• No results found

The Real MCTS SQL Server 2008 Exam 432

N/A
N/A
Protected

Academic year: 2021

Share "The Real MCTS SQL Server 2008 Exam 432"

Copied!
132
0
0

Loading.... (view fulltext now)

Full text

(1)

1

Self Test Appendix

The Real MCTS SQL

Server 2008 Exam 432

(2)

Chapter 1:

New Features in SQL Server 2008

1 . You are setting up security for your new SQL Server 2008 installation. Management is concerned about security. What approach should you take to ensure security settings are optimal?

A . Use the Surface Area Configuration Tool to secure the installation B . Use the new Security Analysis tool to secure the installation C . Use SQL Server Configuration Manager to secure the installation D . Use Windows Service Manager to enable and disable the appropriate

services

The correct answer is C . On the Start menu, point to All Programs |

Microsoft SQL Server 2008 | Configuration Tools | SQL Server Configuration Manager.

Answer A is incorrect because the Surface Area Configuration Tool is no longer used to secure SQL Server 2008. Answer B is incorrect because there is no Security Analysis tool in SQL Server 2008. While Answer D may work, it’s not the best answer. Your answer should be the most “correct” using the new features, even though some of the other answers may technically work. 2 . You have been tasked with setting up standards for your SQL Server 2008

installation. You need to enforce a table naming convention. What is the best way to accomplish this in your SQL Server 2008 environment?

A . Use Windows Group Policy B . Create DDL Triggers C . Create DML Triggers

D . Create a Declarative Management Framework policy

The correct answer is D . This is the most efficient way to accomplish the task of enforcing a table naming convention. Answer A is incorrect— Windows Group Policy does not provide a mechanism for enforcing table naming conventions. While Answer B could would, it’s not the best solution. Answer C is incorrect as DML triggers provide no means to control DDL code.

(3)

3 . You have been asked to create a backup of your production database and restore it on a development server. Your production server is using the full recovery model. Full backups are taken Monday and Wednesday. Transaction log backups are taken every hour. Today is Friday. The backup needs to be created as quickly as possible. What’s the fastest way to get the latest database copy while minimizing impact to production?

A . Create a normal backup. Use that to restore to development. B . Create a Copy Only Backup. Use that to restore to development. C . Use the Wednesday backup. Restore the transaction log backups since

Wednesday.

D . Copy the .mdf and log files and use SP_attach.

The ideal situation would be to use B , the Copy Only Backup. Copy Only doesn’t affect the backup chain and will provide the quickest solution while minimizing interruptions. Answer A will affect the backup chain, so it’s somewhat disruptive. Answer C is not the fastest method, and there would be quite a few transaction logs to restore. Answer D would require stopping the SQL service on the production server, rendering it unusable during the copy.

4 . You have a SQL Server 7.0 database and would like to move it to a new SQL Server 2008 instance. The database is part of an FDA-validated system and cannot be changed at all? How can this be accomplished?

A . Restore the 7.0 database on your new server and set the compatibility mode to 7.

B . You must upgrade the database to SQL 2005 or greater.

C . Restore the 7.0 database on your new server and set the compatibility mode to 6.5.

D . Copy the .mdf and log files and use SP_attach.

The correct answer is B . Answers A and C are incorrect as SQL Server 2008 does not support 7 or 6 compatibility. Answer D is incorrect as the database must be upgraded and cannot just be attached.

5 . You have an application that is being upgraded from SQL Server 2005 to SQL Server 2008. You notice that some stored procedures are not working correctly. An excerpt is as follows:

(4)

SELECT *

FROM Territories, Region

WHERE territories.regionid *= region.regionid

What should you do to resolve the issue?

A . There is no issue. The problem lies elsewhere. B . The join syntax is incorrect. Replace with left join. C . The select is incorrect. You need to enumerate the fields. D . The where clause should be = not ∗=.

The answer is B . The join syntax is no longer supported. Answer A is incorrect, as the old join syntax (∗= and =∗ ) will no longer work. Answer C is not cor-rect; although Select ∗ will work, it is not good practice. Answer D is incorrect as it will change the left join to an inner join, which would change the overall function of the select statement.

6 . Your disk is almost full on the transaction log drive for a database server. How can you resolve this issue?

A . Use BACKUP LOG WITH TRUNCATE_ONLY B . Change the mode to simple and shrink the log C . Reinstall SQL

D . Drop the database and restore from the last backup

The correct answer is B . Answer A would be the answer with SQL Server 2005; however, this command is no longer available. Answer C will not solve the problem, and Answer D would result in data loss and could take a while. 7 . You want to enforce a standard naming convention for stored procedures.

What’s the best way to do this in SQL Server 2008? A . Create a DDL trigger

B . Use the performance data warehouse C . Create DML triggers

D . Use the SQL Server 2008 Declarative Management Framework The correct answer is D . The DMF will allow you to perform the task at hand. Answer B has nothing to do with enforcing naming conventions. While Answer A could work, it’s not the best approach. Answer D will not allow you to perform the task of enforcing naming conventions.

(5)

8 . You want to enforce a standard naming convention for tables and stored

procedures. Your company has two SQL Server 2008 servers and 60 SQL Server 2005 servers. You need to use the same solution on all servers. What’s the best way to do this in SQL Server 2005 and SQL Server 2008?

A . Create a DDL trigger for all servers B . Use the performance data warehouse C . Create DML triggers

D . Use the SQL Server 2008 Declarative Management Framework

The correct answer is A . This will work on SQL Server 2005 and SQL Server 2008 servers. While Answer D is correct, the DMF will allow you to perform the task at hand only on SQL Server 2008 servers. Answer B has nothing to do with enforcing naming conventions. D will not allow you to perform the task of enforcing naming conventions.

9 . You have a database table with a varchar(600) field in it. Most of the records in the table have a null value for this field. How can you save space?

A . Move the data into a second table B . Use sparse columns

C . Install a third-party tool on the machine to compress the data D . Use the SQL Server 2008 Declarative Management Framework

The correct answer is A . Sparse columns will take up less space for varchar columns. Sparse columns will take up less space for most columns, but cannot be used for text, ntext, image, timestamp, user-defined data type, geometry, or geography or varbinary (max) with the FileStream attribute can be sparse. Answer C is incorrect; this is not the best approach. Answer D is incorrect, as the Declarative Management Framework will not save you space.

10 . You have a database table with a FileStream field in it. Most of the records in the table have a null value for this field. What’s the best way to save space? A . Move the data into a second table

B . Use sparse columns

C . Use the SQL Server 2008 Declarative Management Framework D . None of the above

(6)

The correct answer is D . Answer A is incorrect; this will not save space. Answer B is incorrect, as sparse columns will take up less space for most columns, but cannot be used for text, ntext, image, timestamp, user-defined data type, geometry, or geography or varbinary (max) with the FileStream attribute can be sparse.

11 . You need to store images in for a Web site using SQL Server 2008. How can you accomplish this?

A . Use a FileStream data type, and the images will be stored on disk B . Use a varchar data type and store the images in that field

C . Use an int data type and store the images in that field D . Use an nchar data type and store the images in that field

The correct answer is A . The FileStream data type is meant for storing files on disk. You could also store the image in a varbinary field, but moving forward the recommended approach is to use the FileStream data type.

Answers B , C , and D all reference data types that cannot be used to store binary data like image files. One approach is to use a varchar field as a pointer to the disk, but this is not recommended after the introduction of the

FileStream data type.

12 . You are responsible for a system that is used for both online transaction processing (OLTP) and reporting. When reports run on the server, the OLTP process slows way down. How can you allow reports to be run on the server and minimize impact to the OLTP processes?

A . Use the Resource Governor B . Use a DDL trigger

C . Use a DML trigger

D . Use processor affinity masks

A is the correct answer. The Resource Governor allows you to assign workloads to different groups, then assign a priority to those groups. Answers B and C are incorrect. Triggers cannot be used for this purpose. Answer C is incorrect. Processor affinity masks cannot be used for this purpose.

(7)

13 . You are creating an application to track crime in different locations

throughout a large city. What data type could prove useful for storing location data (longitude and latitude)?

A . Varchar B . int C . Char D . Spatial

The correct answer is D . Spatial data types are ideal for this type of data. Answer A could work, but is not ideal. Answers B and C are not ideal for storing this type of information.

14 . You are running out of space on the drive used to store backups. All of the servers use the same network location. What can you do to save space with your backups while maintaining the same number of backups?

A . Use data compression B . Use compressed backups C . Use full backups

D . Use a third-party tool

B is the correct answer. Compressed backups take up less space. Answer A is incorrect; this will save space in the data files. Answer C is incorrect; this will not save space. Answer D will work, but it’s not the best solution.

15 . You need to store sensitive data in your SQL Server database. The application has already been written and works fine. What’s the easiest way to do this without having to change your application?

A . Modify the stored procedures to use xp_encryptstring B . Use transparent data encryption

C . Use a third-party tool D . Use a trigger

The correct answer is B . Transparent data encryption enables data to be stored securely by encrypting the database files. Answer A is incorrect, as this is not the best approach. Answer C is incorrect; while there are third-party encryption tools, this is not the best approach. Answer D is incorrect; triggers by themselves are not a correct solution.

(8)

16 . Within your application, you need to log all changes to one table. DDL and DML changes must be logged. What’s the best approach to solve this problem? A . Use the built-in auditing capability

B . Create a DDL trigger C . Create a DML trigger

D . This cannot be accomplished

A is the correct answer. SQL Server 2008 has built-in auditing capability. Answers B and C are incorrect as they are not a complete solution. Answer D is incorrect, as this can be accomplished with Answer A .

17 . You have a server that supports Hot Add CPU. The current CPU utilization is 95 to 100 percent most of the time. The server is mission-critical and cannot be shut down. SQL Server 2008 Standard Edition is installed. What should you do? A . Use the Hot Add CPU feature to add another CPU

B . Use the Hot Add CPU feature to add two CPUs C . Add more memory to the server

D . Schedule an outage and add another CPU to the server

The correct answer is D . SQL Server 2008 Standard Edition does not support Hot Add CPU, which makes Answers A and B incorrect. Answer C is incorrect—the issue is CPU, so adding more memory will in all likelihood not solve the problem.

18 . You are contemplating using data compression on a table. You would like to know how much space this will save. How can you determine the savings? A . View the table properties

B . Enable compression, then check the table size C . Use sp_estimate_data_compression_savings D . Use sp_check_compression

The correct answer is C . sp_estimate_data_compression_savings will help you determine if the table is worth compressing.

This procedure accepts five parameters. 1 . @schema_name

(9)

3 . @index_id

4 . @partition_number 5 . @data_compression

The two critical parameters are @object_name and @data_compression. Answer A is incorrect; compression information is not shown in the table properties. Answer B will not solve the problem before applying compression. Answer D is incorrect, as there is no stored procedure by that name.

19 . You have a server that supports Hot Add Memory. Performance is sluggish, and you believe adding more memory will help. The server is mission-critical and cannot be shut down. SQL Server 2008 Standard Edition is installed. What should you do?

A . Use the Hot Add CPU feature to add another CPU B . Use the Hot Add CPU feature to add two CPUs C . Add more memory to the server.

D . Schedule an outage and add memory to the server.

The correct answer is D . SQL Server 2008 Standard Edition does not support Hot Add Memory, which makes Answer C incorrect. Answers A and B are incorrect—the issue is memory, so adding more CPU will in all likelihood not solve the problem.

20 . You have a SQL Server 2008 installation, and you want to create a high-availability solution. What are the ideal approach(es) to solve this problem? A . Backup and restore

B . Replication C . Mirroring D . Clustering

The correct answers are C and D . C and D are automated high-availability solutions. Answer A is not necessarily a good solution as it is not automated. Answer B will create a copy of a database, but will require intervention in order for the replicated database to become the active database.

(10)

Chapter 2: Installing SQL Server 2008

1 . Which SQL Server 2008 edition supports IA64?

A . Web and Compact Editions B . Standard and Workgroup Editions C . Enterprise and Developer editions D . All of the above

Correct Answer & Explanation: C . The Enterprise and Developer Editions support IA64.

2 . How many instances can be created in SQL Server 2008 Standard Edition? A . 1

B . 4 C . 16

D . Unlimited

Correct Answer & Explanation: C . SQL Server 2008 Standard Edition supports 16 instances, as do the Workgroup, Web, and Express Editions.

The Enterprise Edition can have up to 50.

3 . How many SQL Server default instances can be installed on a single, nonclus-tered server?

A . 1 B . 4 C . 16

D . Unlimited

Correct Answer & Explanation: A . There can only be one default instance of SQL Server on any SQL Server installation.

4 . Which of the following editions has all the features and functionality but is not licensed for production?

A . Compact Edition B . Web Edition C . Developer Edition D . Workgroup Edition

(11)

Correct Answer & Explanation: C . The Developer Edition has all the features and functionality of SQL Server 2008 Enterprise Edition, but it is not licensed for production use.

5 . Which SQL Server 2008 edition is best suited for mobile applications? A . Compact Edition

B . Web Edition C . Developer Edition D . Workgroup Edition

Correct Answer & Explanation: A . The Compact 3.5 Edition is best used for desktop and mobile applications because of its smaller footprint than the other versions. This is critical in mobile devices where disk space is at a premium.

6 . Which SQL Server 2008 edition provides the most Analysis Services features? A . Enterprise Edition

B . Standard Edition C . Workgroup Edition D . Web Edition E . Express Edition

Correct Answer & Explanation: A . Only the Enterprise and Developer Editions provide all the Analysis Services features.

7 . Which tool should be on an existing SQL Server 2000 or 2005 database instance prior to upgrading to SQL Server 2008?

A . Integration Services B . Reporting Services C . Analysis Services D . Upgrade Advisor Tool

Correct Answer & Explanation: D . The Upgrade Advisor Tool should be used on an existing SQL Server 2000 and 2005 instance to provide guidance prior to an upgrade to SQL Server 2008.

8 . Which of the following is a command-line utility used to run PowerShell command and scripts?

(12)

A . sqlcmd B . SQLdiag C . Ssms D . sqlps

Correct Answer & Explanation: D . sqlps is used to run PowerShell

commands and scripts. Sqlcmd is used to execute T-SQL command and pro-cedures. Ssms is used to start the SQL Server Management Studio, and SQLdiag is used to collect diagnostic information to supply to Microsoft Customer Service and Support.

9 . Which of the following editions does not support any Reporting Services features? A . Enterprise Edition B . Standard Edition C . Workgroup Edition D . Web Edition E . Express Edition

Correct Answer & Explanation: E . SQL Server 2008 Express Edition does not provide any Reporting Services features. Enterprise Edition provides all the features, while Standard, Workgroup, and Web have limited features of Reporting Services.

10 . Which of the following accounts has the least privilege when used as a service account?

A . Domain user account B . Local user account C . Local service account D . Administrator account E . Local system account

Correct Answer & Explanation: B . Local user account has only local user privileges, which are not sufficient for a service account .

11 . Which of the following accounts should be used to perform a SQL Server 2008 installation or upgrade?

(13)

A . Domain user account B . Local user account C . Local service account D . Administrator account E . Local system account

Correct Answer & Explanation: D , Administrator account. An account with Administrator privileges is required to install SQL Server 2008.

12 . In which of the following directories are the default instance database data and log files located?

A . <drive>:\Program Files\Microsoft SQL Server\\100\Setup Bootstrap\ LOG\Files\

B . <drive>:\Program Files\Microsoft SQL Server\MSSQL10. MSSQLSERVER\Data

C . <drive>:\Program Files\Microsoft SQL Server\MSSQL9.DEFAULT\Data D . <drive>:\Program Files\Microsoft SQL Server\MSAS10.

MSSQLSERVER\Data

E . <drive>:\Program Files\Microsoft SQL Server\MSRS10. MSSQLSERVER\Data

Correct Answer & Explanation: B . SQL Server 2008’s default directory is under the Program Files\Microsoft SQL Server. The name of the database directory is prefaced with the SQL Server Version ID of MSSQL10, plus a period and the name of the database. The default database name is always MSSQLSERVER.

13 . What additional software is required for SQL Server’s Business Intelligence Developer’s Tool?

A . .NET Framework 2.0 B . Microsoft Installer 4.5

C . Microsoft Internet Explorer 6 SP1 or later D . Windows PowerShell 2.0

E . Windows Vista Enterprise SP1 or greater

Correct Answer & Explanation: C , Microsoft Internet Explorer 6 SP1 or later. …NET Framework 3.5, Microsoft Installer 4.5, and Windows

(14)

14 . Which of the following is the SQL Server component that provides the ser-vices for creating, processing, and managing OLAP and data mining?

A . Business Intelligence Developer Studio B . SQL Server Management Studio C . Windows PowerShell 2.0

D . SQL Server Database Engine E . Analysis Services

Correct Answer & Explanation: E , Analysis Services. The SQL Server Database Engine contains the services to manage and process relational and XML data. Business Intelligence Developer Studio is used for managing all SQL Server 2008 components, including relational database and business intelligence (BI). SQL Server Management Studio is used for administering and managing all SQL Server 2008 components. Windows PowerShell 2.0 is a command-line shell and Microsoft scripting language.

15 . Which of the following is a scalability feature in SQL Server Enterprise Edition?

A . Partitioning

B . Data Mining Queries

C . Binary and compressed XML transport Correct Answer & Explanation: A , Partitioning. 16 . In which directory are the installation log files found?

A . <drive>:\Program Files\Microsoft SQL Server\\100\Setup Bootstrap\LOG\Files\ B . <drive>:\Program Files\Microsoft SQL Server\\90/Data

C . <drive>:\Program Files\Microsoft SQL Server\\Binn D . <drive>:\Program Files\Microsoft SQL Server\\logs

Correct Answer & Explanation: A . The installation log files are located in the directory < drive>:\Program Files\Microsoft SQL Server\\100\Setup Bootstrap\LOG\ Files\

17 . Which system database is hidden to SQL Server Management Studio and is used to persist a read-only version of system objects?

A . Master B . Resource

(15)

C . Tempdb D . System

Correct Answer & Explanation: B , Resource. Master and resource are system databases but do not perform the function to persist read-only versions of system objects. There is no system database named system.

18 . Which is the compatibility version associated with SQL Server 2008? A . 80

B . 90 C . 100 D . 200

Correct Answer & Explanation: C , 100. 80 is associated with SQL Server 2000, and 90 is associated with SQL Server 2005. 200 is an invalid

compatibility version.

19 . Which SQL Server tool is used to check that SQL Server component services are running?

A . SQL Server Management Studio (SSMS)

B . Business Intelligence Development Studio (BIDS) C . SQL Server Configuration Manager

D . SQL Server Profiler

E . Database Engine Tuning Advisor

Correct Answer & Explanation: C , SQL Server Configuration Manager. 20 . Which type of file contains data and database objects such as tables and

indexes? A . Data files B . Log files C . File groups D . Binary files E . Summary.txt

(16)

Chapter 3: Configuring SQL Server 2008

1 . You’ve just started as a DBA at a company that has recently installed a

dedicated server running both a SQL Server 2008 default instance and the database for the company’s ERP system. You want to implement a process to test the database with new SQL Server patches and service packs before they are applied to the live database. There is no budget to buy any new servers, but the existing hardware is under-utilized and you’re confident it will suffice for your short-term needs. Which of these options would meet your needs? A . Restore a copy of the live database as test on to its own disk array. Apply

patches and service packs to the new database and test them before applying them to the live database.

B . Install a named instance for testing. Create a database snapshot on the named instance pointing to the live database on the default instance. Apply patches and service packs to the named instance and test before applying them to the default instance.

C . Install another default instance for testing and restore a copy of the live database. Apply patches and service packs to the second instance and test before applying them to the live instance.

D . Install a named instance for testing and restore a copy of the live database. Apply patches and service packs to the named instance and test before applying them to the default instance.

Correct Answer & Explanation: D . SQL Server patches and service packs are applied at the instance level. Having a separate instance with a copy of the live database is the only way to achieve the requirements.

Incorrect Answers & Explanations: A , B , C . Answer A is incorrect because you cannot apply service packs and patches to individual databases. Answer B is incorrect because you cannot create a database snapshot between instances. You have to restore a copy of the database onto the instance. Answer C is incorrect because you can only have one default instance.

2 . Last month your company went through an exercise to standardize service accounts while you were on holiday. You’ve just restarted SQL Server after applying a service pack, and now the instance won’t start. You check the Windows Event Log and see lots of errors about not being able to open the error log. What is the most likely cause?

(17)

A . The SQL Server Service account was not changed using SQL Server Configuration Manager

B . The service pack failed C . Data corruption

D . You don’t have the right permissions to the error log

Correct Answer & Explanation: A . If you don’t use the Configuration Manager tool to change the service account, it will not get explicit permis-sions to the SQL Server directory structure. SQL Server will not start without permissions to create an error log file.

Incorrect Answers & Explanations: B , C , D . Answer B is incorrect, although technically feasible; the service pack should have generated errors if there was a problem, and given the scenario it is not the most likely cause. Answer C is incorrect, although technically feasible; given the lack of any other errors and the scenario it is not the most likely cause. Answer D is incorrect because the issue is with the Service Account permissions, not your account. To install the service pack you would have needed full Administrator rights on the server anyway.

3 . You have a default instance and a named instance installed on your server. The developers are complaining that they can’t connect to the named instance from their workstations using Management Studio anymore. You log on to the server through Terminal Services and can connect to each instance without issue. What could the cause of this behavior be?

A . The developers haven’t created a SQL Server Alias to the named instance using the Shared Memory protocol.

B . The SQL Browser Service has been started. C . The SQL Browser Service has been stopped.

D . The IP addresses of the developers’ workstations have been added to the Exclude list in the TCP/IP properties of the named instance in

Configuration Manager.

Correct Answer & Explanation: C . By default, named instances used dynamic TCP port allocation, and clients depend on the SQL Browser Service to find the current port. Incorrect Answers & Explanations: A , B , D . Answer A is incorrect because you can’t create an alias that uses the Shared Memory protocol, and it can be used only by tools running on the server. Answer B is

(18)

incorrect because the SQL Browser Service being started helps remote connections to named instances. Answer D is incorrect because you cannot exclude IP addresses from connecting to SQL Server using Configuration Manager.

4 . Your security administrator has determined that all the SQL Servers in your organization need to listen on nondefault TCP ports, and she doesn’t want network users to see the SQL Servers in a browse list. Which two actions would achieve this goal?

A . Stop and disable the browser service on each SQL Server

B . Use Configuration Manager on each server to change each instance to listen on port 50000

C . Use Configuration Manager on each server to change each instance to listen different ports

D . Configure the SQL Browser Service to hide each instance

E . Enable Show Advanced Options using sp_configure and use the Default TCP port option to configure the port for each instance Correct Answer & Explanation: A and C . Stopping the browser service will stop all instances on that server being browsable. Configuration Manager is the only place you can change the TCP port for an instance. Each instance on a server must listen on a unique port. Answers & Incorrect Answers & Explanations: B , D , E . Answer B is incorrect because configuring each instance with the same port on the same server will prevent all but one instance from working. Answer D is incorrect because you cannot hide an instance using the SQL Browser Service. Answer E is incorrect because Configuration Manager is the only place you can change the TCP port for an instance.

5 . The company you work for has just merged with another company that uses Novell NetWare as its network operating system. The new company’s devel-opers are struggling to connect to your SQL Server. What could be the problem?

A . SQL Server 2008 doesn’t support the Banyan Vines protocol. B . You haven’t enabled the IPX/SPX protocol.

C . You haven’t enabled the Banyan Vines protocol.

(19)

Correct Answer & Explanation: D . Older versions of Novell NetWare used IPX/SPX as a communication protocol. SQL Server 2008 does not

support it.

Incorrect Answers & Explanations: A , B , C . Answer A is incorrect. While the statement is true, Banyan Vines has nothing to do with the scenario. Answer B is incorrect because SQL Server 2008 doesn’t support IPX/SPX. Answer C is incorrect because Banyan Vines has nothing to do with the scenario.

6 . You have just upgraded your databases from a SQL Server 2005 default instance to a SQL Server 2008 named instance called Phobos on a server named MARS. The application that uses the SQL Server sits on its own server, and you’ve just found out that you can’t change the connection string in the application to point to the new instance. How can you fix it?

A . Add a CNAME record on your DNS server for MARS that points to MARS\Phobos

B . Install SQL Server Client Tools on the application server and create a SQL Server Alias called MARS that points to MARS\Phobos

C . Install SQL Server Client Tools on the application server and create a SQL Server Alias called MARS\Default that points to MARS\Phobos

D . Add a PTR record on your DNS server for MARS that points to MARS\ Phobos

Correct Answer & Explanation: B . Connection requests from the application to MARS will be redirected to MARS\Phobos without you having to change the connection string.

Incorrect Answers & Explanations: A , C , D . Answer A is incorrect because DNS resolves IP addresses, and you still need to connect to same server (MARS). DNS has no awareness of instances . Answer C is incorrect because you connect to a default instance using the servername, not servername\ Default. Answer D is incorrect because DNS resolves IP addresses, and you still need to connect to same server (MARS). DNS has no awareness of instances .

7 . You install a default instance of SQL Server 2008 Developer Edition with default configuration options. The developers complain that they can’t connect to the server using SQL Server Management Studio. Which of these options is the most likely cause?

(20)

A . A firewall is blocking port 1433.

B . The SQL Browser Service isn’t running.

C . The SQL Server tools on the developer workstations haven’t been service packed.

D . TCP/IP is disabled by default in Developer Edition.

Correct Answer & Explanation: D . TCP/IP is disabled by default in Developer Edition, which means that all remote connections will fail.

Incorrect Answers & Explanations: A , B , C . Answer A is incorrect. Although this would cause the same issue, all remote protocols are disabled, and that is the most likely cause. Answer B is incorrect because the SQL Server Browser Service isn’t required to connect to a default instance using default port 1433. Answer C is incorrect. Technically, it may be possible for this to cause an issue, but it is not the most likely cause of the problem.

8 . A SQL Server recently suffered from all CPUs running at 100 percent, which you found to be caused by a missing index. You fixed the problem, but you want to stop any new occurrences from saturating all CPUs. Which of these options would achieve this?

A . Use sp_configure to set max degree of parallelism

B . Use Configuration Manager to configure the SQL Server Service to use fewer CPUs

C . Run the Database Tuning Advisor and apply any recommendations D . Use sp_configure to set cost threshold for parallelism

Correct Answer & Explanation: A . Setting max degree of parallelism to less than the number of CPUs will prevent SQL Server from running parallel executions across all CPUs. Incorrect Answers & Explanations: B , C , D . Answer B is incorrect; you cannot use Configuration Manager to configure SQL Server CPU usage. Answer C is incorrect because DTA recommendations will only reduce the amount of parallelism that occurs. Answer D is incorrect because cost threshold for parallelism controls how expensive queries must be before being considered for parallelism.

9 . A developer has contacted you because he wants to enable AWE memory on his Developer Edition instance, but he says that he can’t see the option with sp_configure. What is the most likely cause?

(21)

B . The developer is connecting with a low-privilege user and doesn’t have enough permissions.

C . He hasn’t enabled show advanced options with sp_configure. D . He hasn’t enabled /PAE in boot.ini.

Correct Answer & Explanation: C . AWE is an advanced option and is only visible when show advanced options has been enabled.

Incorrect Answers & Explanations: A , B , D . Answer A is incorrect because AWE is supported with Developer Edition. Answer B is incorrect because low privileges won’t reduce what you see with sp_configure. Answer D is incorrect because /PAE won’t affect whether or not you can see the AWE option.

10 . You’re running SQL Server 64-bit and want to make sure that SQL Server doesn’t take too much memory. Which of these options would achieve that? A . Set Maximum Server Memory (MB) using sp_configure

B . Assign the SQL Service account the Lock Pages in Memory privilege C . Set Maximum Server Memory (MB) using SQL Server Management

Studio

D . Start SQL Server with the -g switch passing the maximum memory as a parameter

Correct Answer and Explanation: A and C . Maximum Server Memory con-trols how much memory SQL Server will use and can be configured using Management Studio or with sp_configure. B is incorrect because this would make a 64-bit SQL Server use AWE to lock memory pages; it wouldn’t pre-vent it from taking too much memory. D is incorrect because the -g switch controls how much reserved memory SQL Server allocates; it won’t prevent it from taking too much.

11 . One of your DBAs is setting up SQLMail and has asked you for a license key for Outlook. You suggest that he enable Database Mail instead. Which two of these options are features of Database Mail?

A . Received e-mails are stored in msdb. B . It doesn’t require a MAPI client. C . It is Windows failover-cluster aware. D . It is available in all SQL Server editions.

(22)

Correct Answer & Explanation: B and C . SQLMail requires a MAPI client like Outlook to run. Database Mail uses SMTP and is failover-cluster aware.

Incorrect Answers & Explanations: A , D . Answer A is incorrect because you can’t receive e-mails with Database Mail. Answer D is incorrect because Database Mail is not available in SQL Server Express.

12 . A business user has just phoned to say that his data wasn’t updated overnight. You check SQL Server and see that a SQL Server Agent job that runs a data load failed last night. You want to be automatically notified via e-mail if it hap-pens again. Which of these options will provide the most efficient, supported solution?

A . Implement SQLMail B . Implement Database Mail

C . Install a third-party SMTP mailer D . Implement Service Broker

Correct Answer & Explanation: B . Database Mail is fast, efficient, reliable, and supported. It meets the criteria in the scenario.

Incorrect Answers & Explanations: A , C , D . Answer A is incorrect because SQLMail is less efficient and reliable than the Database Mail that supersedes it. Answer C is incorrect because a third-party SMTP mailer would be unsup-ported, and Database Mail is an SMTP mailer. Answer D is incorrect because Service Broker is the messaging engine used by Database Mail. It does not provide e-mail facilities on its own.

13 . You’ve just upgraded to SQL Server 2008 from SQL Server 2000, and you’ve dropped SQLMail in favor of Database Mail. The IT manager wants to know if Database Mail has redundancy if a mail server goes down. How would you reply?

A . Yes, you can configure multiple SMTP servers in a Database Mail Profile. B . Yes, you can configure SQLMail as a backup.

C . No, you would have to reconfigure it to use a different mail server. D . Yes, Database Mail is supported on a failover cluster.

Correct Answer & Explanation: A. If the first SMTP server isn’t contactable, Database Mail will try the next configured server.

(23)

Incorrect Answers & Explanations: B , C , D . Answer B is incorrect because SQLMail and Database Mail don’t work together. Answer C is incorrect because you can specify multiple SMTP servers. Answer D is incorrect because the question refers to a mail server going down, not Database Mail going down.

14 . You’ve been investigating deadlocks on your server using trace flag 1222, and you’d like to enable it permanently to capture extra information if deadlocks occur again, even if SQL Server gets restarted. What is the easiest way to do this?

A . Execute DBCC TRACEON (1222,-1)

B . Create a start-up stored procedure containing DBCC TRACEON (1222,-1) and use sp_configure to enable scan for startup procs

C . Use Configuration Manager to add –T1222 as a start-up parameter for the SQL Server service

D . Execute DBCC TRACEON (1222)

Correct Answer & Explanation: C . –T is a start-up switch that enables the specific trace flag for all connections.

Incorrect Answers & Explanations: A , B , D . Answer A is incorrect; although this would enable the trace flag on all connections (-1), it will not persist a ser-vice restart. Answer B is incorrect because it is not the easiest method for achieving the goal. Answer D is incorrect because the trace flag will not persist a service restart and would only enable it on the current connection.

15 . You’ve been told that you need to make your SQL Server compliant with EAL4+. What is the first step you need to do in this process?

A . Use sp_configure to enable c2 audit mode .

B . Use sp_configure to enable common criteria compliance enabled . C . SQL Server 2008 is automatically EAL4+ compliant.

D . SQL Server 2008 does not support EAL4+ compliance.

Correct Answer & Explanation: B . EAL4+ is the most widely accepted level of Common Criteria Compliance.

Incorrect Answers & Explanations: A , C , D . Answer A is incorrect; C2 compliance is not related to EAL4+. Answer C is incorrect because you need

(24)

to enable Common Criteria Compliance. Answer D is incorrect because SQL Server 2008 supports EAL4+ through Common Criteria Compliance. 16 . Some of your full-text indexes are consuming a lot of server resources. You

investigate and discover that the index causing the problem is on a text-based field that is updated frequently. You’ve spoken to the business, and the updates don’t affect their search results. What could you do to reduce the overall impact on the server while keeping the index fairly up-to-date?

A . Set change tracking on the index to AUTO B . Move the index to a filegroup on its own drive

C . Set change tracking on the index to MANUAL and schedule a nightly population update.

D . Set change tracking on the index to OFF

Correct Answer & Explanation: C . This will still track changes but switches off auto propagation to the index. A nightly update will process all the tracked changes.

Incorrect Answers & Explanations: A , B , D . Answer A is incorrect; change tracking is already at the default setting of AUTO, and that is what is causing the problem. Answer B is incorrect because you want to reduce overall impact, and this option will only directly affect disk i/o. Answer D is incorrect because there is no method specified to keep the index updated.

17 . You have installed a default and two named instances called Phobos and Deimos on a server called Mars. How would you connect to each instance? A . Mars, Mars\Phobos, Mars\Deimos

B . Mars, Mars1\Phobos, Mars2\Deimos C . Default, Phobos, Deimos

D . Default, mars\phobos, mars\deimos

Correct Answer & Explanation: A . The default instance accessed by using the servername and each instance is accessed by adding \<instancename> to the servername.

Incorrect Answers & Explanations: B , C , D . Answer B is incorrect; Mars1 and Mars2 refer to different servers. Answer C is incorrect because Default is invalid for the default instance and the server is missing from the instance names. Answer D is incorrect because Default is invalid for the default instance.

(25)

18 . Your developers complain that they can’t connect to the server using SQL Server Management Studio. You’ve used Terminal Services to log on to the server, and you’ve confirmed that TCP/IP is enabled. You now want to test it with a local connection. What should you do?

A . Nothing, just connect

B . Disable Shared Memory in Configuration Manager

C . Move TCP/IP above Shared Memory in the connection protocol order D . Disable Shared Memory using sp_configure ‘shared memory enabled’ Correct Answer & Explanation: B . Disabling Shared Memory will force SQL Server to use the next protocol to connect which is TCP/IP by default. Incorrect Answers & Explanations: A , C , D . Answer A is incorrect; local connections will use the Shared Memory protocol by default. Answer C is incorrect because Shared Memory cannot be moved in the connection protocol order, only disabled. Answer D is incorrect because the sp_configure option is invalid.

19 . You are responsible for a large-capacity server that has a default instance of SQL Server 2008 installed and hosts databases for multiple applications belonging to several of your customers. A new database needs to be moved to the server, which has a different collation, and the collation of TempDB needs to match it. You can’t change the collation for your existing TempDB because it will affect all the applications. What could you do?

A . Create another TempDB with the right collation and configure the new database to use it

B . Configure the database to use a different TempDB on a remote server C . Install a new instance for the database with a default collation the same as

the database

D . A separate server with a separate instance is the only option

Correct Answer & Explanation: C . You can have only one TempDB database per instance, and it might be feasible to install a second instance on a large capacity server.

Incorrect Answers & Explanations: A , B , D . Answer A is incorrect; you can have only one TempDB per instance. Answer B is incorrect because you cannot configure to use a remote TempDB. Answer D is incorrect because it isn’t the only option.

(26)

20 . You’re implementing a database backup strategy, and you have full-text indexes that took 12 hours to build, so you need to make sure that they are backed up to avoid a long recovery time. What should you do?

A . Nothing extra, they’re backed up with the databases.

B . Add WITH FULLTEXT to the database backup command. C . Switch on fulltext backup default enabled with sp_configure. D . Configure the full-text indexes for AUTO.

Correct Answer & Explanation: A . Indexes are backed up as part of a database backup.

Incorrect Answers & Explanations: B , C , D . Answer B is incorrect because this option does not exist and is not required. Answer C is incorrect because the option does not exist. Answer D is incorrect, because AUTO affects change tracking and propagation, not backups.

Chapter 4: Managing Security

1 . Which of the following is considered a Principal?

A . SQL Server

B . SQL Server Integration Services C . SQL Server Login

D . SQL Server Agent

The correct answer is C . A SQL Server Login is considered a principal since it can request SQL Server resources.

Answers A , B , and D are incorrect because they are services and not considered to be principals.

2 . Which of the following is a securable object in a database schema? A . Database User

B . Database C . Service D . Procedure

The correct answer is D . A procedure is a securable object within a database schema. Answers A and C are database-level securables. Answer B is a server-level securable.

(27)

3 . Which of the following fixed server-level roles enables a member to add and remove linked servers?

A . Securityadmin B . Setupadmin C . Serveradmin D . Dbcreator

The correct answer is B . Although the answers A , C , and D are also fixed server-level roles, they do not have the correct level of permissions to add or remove a linked server.

4 . You have a team member who needs the ability to manage SQL Server logins, and you do not want him to have permissions to perform any task on the server. The team member’s responsibilities include resetting logins as well as granting, denying, and revoking database-level and server-level permissions. Which of the following server-level roles best fits the team member’s permissions requirement? A . Serveradmin

B . Sysadmin C . Securityadmin D . Processadmin

The correct answer is C . The securityadmin role would best fit the team member’s permissions requirement. Answer B would give the user more permissions then he needs. Answers A and D would not provide the appropriate level of permissions needed to perform the required tasks. 5 . Which of the following can be added to a server-level role?

A . Windows group B . Database User C . Database-level role D . Domain server account

The correct answer is A . Windows groups can be added to a server-level role. Answers B , C , and D are incorrect since they cannot be added to a server-level role.

6 . Which of the following database-level roles limits a user’s permissions to reading all data from all user tables?

(28)

A . db_owner B . db_datareader C . db_datawriter D . db_securityadmin

The correct answer is B . The role of db_datareader will limit a user to being able to only read all data from all user tables. Answer A would provide the user with permissions greatly exceeding his needs. Answers C and D would not provide the user sufficient permissions to read the data.

7 . You have a user who requires the permissions to drop a database and perform any configuration and maintenance tasks. Which of the following actions would violate “The Principle of Least Privilege”?

A . Adding the user to the db_datareader role B . Adding the user to the db_owner role C . Adding the user to the sysadmin role D . Giving the user permission to modify tables

The correct answer is C . Adding the user to the sysadmin role would provide him with permissions greatly exceeding his needs, which violates “The Principle of Least Privilege.” Answers A and D are incorrect since the permissions for these roles are less then what is required. Answer B is the appropriate role with the best permissions fit. This answer is incorrect since it does not violate the principle.

8 . Which of the following can be mapped to a database user? A . Windows account

B . Login

C . Windows group D . Domain account

The correct answer is B . A Login can be mapped to a database User. Answers A , C , and D are incorrect since they cannot be mapped to a database user. 9 . Although T-SQL can be used to create database users, which of the following

SQL Server management tools can also be used? A . SQL Server Configuration Manager

(29)

C . Microsoft Visual Studio

D . SQL Server Management Studio

The correct answer is D . By right-clicking the Users folder in the SQL Server Management Studio and selecting new user from the menu, you can create a user. Answers A , B and C are incorrect since these applications do not provide the functionality to create database users.

10 . Which of the following defines mixed mode authentication? A . Connections can be made using only Windows accounts.

B . Connections to SQL Server can be made with either Windows accounts or with SQL Server Logins.

C . Connections can be made using only SQL Server Logins. D . Connections can be made using only database users.

The correct answer is B . When you are using mixed mode authentication, connections to SQL Server can be made either with Windows accounts or SQL Server Logins. Answers A and C are incorrect since mixed mode authentication does not exclusively use Windows accounts or SQL Server logins. Answer D is incorrect since it is not a mode of authentication.

11 . Which of the following is an advantage to using mixed mode authentication? A . Users can connect from unknown or untrusted domains.

B . The Kerberos security protocol. C . Windows password policies.

D . Windows accounts are maintained outside of SQL Server.

The correct answer is A . With using mixed mode authentication and SQL Server Logins, users can connect from unknown or untrusted domains. Answers B , C , and D are all advantages to using the Windows Authentication mode exclusively.

12 . Which SQL Server tool is changed in the Authentication Mode? A . SQL Server Configuration Manager

B . Visual Studio

C . SQL Server Management Studio D . The Surface Area Configuration Facet

The correct answer is C . The Authentication Mode is changed by right-clicking on the server instance and changing the mode in the security

(30)

section. Answers A , B , and D are incorrect since these tools do not provide access to change this configuration.

13 . When you change the Authentication Mode, what action do you need to perform before the mode change takes effect?

A . Reboot the server operating system. B . Lock out all the database users. C . Restart SQL Server Agent. D . Restart the SQL Server Instance.

The correct answer is D . You need to restart the SQL Server instance in order for an authentication mode change to take effect. Answer A is incorrect since, although rebooting the server operating system will shut down SQL Server and start it when the operating system cycles back up, it is not necessary to do this. Answers B and C are incorrect since taking either of these actions will not cause the authentication mode to change.

14 . Jose has ownership of database tables in database A and database B, both of which reside in the same instance of SQL Server where cross database ownership chaining has been enabled. Jose uses a database view in database A to join both tables in order to retrieve the needed data. Jose grants Jack permission to use her database view. What other permissions need to be granted in order for Jack to retrieve data using Jose’s view?

A . Jack needs to be granted read permissions to the table in database B that is used by the view.

B . Since cross database ownership chaining is enabled in this instance, no additional permissions need to be granted.

C . The tables used by the view in database A and B need read permissions granted to Jack.

D . Jack cannot use Jose’s view since she is the owner. Jack will need his own view and permissions.

The correct answer is B . With cross database ownership chaining, credentials are only checked on the first object request. Since Jack was granted permission by the object’s owner, Jose’s credentials will be used to access the tables in database B. Answer A is incorrect since Jack was granted permission to the view by the object owner and cross database ownership chaining was enabled. Jack’s credentials would not be checked for accessing the table in database B. In addition, there is no need to permission the database B table to Jack.

(31)

Answer C is incorrect since with cross database ownership chaining it is not necessary for the object’s owner to grant permission on the view in database A to Jack. Answer D is incorrect since Jose granted the view to Jack. The view uses Jose’s credentials when it is run.

15 . Which of the following is an Execution Context? A . Execute sp_srvrolepermission

B . Execute sp_dbfixedrolepermission C . Execute sp_addrole

D . Execute AS user_name

The correct answer is D . Execute AS user_name is an Execution Context that can be used to execute an object such as a stored procedure under the permission of a particular user_name. Answers A , B , and C are not

Execution Contexts.

16 . Which of the following is captured when using CDC? A . SELECT

B . ALTER C . EXECUTE D . UPDATE

The correct answer is D . UPDATE statements are captured when using CDC. Answers A , B , and C are incorrect since these activities are not captured when using CDC.

17 . You want to prevent changes to tables in one of the databases in your SQL Server instance since changes to any of the tables can cause the associated client application to stop functioning. What can be implemented to prevent any tables from being changed?

A . A stored procedure

B . A database-level DDL trigger C . A DML trigger

D . A server-level DDL trigger

The correct answer is B . A database-level DDL trigger can be used to prevent any modifications to tables. Answer A is incorrect since stored procedures can only make DDL changes, not prevent them. Answer C is incorrect since DML triggers can only be used to fire on data INSERTS, UPDATES, and

(32)

DELETES. Answer D is incorrect since monitoring changes to tables is outside the scope of a server-level DDL trigger.

18 . Which tool is used to enable SQL Server features not automatically enabled, such as Database Mail, when SQL Server is installed.

A . SQL Server Configuration Manager B . Visual Studio

C . Surface Area Configuration Facet D . SQL Server Installation Center

The correct answer is C . In the SQL Server Management Studio at the instance level, the Surface Area Configuration Facet can be accessed and features such as DatabaseMail and CLR integration can be enabled. Answers A , B , and D are incorrect since the Surface Area Configuration Facet cannot be accessed through these tools.

19 . What is used to apply appropriate subsystem permissions to SQL Server Agent tasks?

A . Database-level roles B . Proxies

C . Server-level roles D . Credentials

The correct answer is B . Proxies can be set up to use with SQL Server to establish the appropriate permissions for the various tasks performed by SQL Server Agent job steps. Answers A and C are incorrect since permissions for SQL Server Agent tasks are not defined through either database-level or server-level roles. Answer D is incorrect since proxies are used by the SQL Server Agent. Credentials are necessary to establish the proxy but are not used directly.

20 . Which SQL Server tool is use to manage SQL Server services such as the SQL Server Agent and SQL Server Integration services?

A . Surface Area Configuration Manager Facet B . SQL Server Management Studio

C . Visual Studio

(33)

The correct answer is D . SQL Server services should always be managed through the SQL Server Configuration Manager. Answers A , B , and C are incorrect since these services cannot be accessed through these tools.

Chapter 5: Managing Data Encryption

1 . What level of protection does transparent data encryption (TDE) provide? A . Cell-level

B . File-level C . Database-level D . Drive-level

The correct answer is C . Answers A , B , and D are incorrect because TDE is designed to provide database-level specifically. Cell-level data encryption is a different method of data encryption provided by SQL Server 2008 and file-level (or EFS) and drive-level (bitLocker) are Windows features.

2 . Which of the following best describes transparent data encryption (TDE)? A . Data in specific columns is encrypted.

B . Encrypts everything, such as indexes, stored procedures, functions, keys, etc, without sacrificing security or leaking information on the disk.

C . Once data types have been changed to varbinary, everything will be encrypted.

D . Once database schemas have been changed to accommodate data encryption, everything will be encrypted.

The correct answer is B . Answer A refers to cell-level/column-level data encryption. Answers C and D are incorrect since database changes are not necessary in order to use TDE.

3 . Which edition of SQL Server 2008 offers transparent data encryption (TDE)? A . SQL Server 2008 Express

B . SQL Server 2008 Standard C . SQL Server 2998 Web D . SQL Server 2008 Enterprise

The correct answer is D . Answers A , B , and C are incorrect since TDE is only available in the Enterprise edition of SQL Server 2008.

(34)

4 . Which SQL Server permissions are required to enable transparent data encryption (TDE)?

A . Permissions associated with creating the user database. B . Permissions associated with making server-level changes.

C . Permissions associated with creating a database master key and certificate in the master database and control permissions on the user database.

D . Permissions associated with the operating system administrator’s account. The correct answer is C . Answers A , B and D are incorrect since they do not supply the appropriate level of permissions needed in order to enable TDE.

5 . The first step to enabling TDE on a database is to create a database master key (DMK). Which of the following is the correct syntax for creating a DMK? A . CREATE MASTER KEY ENCRYPTION BY PASSWORD =

‘somepassword’;

B . ALTER DATABASE tdedatabase SET ENCRYPTION ON;

C . CREATE CERTIFICATE tdeCert WITH SUBJECT = ‘tdeCertificate’; D . CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM =

AES_256 ENCRYPTION BY SERVER CERTIFICATE tdeCert; The correct answer is A . Answer B is incorrect because this is the syntax to start the encryption scan. Answer C is incorrect because this is the syntax used to create a certificate. Answer D is incorrect because this is the syntax used to create a database encryption key.

6 . It is very important to back up the Certificate with the private key once it has been created and to copy it to a secure location other than on the server that it was created on. Which of the following is the correct syntax to back up a Certificate?

A . CREATE CERTIFICATE tdeCert WITH SUBJECT = ‘tdeCertificate’; B . BACKUP CERTIFICATE tdeCert TO FILE = ‘path_to_file’ WITH

PRIVATE KEY ( FILE = ‘path_to_private_key_file’, ENCRYPTION BY PASSWORD = ‘cert password’);

C . CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER CERTIFICATE tdeCert; D . ALTER DATABASE tdedatabase SET ENCRYPTION ON;

(35)

The correct answer is B . Answer A is incorrect because this syntax is used to create a certificate initially. Answer C is incorrect because this syntax is used to create a database encryption key. Answer D is incorrect because this syntax is used to start the encryption scan.

7 . Which sys catalog view is used to monitor the progress of an encryption scan? A . Sys.configurations

B . Sys.certificates C . Sys.key_encryptions

D . Sys.dm_database_encryption_keys

The correct answer is D . Answers A , B , and C are incorrect because they will not display the progress of an encryption scan.

8 . When transparent data encryption (TDE) is enabled, which of the following system catalog views will the database show as encrypted?

A . Sys.databases B . Sys.all_objects C . Sys.all_columns D . Sys.configurations

The correct answer is A . Answers B , C , and D are incorrect because the “is_encrypted” column is not available in these system views.

9 . When transparent data encryption (TDE) is enabled, database backups are encrypted. If you cannot locate the associated Certificate and private key files, what happens to the data if you need to restore the encrypted database? A . Everything will be readable since the Certificate and private key can be

recreated.

B . The data will not be readable since the Certificate and private key files are lost.

C . Only encrypted columns will not be readable.

D . Everything will be readable once the database encryption has been turned off in the master database.

The correct answer is B . Answers A , C , and D are incorrect since the original Certificate and private key files are required to decrypt the database. It is very important to store these files in a secure location other than with the database backup to mitigate the possibility of not being able to decrypt a database.

(36)

10 . In which edition of SQL Server 2008 is cell-level encryption available? A . Only in the Enterprise edition

B . Only in the Web edition C . Only in the Workgroup edition D . All SQL Server 2008 editions

The correct answer is D . Answers A , B , and C are incorrect because cell-level encryption is not limited to only one edition of SQL Server 2008.

11 . When using cell-level encryption which data type is required in order to encrypt the data?

A . VARCHAR

B . No special data type is necessary C . BINARY

D . VARBINARY

The correct answer is D . Using the VARBINARY is required when using cell-level encryption, making answers A , B , and C incorrect.

12 . What is the query performance impact when using cell-level encryption? A . There is a positive query performance impact since there are only specific

columns that are encrypted.

B . There is a negative query performance impact since data types have to be converted from varbinary to the correct data type and primary keys and indexes are not used, resulting in full table scans.

C . There is a negative query performance impact unless TDE has been enabled.

D . There is a positive query performance impact as long as TDE has been enabled.

The correct answer is B . Answers A , C , and D are incorrect since these con-figurations would not have an impact on query performance.

13 . Cell-level encryption is best used in which of the following? A . Performance sensitive situations

B . All situations

C . Limited access control through the use of passwords situations

(37)

The correct answer is C . Answer A is incorrect and is a consideration that would result in the use of TDE. Answer B is incorrect because cell-level encryption is not recommended in all situations because of the performance impact. Answer D is incorrect because passwords are required when using cell-level encryption.

14 . Which of the following best describes the difference between symmetric and asymmetric keys?

A . An asymmetric key uses the same password to encrypt and decrypt the data and a symmetric key uses a public key to encrypt the data and a private key to decrypt the data.

B . An asymmetric key uses the same password to encrypt and decrypt the data and a symmetric key uses a private key to encrypt and a public key to decrypt the data.

C . A symmetric key uses the same password to encrypt and decrypt the data and an asymmetric key uses a public key to encrypt and a different password/private key to decrypt the data.

D . A symmetric key uses the same password to encrypt and decrypt the data and an asymmetric key uses a private key to encrypt and a different password/public key to decrypt the data.

The correct answer is C . Answers A , B , and D are incorrect because the combinations of passwords used for encrypting and decrypting do not accurately describe symmetric and asymmetric keys.

15 . Which of the following best describes EFS encryption? A . Encryption occurs at the file-level.

B . Encryption occurs at the database-level. C . Encryption occurs at the cell-level. D . Encryption occurs at the server-level.

The correct answer is A . Answers B , C , and D are incorrect because Encrypting File System (EFS) – encryption only occurs at the file-level. 16 . When you are using Encrypting File Service (EFS) with SQL Server, which

SQL server account must have access to file encryption keys encrypting any database files?

A . SQL Server agent account B . Database server, service account

(38)

C . SA account

D . SQL executive account

The correct answer is B . Answers A , C , and D are incorrect since these accounts are not used to access database files.

17 . In which of the following is EFS best used? A . Web server

B . Database server C . Workstation D . Application server

The correct answer is C . EFS is best used when the database is primarily used by a small set of users so answers A , B , and D are incorrect.

18 . Which of the following best describes SQL Server 2008 Extensible Key Management?

A . Enables third-party EKM/HSM vendors to register their modules in SQL Server

B . Enables easy management of Encrypting File System (EFS) encryption C . Enables easy creation of an EKM key with another EKM key

D . Enables easy back up of a database encryption key

The correct answer is A . Answer B is incorrect because SQL Server 2008 extensible key management does not provide the functionality to manage EFS encryption. Answer C is incorrect because an EKM key cannot be created with another EKM key so this cannot be done using EKM. Answer D is incorrect because EKM does not provide the functionality to back up a database encryption key; this is done using T-SQL.

19 . In which of the following editions of SQL Server 2008 is Extensible Key Management available?

A . Workgroup edition B . Web edition C . Enterprise edition D . Express edition

References

Related documents

The purpose of this study is to investigate the effects of VRLE on nursing students’ learning outcomes while studying human anatomy through case studies. Literature is

Such a collegiate cul- ture, like honors cultures everywhere, is best achieved by open and trusting relationships of the students with each other and the instructor, discussions

This clearly reveals that the growth in the dematerialization process was not keeping pace with the growth in the total turn over of shares in the Indian capital

Masih terdapatnya impurities pada produk yang dihasilkan seperti pada sampel 1 dan 2 yang berupa iron oxide hydroxide (FeOOH) baik dalam fasa akaganeite (β-FeOOH),

In this Delphi survey, 30 physical therapists reached consensus on the majority of items relating to the def- inition and application of Pilates exercise in people with CLBP

As  one  travels  south  on  Boulevard  the  grade  drops  significantly  and bottoms  out  at  Englewood  Avenue  before  rising  again.    To  the  north 

from the Blues Brothers Movie Think Big Band Arranged by Philippe Marillia Vocal (Aretha) Aretha F ranklin Ted White Think f.. Think Think Think you think think

If the roll is equal to or higher then the model's shooting skill then it hits and wounds as described in close combat.. If the roll was lower then the model's shooting skill then