You are a professional level SQL Sever 2008 Database Adminis

题目
单选题
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A maintenance strategy should be designed for a mission-critical database, and a large table named Orders is contained by the database. Index maintenance operations are contained in the design plan. When you design the strategy, the facts listed below should be taken into consideration. First, the users continuously access to the Orders table in the database. Secondly, a column of the xml data type is contained by Orders table.  Thirdly, the new rows are regularly added to the Orders table. Fourthly, the average fragmentation for the clustered index of the Orders table is no more than 2 percent.    A strategy should be designed to have the performance of the queries on the table optimized.    Which action will you perform?()
A

The clustered index of the Orders table should be dropped.

B

The clustered index of the Orders table offline should be rebuilt once a month.

C

The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.

D

The clustered index of the Orders table should be reorganized by reducing the fill factor.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A new database should be deployed, and the capacity requirements listed below should be satisfied. There should be 275 GB for the database data file, while there should be 50 GB for the transaction log file. There are six 100-GB disk drives which are accessible for the database in the storage array. The six disks are attached to a redundant array of independent disks (RAID) controller, and the controller supports RAID levels 0, 1, 5, and 10. Since you are the technical support, you are required to maximize the write performance of the transaction log. In addition, you should protect the database and transaction log files, when a drive fails. The storage system should be designed.   From the following four storage configuration, which one should you utilize?()

  • A、A single RAID 5 volume should be utilized. 
  • B、A RAID 1 volume and a RAID 5 volume should be utilized.
  • C、A single RAID 10 volume should be utilized. 
  • D、A RAID 0 volume and a RAID 5 volume should be utilized.

正确答案:B

第2题:

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  

  • A、All the SQL Server logins of the application developers have to be added to a fixed server role. 
  • B、All the database users of the application developers have to be added to a fixed database role 
  • C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. 
  • D、All database users of the application developers should be given the appropriate database-level permissions. 

正确答案:C

第3题:

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A corporate backup and recovery strategy that has to be validated is designed. You are required to make sure that any single database can be restored successfully from a severe failure, and during the restoration, a backup data center should not be required in a different location. Which three actions should be contained by your solution?()

  • A、All SQL Server instances should be installed on a failover cluster.
  • B、One list of all Windows logins and passwords should be sustained.
  • C、All backup media offsite should be stored. 
  • D、SQL login accounts and credentials should be scripted. 
  • E、The administrative processes and application access requirements should be documented. 

正确答案:A,D,E

第4题:

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task.    Which tool will you utilize to finish the task?() 

  • A、To finish the task, you should utilize Resource Governor. 
  • B、To finish the task, you should utilize Database Engine Tuning Advisor.
  • C、To finish the task, you should utilize Extended Events. 
  • D、To finish the task, you should utilize Performance Monitor (SYSMON). 

正确答案:C

第5题:

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column. The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized. From the following four encryption types, which one should you utilize?()

  • A、Asymmetric key encryption should be utilized.
  • B、Certificate-based encryption should be utilized.
  • C、Symmetric key encryption should be utilized.
  • D、Transparent data encryption should be utilized.

正确答案:C

第6题:

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed by you. The computer on which the instance run has the following three features: a 64-GB RAM, four quad-core processors, and several independent physical raid volumes. A transactional database will be implemented on the instance. In addition, the database should have a high volume of INSERT, UPDATE, and DELETE activities. Creation of new tables is contained by the activities. You need to maximize disk bandwidth and decrease the contention in the storage allocation structures so as to have the performance of the database optimized.    Which action will you perform to finish the task?()

  • A、To finish the task, database and log files should be placed on the same volume.
  • B、To finish the task, the affinity mask option should be configured properly.
  • C、To finish the task, multiple data files should be create for the database. 
  • D、To finish the task, the affinity I/O mask option should be configured properly.

正确答案:C

第7题:

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance of your company is managed by you. There is a team of database administrators in your company. SQL Server 2008 Integration Services (SSIS) packages are created on the test server in a shared project by a team of application developers. A fixed cache file is required by one of the packages. The company will deploy the packages to the production server on completion of development. The production server is available only to the database administrators.  Since you are the technical support, you need to confirm that the project can be deployed successfully to the production server by the application developers.    Which action will you perform to achieve the goal?()

  • A、To achieve the goal, the Import and Export Wizard should be utilized to save packages.
  • B、To achieve the goal, a direct package configuration should be created for each package.
  • C、To achieve the goal, a deployment utility should be created for the SSIS project. 
  • D、To achieve the goal, an indirect package configuration should be created for all packages.

正确答案:C

第8题:

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a text file which is named SQL01.log on the E: drive. A SQL Server Agent job executes every 2 minutes and logs information to the text file. You get a report from users saying that the sever doesn't make response. As the technical support, you check and find that the SQL Server Agent service does not run and the SQL Server Agent job no longer functions. You have to identify the reason why the SQL Server Agent service is unresponsive. In the options below, which log should you check?()  

  • A、You should check SQL1.log
  • B、You should check SQLAGENT.OUT
  • C、You should check log_xx.trc
  • D、You should check ERRORLOG

正确答案:B

第9题:

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.    Which action will you perform?()

  • A、The SAFE code access security should be utilized for the assembly.
  • B、All public static fields should be replaced with public fields.
  • C、All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
  • D、All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.

正确答案:D

第10题:

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? () 

  • A、You should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. 
  • B、You should identify whether the SQL Server Agent is started on the primary server. 
  • C、You should identify whether the AdventureWorks database uses the Simple recovery model. 
  • D、You should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server

正确答案:B

更多相关问题