Latest MCTS 70-432 Dumps Real Exam Download 201-210

Ensurepass

QUESTION 201

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database.

Now you are in charge of a SQL Server 2008 instance. There is a database developer who is named

UserJack.

UserJack views the definitions of all database objects in a database to read data from all user-defined tables, views, and table-valued functions. For UserJack, you have to assign the required permissions.

Besides this, you must make sure that other developers can also be given the same permissions, but this should be achieved by executing as little Transact-SQL statements as possible.

In the options below, which Transact-SQL statements should you execute?

 

A. GRANT VIEW ANY DEFINITION TO UserJack;EXEC sp_addrolemember ‘db_datareader’, ‘UserJack’;

B. CREATE ROLE Developers;GRANT CONTROL TO Developers;EXEC sp_addrolemember ‘Developers’, ‘UserJack’;

C. CREATE ROLE Developers;GRANT VIEW DEFINITION TO Developers;GRANT SELECT TO Developers;EXEC sp_addrolemember ‘Developers’, ‘UserJack’;

D. CREATE ROLE Developers;EXEC sp_addrolemember ‘sp_dbdatareader’, ‘Developers’;EXEC sp_addrolemember ‘sp_dbddladmin’, ‘Developers’;EXEC sp_addrolemember ‘Developers’, ‘UserJack’;

 

Correct Answer: C

Explanation/Reference:

1. Create ROLE: Roles are database-level securables. After you create a role, configure the databaselevel permissions of the role by using GRANT, DENY, and REVOKE. To add members to a database role, use the sp_addrolemember stored procedure.

2. VIEW DEFINITION:The VIEW DEFINITION permission lets a user see the metadata of the securable on which the permission is granted. However, VIEW DEFINITION permission does not confer access to the securable itself. For example, a user that is granted only VIEW DEFINITION permission on a table can see metadata related to the table in the sys.objects catalog view. However, without additional permissions such as SELECT or CONTROL, the user cannot read data from the table.

3. GRANT SELECT: Grants permissions on a securable to a principal.

 

 

QUESTION 202

You work as a database administrator at ABC.com. ABC.com is planning to migrate a SQL Server 2000 application to SQL Server 2008 R2.

After the migration, you want to keep an eye on the performance of the SQL Server 2008 R2 instance. You then configure a SQL server-side trace that captures the Deprecation Announcement and Deprecation

Final Support event classes.

Which two of the following best describes these two event classes respectively? (Choose two.)

 

A. The Deprecation Final Support event class reveals that a feature will be removed in the next important release of SQL Server.

B. The Deprecation Announcement event class reveals that a feature will be removed in the next important release of SQL Server.

C. The Deprecation Announcement event class reveals that a feature will be removed in an upcoming edition of SQL Server.

D. The Deprecation Final Support event class reveals that a feature will be removed in an upcoming edition of SQL Server.

 

Correct Answer: AC

Explanation/Reference:

 

 

QUESTION 203

You work as a database administrator at ABC.com. ABC.com makes use of a SQL Server 2008 R2

instance that includes an On-Line Analytical Processing (OLAP) database.

The OLAP database hosts a dimension table, named ABCClients, which has hourly information updates configured. As a result, ABCClients has a large quantity of information that is no longer used.

You have been instructed to make sure that the amount of space used by the ABCClients table is reduced with as little administrative effort as possible.

Which of the following actions should you take?

 

A. You should consider manually deleting the information that is no longer used.

B. You should consider making use of page compression.

C. You should consider making use of the Disk Cleanup Wizard.

D. You should consider making use of folder compression.

 

Correct Answer: B

Explanation/Reference:

 

 

QUESTION 204

You work as a database administrator at ABC.com. ABC.com is making use of SQL Server 2008 R2.

ABC.com has a server running an instance of SQL Server 2008 R2, which hosts a database named

ABC_Clients.

When ABC_Clients encounter numerous deadlock issues, you configure the instance’s startup parameters with the necessary trace flags and reboot the instance.

Which of the following is TRUE regarding this configuration?

 

A. It allows for the capturing of deadlock data in the SQL Server error log.

B. It allows for the capturing of deadlock data in the SQL Server event log.

C. It allows for the capturing of deadlock data in the SQL Server trace log.

D. It allows for the capturing of deadlock data in the SQL Server transaction log.

 

Correct Answer: A

Explanation/Reference:

 

 

QUESTION 205

You work as a database administrator at ABC.com. ABC.com is using a SQL Server 2008 R2 instance.

The SQL Server 2008 R2 instance contains a database named ABC_DB.

You have employed the SQL Server service to configure the FILESTREAM data container in the ABC_DB database.

Which of the following options are TRUE with regards to FILESTREAM data? (Choose all that apply.)

 

A. FILESTREAM data is not encrypted even though you have enabled transparent data encryption.

B. FILESTREAM data is only encrypted when you have transparent data encryption enabled.

C. FILESTREAM data must be stored in FILESTREAM filegroups contains file system directories instead of the files themselves.

D. FILESTREAM data must be stored in a stored procedure.

 

Correct Answer: AC

Explanation/Reference:

 

 

QUESTION 206

You work as a database administrator at ABC.com. ABC.com is using a SQL Server 2008 R2 instance.

You have been instructed to make sure that all ABC.com’s users, including managers, receive daily reports via Database Mail. You are then informed that your solution should allow for managers to receive the report as soon as possible.

Which of the following actions should you take?

 

A. You should consider configuring two separate Database Mail profiles for users and managers.

B. You should configure a Database Mail profile for users, and personally send each manager the report.

C. You should consider configuring two separate Database Mail accounts for users and managers.

D. You should consider configuring a single Database Mail profile, and sending the reports as high priority.

 

Correct Answer: B

Explanation/Reference:

Database Mail allows you to create multiple profiles within a SQL Server instance. Optionally, you can choose the profile that Database Mail uses when you send a message.

By using different profiles you can prioritize among the messages that are being sent.

 

 

QUESTION 207

You work as a database administrator at ABC.com.ABC.com makes use of SQL Server 2008 R2. ABC.com has three database servers, named ABC-SR13, ABC-SR14, and ABC-SR15, which are each running a different instance of SQL Server 2008. You have configured a database mirroring session in high-safety mode between ABC-SR13 and ABC-SR14 for an important ABC.com database. ABC-SR13 is presently configured as the principal server, while ABC-SR14 is configured as the mirror server. ABCSR15 is configured as the witness server. Which of the following is TRUE with regards to database mirroring? (Choose all that apply.)

 

A. You are able to mirror any database.

B. Mirroring of the master, msdb, tempdb, or model databases is not supported.

C. Database mirroring is not supported by the simple and bulk-logged recovery models.

D. The full, simple, and bulk-logged recovery models support database mirroring.

 

Correct Answer: BC

Explanation/Reference:

 

 

QUESTION 208

You work as a database administrator at ABC.com. ABC.com makes use of a SQL Server 2008 R2.

A database is relocated from one instance of SQL Server 2008 R2 to a different instance. A ABC.com user previously accessed the database using specific credentials, and would like to make use of those same credentials to access the database.

Which of the following actions should you take?

 

A. You should consider making use of the ALTER USER Transact-SQL statement that includes the WITH LOGIN argument.

B. You should consider making use of ALTER DATABASE Transact-SQL statement that includes the WITH LOGIN argument.

C. You should consider making use of the CREATE LOGIN Transact-SQL statement.

D. You should consider making use of the CREATE USER Transact-SQL statement.

 

Correct Answer: AExplanation/Reference:

 

 

QUESTION 209

You work as a database administrator at ABC.com. ABC.com makes use of a SQL Server 2008 R2 instance.

You have previously devised a maintenance strategy that allows for the reconstruction of indexes, as well as database integrity verification. The strategy is also configured to generate reports in the form of a text file.

You have now been instructed to configure the strategy to forward e-mails to ABC.com operators whenever the strategy is unsuccessfully implemented.

Which of the following actions should you take?

 

A. You should consider altering the Event log.

B. You should consider altering the SQL Active Directory Helper

C. You should consider altering the SQL Server Agent job.

D. You should consider altering the SQL Server Browser.

 

Correct Answer: C

Explanation/Reference:

 

 

QUESTION 210

You work as a database administrator at ABC.com. ABC.com makes use of SQL Server 2000 instance.

A current specific job is configured to retrieve a file remotely from a shared network folder via a CMDExec step. The use of the LocalSystem account has been configured for the SQL Server Agent service.

You receive an instruction to upgrade the current SQL Server instance to SQL Server 2008 R2.

Subsequent to the upgrade, you notice that the job step is unable to finish its process.

It is imperative that this issue be rectified.

Which of the following actions should you take?

 

A. You should consider reconfiguring the job step to make use of a remote System account.

B. You should consider reconfiguring the job step to make use of a Local Service account.

C. You should consider reconfiguring the job step to make use of a proxy account.

D. You should consider reconfiguring the job step to make use of a Domain account.

 

Correct Answer: C

Explanation/Reference:

 

 

Download Latest MCTS 70-432 Real Free Tests , help you to pass exam 100%.