ad hoc workloads

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. Now you get a report from users saying that DB1 meets deadlock problems. As the technical support, you have to capture the deadlock information to the SQL Server error log. What should you do?()  A、For the AdventureWorks database, enable Server Auditing B、First you should set the appropriate trace flags as a startup parameter, and then restart the SQL Server instance C、You should configure the data collector and make it capture the deadlock graphsD、You should configure a SQL Profiler trace, and make it capture the deadlock graphs

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a remote SQL Server 2008 instance. You notice that the application has a poor performance. On the remote SQL Server instance, you capture a workload of the remote instance to a trace table by using SQL Profiler. Now you have to use the Database Engine Tuning Advisor to analyze the workload of the remote SQL Server instance on a local SQL Server instance.  So what action should you perform to achieve this goal?()A、You should recapture the workload by using the data collector.B、You should enable the XP_MSVER stored procedure on the local server.C、You should enable the XP_MSVER stored procedure on the remote serverD、You should recapture the workload to a trace file by using SQL Profiler.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two instances both of which run on the same computer. One is a SQL Server 2008 instance; another is a SQL Server 2005 instance. There is a database named DB1 in the SQL Server 2008 instance. DB1 uses the Fulltext indexes. Several records that include the word "root" are added to DB1. An empty resultset is returned when the Fulltext index is queried for the word "root." You must make sure the query can return records that contain the word "root". What should you do?()  A、You should terminate and restart the MSFTESQL service B、You should rebuild the full-text index C、The word "root" should be added to the stop list D、The word "root" should be added to the thesaurus file

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? () A、You should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. B、You should identify whether the SQL Server Agent is started on the primary server. C、You should identify whether the AdventureWorks database uses the Simple recovery model. D、You should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server

ou work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you intend to perform an installation of an instance of SQL Server Reporting Services (SSRS) to the same machine. Now your company CIO wants version histories of all deployed reports can be kept. As a technical support, what should you do to ensure this?()A、You should use the http.sys listener to install the SSRS instance. B、You should configure the SSRS database, make it use Native mode C、You should configure the SSRS database, make it use SharePoint integrated mode D、You should use the Internet Information Services default Web site to install the SSRS instance

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. In the database, a small percentage of data is modified everyday. Ever day in the morning, you have to create a read-only copy of the database for reporting purposes and make sure that you use as little disk space as possible.  In the options below, which strategy should you use? () A、You should use database snapshots B、You should use database backup and restore C、You should use database backup and restore along with compression D、You should use schema-bound views in a read-only database. The database resides on the same instance.

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You configure the SQL Server instance to use the -T1222 and -T1204 trace flags during startup. You must make sure that your failure recovery plan performs backup of the use of the trace flags. So what action should you perform to achieve this goal? () A、You should backup the master databaseB、You should backup the default.trc fileC、You should backup the SQL Server registry hive.D、You should backup the resource database

ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? () A、You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B、You should upgrade the SQL Server 2005 application to use SQL Server 2008 C、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D、You should install SQL Server 2008 as a named instance, and make the new application use the new instance.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. You put forward a database maintenance plan. The maintenance plan rebuilds indexes, checks database integrity, writes a report to a text file. Now the company requires that when the maintenance plan executes abnormally, the operators can be notified by an e-mail message. You've been assigned this task. So you have to make modifications on the SQL Server instance. What should you do?()A、For the SQL Server Agent, you should enable a fail-safe operator B、You should modify the database maintenance plan, making it send an e-mail to the appropriate operators C、You should modify the database maintenance plan, making it include a Notify Operator task that e-mails the appropriate operators. D、You should modify the SQL Server Agent job. The job executes the database maintenance plan to notify the appropriate operators.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory.  Which SQL Server database engine subdirectory should be backed up?()A、DATAB、INSTALL C、LOG D、BINN

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you migrate an application from Microsoft SQL Server 2000 to Microsoft SQL Server 2008. You have to monitor the SQL Server instance, and record the use of features which will be discontinued. What should you do? () A、The SQL Server 2008 Upgrade Advisor should be used B、You should use a SQL server-side trace. The trace captures the Deprecation Announcement and Deprecation Final Support event classes C、You should use the SQL Server Profiler. The profiler captures the SQL:BatchCompleted and Exception event classes D、You should use a SQL server-side trace. The trace captures the SQL:BatchCompleted and Exception event classes.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance on the same physical computer. Now users report that they are unable to connect to the named instances. You check and verify that they can only connect to the default instance. You also ensure that all SQL Server instances run normally. You have to start the service which is required to connect to the named instances.  Which service should you start?()  A、Server B、SQL Server Agent C、SQL Server Browser D、SQL Active Directory Helper

You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()A、You should install SQL Server 2008 as a named instance, and make the new application to use the new instance. B、You should install SQL Server 2008 as the default instance, and make the new application to use the default instance. C、You should upgrade the SQL Server 2005 application to use SQL Server 2008. D、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a SQL Server 7.0 database. You upgrade the database to the SQL Server instance. According to the company requirement, you must make sure that suspect pages can be detected in the database. So what action should you perform to achieve this goal?()AFor the database, you should turn on the TRUSTWORTHY database optionBFor the database, the PAGE_VERIFY database option should be set to CHECKSUMCFor the database, the database compatibility level option should be set to 10DFor the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? ()AYou should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. BYou should identify whether the SQL Server Agent is started on the primary server. CYou should identify whether the AdventureWorks database uses the Simple recovery model. DYou should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()AYou should install SQL Server 2008 as a named instance, and make the new application to use the new instance. BYou should install SQL Server 2008 as the default instance, and make the new application to use the default instance. CYou should upgrade the SQL Server 2005 application to use SQL Server 2008. DYou should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you migrate an application from Microsoft SQL Server 2000 to Microsoft SQL Server 2008. You have to monitor the SQL Server instance, and record the use of features which will be discontinued. What should you do? ()AThe SQL Server 2008 Upgrade Advisor should be used BYou should use a SQL server-side trace. The trace captures the Deprecation Announcement and Deprecation Final Support event classes CYou should use the SQL Server Profiler. The profiler captures the SQL:BatchCompleted and Exception event classes DYou should use a SQL server-side trace. The trace captures the SQL:BatchCompleted and Exception event classes.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a remote SQL Server 2008 instance. You notice that the application has a poor performance. On the remote SQL Server instance, you capture a workload of the remote instance to a trace table by using SQL Profiler. Now you have to use the Database Engine Tuning Advisor to analyze the workload of the remote SQL Server instance on a local SQL Server instance.  So what action should you perform to achieve this goal?()AYou should recapture the workload by using the data collector.BYou should enable the XP_MSVER stored procedure on the local server.CYou should enable the XP_MSVER stored procedure on the remote serverDYou should recapture the workload to a trace file by using SQL Profiler.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance on the same physical computer. Now users report that they are unable to connect to the named instances. You check and verify that they can only connect to the default instance. You also ensure that all SQL Server instances run normally. You have to start the service which is required to connect to the named instances.  Which service should you start?()AServer BSQL Server Agent CSQL Server Browser DSQL Active Directory Helper

单选题You administer a SQL Server 2008 instance. You plan to deploy a third-party database application to the instance. The application uses stored procedures that are developed by using SQL CLR integration. The application must be configured to enable the EXTERNAL_ACCESS code access security setting. You need to ensure that the application is deployed to the instance without loss of functionality. What should you do first?()AReplace read write non-static fields in the code with static fields.BReplace read-only static fields in the code with read write static fields. CUse the peverify.exe PEVerify tool to verify whether the code meets the type-safety requirements.DUse the regasm.exe assembly registration tool to register the assembly on the server before deployment.

单选题You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()AConfigure the default Web site on the instance to use the Integrated Security type.BConfigure the application pool used by the default Web site to use a domain account. CConfigure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.DRegister a service principal name (SPN) in the Active Directory directory service for the SSRSinstance.

单选题ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? ()AYou should install SQL Server 2008 as the default instance, and configure the new application to use the default instance BYou should upgrade the SQL Server 2005 application to use SQL Server 2008 CYou should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance DYou should install SQL Server 2008 as a named instance, and make the new application use the new instance.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now according to the requirement of the company CIO, users on the SQL Server instance must be able to use the OPENROWSET() function to query remote data source.  In the options below, which sp_configure configuration option should you configure?AAgent XPs Bremote access Cremote proc trans DAd Hoc Distributed Queries

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. Now you get a report from users saying that DB1 meets deadlock problems. As the technical support, you have to capture the deadlock information to the SQL Server error log. What should you do?()AFor the AdventureWorks database, enable Server Auditing BFirst you should set the appropriate trace flags as a startup parameter, and then restart the SQL Server instance CYou should configure the data collector and make it capture the deadlock graphsDYou should configure a SQL Profiler trace, and make it capture the deadlock graphs

单选题ou work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, you intend to perform an installation of an instance of SQL Server Reporting Services (SSRS) to the same machine. Now your company CIO wants version histories of all deployed reports can be kept. As a technical support, what should you do to ensure this?()AYou should use the http.sys listener to install the SSRS instance. BYou should configure the SSRS database, make it use Native mode CYou should configure the SSRS database, make it use SharePoint integrated mode DYou should use the Internet Information Services default Web site to install the SSRS instance

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user.  So which database permission should you give the user?()ADELETE BCONTROL CDROP DATABASE DALTER ANY DATASPACE

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. For some reason, now the company wants to view the number of users who access the SQL Server instance. The company CIO assigns this task to you. You have to use Windows System Monitor to find out the concrete number. Which performance object should you capture?()ASQLServer:Buffer Manager BSQLServer:Access Methods CSQLServer:General Statistics DSQLServer:Exec Statistics