QUESTION 1
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written
to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write
access to the file server. Which account type should you use?
A.You should use local Service account
B.You should use network Service account
C.You should use domain account
D.You should use local System account
Answer: C
QUESTION 2
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. There is a database named DB1 in the instance. On DB1, quite few logged operations are performed. Now according to the requirement of the company CIO, you must validate that the
database can be restored to a specific point in time. So what action should you perform to achieve this goal?
A.You should verify that the simple recovery model is used by the database
B.You should verify that the full recovery model is used by the database.
C.You should verify that the checksum page verify option is used by the database
D.You should verify that the bulk-logged recovery model is used by the database
Answer: B
QUESTION 3
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. There is a SQL Server 7.0 database. You upgrade the database to the SQL Server instance. According to the company requirement, you must make sure that suspect pages can be detected
in the database. So what action should you perform to achieve this goal?
A.For the database, you should turn on the TRUSTWORTHY database option
B.For the database, the PAGE_VERIFY database option should be set to CHECKSUM
C.For the database, the database compatibility level option should be set to 10.
D.For the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.
Answer: B QUESTION 4
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. You configure the SQL Server instance to use the -T1222 and -T1204 trace flags during startup. You must make sure that your failure recovery plan performs backup of the use of the trace
flags.
So what action should you perform to achieve this goal?
A.You should backup the master database
B.You should backup the default.trc file
C.You should backup the SQL Server registry hive.
D.You should backup the resource database
Answer: C
QUESTION 5
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. According to the company requirement, the names of all user-defined stored procedures must contain the prefix usp_ on all instances. Besides this, you must make sure that stored
procedures that do not contain this prefix cannot be created by you.
What should you do?
A.A policy should be created. The policy targets the name of the stored procedure that is evaluated on demand.
B.A policy should be created. The policy targets the name of the stored procedure that is evaluated on change.
C.A condition should be created. The condition targets the name of the stored procedure that is evaluated on change
D.A condition should be created. The condition targets the name of stored procedure that is evaluated on demand.
Answer: B
QUESTION 6
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. There is an Internet Information Services application. This application will use anonymous access to access the SSAS instance. You must make sure that the application can access the SSAS
instance. What should you do?
A.The Security\RequireClientAuthentication server configuration should be set to False
B.The Security\RequireClientAuthentication server configuration should be set to True.
C.The NTLM Security Support Provider Interface (SSPI) provider should be added to the Security\SecurityPackageList server configuration.
D.The Kerberos Security Support Provider Interface (SSPI) provider should be added to the Security\SecurityPackageList server configuration
Answer: A
QUESTION 7
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008
instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access
to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application
environments.
What should you do?
A.You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance
B.You should upgrade the SQL Server 2005 application to use SQL Server 2008
C.You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance
D.You should install SQL Server 2008 as a named instance, and make the new application use the new instance.
Answer: D
QUESTION 8
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM
for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data.
You must make sure that FILESTREAM data is enabled. Which service should you configure?
A.You should configure SQL Server VSS Writer
B.You should configure Distributed File System
C.You should configure SQL Server
D.You should configure SQL Server Full Text
Answer: C
QUESTION 9
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two instances both of
which run on the same computer. One is a SQL Server 2008 instance; another is a SQL Server 2005 instance. There is a database named DB1 in the SQL Server 2008 instance. DB1 uses the Fulltext
indexes. Several records that include the word "root" are added to DB1. An empty resultset is returned when the Fulltext index is queried for the word "root." You must make sure the query can
return records that contain the word "root". What should you do?
A.You should terminate and restart the MSFTESQL service
B.You should rebuild the full-text index
C.The word "root" should be added to the stop list
D.The word "root" should be added to the thesaurus file
Answer: B
QUESTION 10
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008
instance. You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what
action should you perform to achieve this goal?
A.You should use the Database Engine Tuning Advisor.
B.In Microsoft SQL Server Management Studio, you should create a maintenance plan
C.You should use the SQL Server Configuration Manager
D.In Microsoft SQL Server Management Studio, you should create a policy
Answer: D