Sunteți pe pagina 1din 203

Microsoft 70-450

70-450 PRO: Designing, Optimizing and Maintaining a


Database Administrative Solution Using Microsoft SQL
Server 2008
Practice Test
Version 10.0
Microsoft 70-450: Practice Exam
QUESTION NO: 1

CertKiller.com has hired you as a database administrator for their network. Your duties include
administering the SQL Server 2008 servers.

You receive an instruction from the CIO to implement page compression on numerous partitions in
order to save space. You need to determine what effect implementing compression will have on
the SQL Server components.

What should you identify? (Choose all that apply.)

A. Restore operations will not be affected by implementing page compression.


B. Backup operations will not be affected by implementing page compression.
C. Bulk export operations will not be affected by implementing page compression.
D. Bulk import operations will not be affected by implementing page compression.

m
E. Existing query plans will not be affected by implementing page compression.
F. Log shipping will not be affected by implementing page compression.

Answer: A,B,F
.co
Explanation:
sts
Page level or row level compression does not affect backup operations, restore operations, or log
shipping operations. These operations simply read the data or write the data to the disk. Reading
and writing functions are not affected by page level or row level compression.
lTe

Incorrect Answers:
E: Existing query plans that are used to view data on partitions will be affected by compression.
When row compression or data compression is enabled, data will be stored in different numbers of
tua

pages and number of rows. The query plans would need to be re-optimized after compression is
implemented.
Ac

QUESTION NO: 2

You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance.

You are currently planning the deployment of a new database. The database will have the
subsequent capacity requirements:45 GB for the transaction log file280 GB for the database data
file

There are approximately six 120 GB disk drives available for the database in the storage array.
CertKiller.com contains a RAID controller that supports RAID levels 0, 1, 5 and 10. The disks are
on the RAID controller. You receive an instruction from the CIO that is as follows:The transaction
log's write performance should be maximized.In the event of a drive failure, it is expected that the
"Pass Any Exam. Any Time." - www.actualtests.com 2
Microsoft 70-450: Practice Exam
database and transaction log files is protected.

You then decide to plan a storage system. You need to determine the storage configuration that
will accomplish this.

What should you identify?

A. You should consider using a RAID 1 volume as well as a RAID 5 volume.


B. You should consider using a RAID 1 volume as well as a RAID 10 volume.
C. You should consider using a RAID 3 volume as well as a RAID 5 volume.
D. You should consider using a RAID 1 volume as well as a RAID 3 volume.

Answer: A

m
QUESTION NO: 3

.co
You work as a database administrator at CertKiller.com. You are responsible for administering the
SQL Server 2008 infrastructure for CertKiller.com.
sts
During routine monitoring you discover that the instance experiences a low number of CXPACKET
waits as well as a large number of lazy writer waits. To ensure productivity you need to better the
performance of the instance.
lTe

What should you do?


tua

A. You should consider setting up the Windows System Monitoring tool to better the performance.
B. You should consider setting up the Asynchronous database mirroring to better the performance.
C. You should consider using the SQLAGENT.OUT log to better the performance.
D. You should consider setting up the software non-uniform memory access (soft-NUMA) to better
Ac

the performance.

Answer: D

QUESTION NO: 4

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases.

You receive an instruction from management to make sure that your department is prepared in the
event of a natural disaster. You thus decide to create a disaster readiness plan. You need to
determine the appropriate actions that should be included in your disaster readiness plan.

"Pass Any Exam. Any Time." - www.actualtests.com 3


Microsoft 70-450: Practice Exam
What should you do? (Choose all that apply.)

A. You should consider testing and using RAID 5 for the volume that contains the database files.
B. You should consider testing and using RAID 1 for the volume that has the operating system.
C. You should consider maintaining the system logs in a secure manner.
D. You should consider performing the recovery of a database(s) on another SQL server.
E. You should consider testing and using RAID 5 for the volume that has the operating system.
F. You should consider testing and using RAID 1 for the volume that contains the database files.

Answer: C,D

Explanation:
To ensure disaster readiness, you should maintain system logs in a secure manner and perform
recovery of a database on another SQL server. The full set of recommendations for disaster
readiness is as follows:
Ensure that your personnel are trained in restoring a database or server.

m
Have your staff test the backups and recovery sets.
Ensure that the regular database and transaction log backups are performed frequently.
Maintain system logs in a secure manner.
.co
Keep detailed records of what service packs were installed and when.
sts
Keep records of the SQL server configuration.
Perform and document the restoration of a server or database to another server.
lTe

Maintain a base-functionality script that may execute insert, update, and delete statements or a
batch of stored procedures to determine if everything is working correctly after a restore.
tua

QUESTION NO: 5

CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use
Ac

of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.

You are in the process of enabling FILESTREAM on a volume on CERTKILLER-DB01. You have
received instruction from the CIO to ensure that the volume store documents in compressed form.
You notice that volume F:\ is not formatted. You need to make sure that the volume will be able to
store documents in a compressed form.

What should you do?

A. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:8192 /C command.


B. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:8192 command.
C. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:4096 command.

"Pass Any Exam. Any Time." - www.actualtests.com 4


Microsoft 70-450: Practice Exam
D. You should execute the format F: /FS:NTFS /V:BLOBContainer/A:4096 /C command.

Answer: D

Explanation:
This command will format the volume, convert it to NTFS and then label it as BLOBContainer .
This command will also set the NTFS cluster size to 4096. It is important to note that the cluster
size must be 4096 or smaller for compression to be enabled for a volume. Finally, the /c parameter
will compress the volume. When you are storing the FILESTREAM data, you can store it on a
compressed or a non-compressed volume. The data in FILESTREAM is actually stored on the file
system. There are a number of benefits to storing the data on the file system. For instance, you
will be able to compress data with the NTFS compression capabilities. When the data is stored, it
is in compressed form and when the data is retrieved, it is decompressed.
Incorrect Answers:
A: The commands format

m
B: The commands format
C: The command format F: /FS:NTFS /V:BLOBContainer /A:4096 will not work in this scenario.
.co
This command does not use the /c switch that is required to enable compression. With the
execution of this command, only /A: drive will be formatted as a NTFS volume with a 4096 cluster
size but without any compression.
sts

QUESTION NO: 6
lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
tua

database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_DATA. During the course of the day you receive instruction from CertKiller.com to design a
RAID solution for the CK_DATA database which has high read/write activity. CertKiller.com wants
Ac

you to ensure that the I/O performance of CERTKILLER-DB01 is improved whilst ensuring that
there is fault tolerance for the database. CertKiller.com wants you to make use of the existing
resources as funds are tied to other projects.

What should you do?

A. You should consider making use of a RAID 5 solution.


B. You should consider making use of a RAID 10 solution.
C. You should consider making use of a RAID 1 solution.
D. You should consider making use of a RAID 0 solution.

Answer: A

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com 5


Microsoft 70-450: Practice Exam
In this scenario, you should use RAID 5 for CK_DATA. RAID 5 will provide good performance
throughput and prevent data loss if there is a disk failure. CK_DATA has high read/write activity,
and therefore RAID 5 will be a better choice when compared to RAID 0 and RAID 1 in terms of
data availability and data protection.
For an ideal SQL Server configuration, you should have a combination of RAID 1 and RAID 5. You
should mirror the operating system using RAID 1, and place transaction logs on a RAID 1 that is
separate from the RAID 1 that hosts the operating system. SQL Server writes data to the
transaction logs and maintains serial information of all modifications that occurred in a SQL
database. The transaction log files can be used for rollback and roll forward of information from a
SQL Server database. The SQL Server files and filegroups should be placed on a RAID 5,
because you get best performance throughput by placing database files on RAID 5 disk array.
Incorrect Answers:
B: You should not use RAID 10 in this scenario. RAID 10 is a better choice than RAID 5, but the
scenario states that you have financial constraints. RAID 10 would be more expensive than RAID
5. RAID 10 is a combination of RAID 0+1, which is known as striping with mirroring. You should

m
first mirror disks and then create a stripe set of mirrored disks. This provides high fault tolerance
for data and excellent throughput performance.
.co
C: You should not use RAID 1 in this scenario. RAID 1 is known as disk mirroring. You need a
minimum of two disks to form a RAID 1 array. One primary disk is used for read/write operations
sts
and the data is replicated to the second disk. This RAID level offers better read performance but
slower write performance. Therefore, it is not a suitable solution.
D: You should not use RAID 0 in this scenario. RAID 0 is known as disk striping. This RAID level
lTe

stripes data across disks in the array, offering better throughput on the read/write operations.
However, there is no data protection offered in this RAID level. If one disk fails, the data stored on
the disk will be lost. Therefore, this RAID level will not be a suitable solution for CK_DATA
tua

database.
Ac

QUESTION NO: 7

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_STAFF which is hosted on a RAID 5 volume. During the course of the day you receive
instruction from CertKiller.com to change the default size of the allocation unit which is set at 4096
bytes. CertKiller.com wants you to accomplish the task which having the RAID 5 volume data
assigned to Drive E: to retain is existing volume name.

What should you do?

A. You should consider making use of the format E: /A:4096 /V:Data command.
B. You should consider making use of the format E: /A:4K /V:Data command.

"Pass Any Exam. Any Time." - www.actualtests.com 6


Microsoft 70-450: Practice Exam
C. You should consider making use of the format E: /A: 64K /V:Data command.
D. You should consider making use of the format E /A:65536 /V:Data command.

Answer: C

Explanation:
When you create a RAID 5 volume, you need to format it to ensure that it is usable for storing
data. By default, the allocation unit for a logical unit number (LUN) is 4096 bytes (4 KB) on an
NTFS partition. When you are storing data with large files on a RAID 5 volume, you should change
the allocation unit to 64 KB, which is 65536 bytes. When you run execute the command format f: /
A : 64K /V: Data, you will be able to format the RAID 5 disk with a new allocation unit. In this
command, you would need to provide the volume letter, which is f: in this case, the /A :size clause
defines the allocation unit size, which is 64 KB in this scenario, and /V: is the volume name.
Incorrect Answers:
A: The format E: /A:4096 /V:Data command will work in this scenario but will result in retaining the

m
default allocation unit size, which is 4096 bytes. To keep the default allocation unit size, you can
simply run the format command without specifying the allocation unit size.
.co
B: The format E: /A:4K /V:Data command will not work in this scenario. You would be prompted
with Invalid parameter -/A:4K error. You must provide the size of the allocation unit in bytes if the
allocation unit size is below 16 KB, for instance, 8192 for 8 KB. For allocation unit sized at 16 KB
sts
and above, the value must be written in K, such as 16 KB.
D: The format E: /A:65536 /V: Data command will not work. You would be prompted with Invalid
parameter - /A:65536 error upon executing this command. You must provide the size of the
lTe

allocation unit in KB for 16, 32, and 64 KB. For the value below 16 KB, you must write the value in
bytes, for instance, 8192 for 8 KB.
tua

QUESTION NO: 8
Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_DATA which is used by an online portal for storing data. The portal is expected to receive
large numbers of queries which will require high availability for the data. CertKiller.com wants you
to meet the company requirements below:
CertKiller.com wants to have the SQL Server 2008 configuration optimized to ensure the database
remains intact even when a hard disk fails.CertKiller.com wants to have the data recovery method
to be reliable and provide faster recovery if a hard disk fails whilst ensuring database performance
is optimized.CertKiller.com wants to have the databases available even when the operating
system (OS) disk fails.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 7


Microsoft 70-450: Practice Exam
A. You should consider making use of RAID 1 for the operating system and Transaction Logs; and
RAID5 for the SQL Server files and filegroups.
B. You should consider making use of RAID 0 for the operating system and Transaction Logs; and
RAID 5 for the SQL Server files and filegroups.
C. You should consider making use of RAID 0 for the operating system; RAID 1 for the
Transaction Logs; and RAID 5 for the SQL Server files and filegroups.
D. You should consider making use of the same RAID 1 for the operating system and Transaction
Logs; and RAID 5 for the SQL Server files and filegroups.

Answer: A

Explanation:
You should configure your SQL Server 2008 implementation in the following manner:

SQL Server files: RAID 5

m
Operating System files: RAID 1
Transaction files: RAID 1
.co
To meet varying requirements for response time, data reliability, and performance, you typically
use different RAID levels depending on how you are designing the SQL Server deployment. These
sts
RAID levels are:
RAID 5: Known as Striping with Parity. The parity information is written across all disks in the
array. You need minimum of three disks to form a RAID 5 array. This RAID level offers better
lTe

read/write performance as long as all disks in the RAID 5 are present. If one disk is missing, the
read performance is degraded. RAID 5 stripes data across all disks in the array.
RAID 0: Known as Disk Striping. This RAID level stripes the data across disks in the array, offering
tua

better throughput on the read/ write operations. However, there is no data protection offered in this
RAID level. If one disk fails, the data stored on the disk will be lost.
RAID 1: Known as Disk Mirroring. You need minimum of two disks to form a RAID 1 array. One
Ac

primary disk is used for read/write operations, and the data is replicated to the second disk. This
RAID level offers better read performance and fault tolerance, but slower write performance than
RAID 0.
The scenario states that the database must be functional even if a drive fails in the system. To
meet this goal, you must have the operating system files on RAID 1. Using RAID 1, you will mirror
the operating system so that even if a disk fails, the operating system will function. The transaction
logs should be placed on a separate RAID 1 array. SQL Server writes data to the transaction logs
and maintains serial information of all the modifications that occurred in a SQL database. The
transaction log files can be used for rollback and roll forward operations from a SQL Server
database. To enhance the performance of SQL databases, you should place the transaction log
files on a dedicated RAID 1. Finally, the SQL Server files and filegroups should be placed on a
RAID 5 array to achieve the best performance throughput.
Incorrect Answers:

"Pass Any Exam. Any Time." - www.actualtests.com 8


Microsoft 70-450: Practice Exam
B: This configuration uses RAID 0 or disk striping for the operating system. If one disk fails in a
RAID 0 array, the database will no longer be online, which is contrary to the goal stated in the
scenario. However, placing the transaction logs and SQL Server files and filegroups on RAID 1
and RAID 5 is appropriate.
C: This configuration uses RAID 0 or disk striping for the operating system. If one disk fails in a
RAID 0 array, the database will no longer be online, which is contrary to the goal stated in the
scenario. However, placing the transaction logs and SQL Server files and filegroups on RAID 1
and RAID 5 is appropriate.
D: You should not use this configuration. It places the operating system and transaction logs on
the same RAID 1 disk array, and places the SQL Server files and filegroups on RAID 5. For an
appropriate configuration, you should place the operating system and transaction logs on separate
RAID 1 arrays. This provides better I/O performance and throughput because the transactions are
continuously written to the transaction logs. If there are continuous read/write operations by the
operating system on the same RAID 1, then the transaction log performance is degraded.
Therefore, it is always recommended that you place transaction logs on a separate RAID 1.

m
QUESTION NO: 9
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
sts

Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
lTe

CK_SALES. During the course of the day you receive instruction from CertKiller.com to
reconfigure the CK_SALES database for placement on the disk subsystem. CertKiller.com wants
you to place the database on the fastest I/O subsystem whilst ensuring user data is not lost when
tua

a disk failure occurs.

What should you do?


Ac

A. You should consider placing the CK_SALES database on the same RAID 1 disk as the
operating system.
B. You should consider placing the CK_SALES database on the same RAID 0 disk as the
operating system.
C. You should consider placing the CK_SALES database on a separate RAID 0 solution.
D. You should consider placing the CK_SALES database on a separate RAID 5 solution.

Answer: D

QUESTION NO: 10

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a

"Pass Any Exam. Any Time." - www.actualtests.com 9


Microsoft 70-450: Practice Exam
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a
new CK_PRODUCTS database which should meet the capacity requirements set below:
CERTKILLER-DB01 will require 175 GB for the database data file.CERTKILLER-DB01 will require
60 GB for the transaction log.

The CERTKILLER-DB01 storage array has six 200 GB disk drives available for the database
which are attached to a RAID controller supporting RAID levels 0, 1, 5 and 10. CertKiller.com
wants to have the write performance of the transaction log maximized whilst having the database
and transaction log protected from drive failure by designing the storage system.

What should you do?

A. You should consider making use of a RAID 0 volume and RAID 5 volume.
B. You should consider making use of a RAID 1 volume and RAID 5 volume.

m
C. You should consider making use of a single RAID 5 volume.
D. You should consider making use of a single RAID 10 volume.

Answer: B
.co
sts

QUESTION NO: 11
lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
tua

CK_SALES. CERTKILLER-DB01 hardware configuration is shown below:


CERTKILLER-DB01 has eight quad-core processors.CERTKILLER-DB01 has 128-GB RAM.
Ac

During the course of the day you discover that CERTKILLER-DB01 is experiencing a low number
of CXPACKET waits whilst experiencing a large number of lazy writer waits. CertKiller.com wants
you to optimize the performance of CERTKILLER-DB01.

What should you do?

A. You should consider having the software non-uniform memory access (soft-NUMA) configured.
B. You should consider having an increase configured in the maximum degree of parallelism
option.
C. You should consider having the Resource Governor configured.
D. You should consider having the Windows System Resource Manager configured.

Answer: A

"Pass Any Exam. Any Time." - www.actualtests.com 10


Microsoft 70-450: Practice Exam
Explanation:
Part 2: Design SQL Server instances. (7 Questions)

QUESTION NO: 12

You are employed as a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 database server named CERTKILLER-DB01 that consists of
four processors.

CERTKILLER-DB01 contains numerous databases which include the databases named


CK_PRODUCTS and CK_RESEARCH. The subsequent rules are applied CERTKILLER-
DB01:Four processors should be used for operations on CK_PRODUCTS.Two processors should
be used by the CK_App application for queries on the tables in CK_RESEARCH.Four processors
should be used for all imports, exports, queries or operations on the other databases located on

m
CERTKILLER-DB01.

What should you do? (Choose all that apply)


.co
A. This can be accomplished using MAXDOP in order to set the processor number to four.
sts
B. This can be accomplished using MAXDOP in order to set the processor number to two.
C. This can be accomplished using the max degree of parallelism option and setting the value to
4.
lTe

D. This can be accomplished using MAXDOP with the default value.


E. This can be accomplished using the max degree of parallelism option and setting the value to 2.
tua

Answer: B,C

Explanation:
If you do not want to use all of the installed processors in your SQL Server operations, you can
Ac

limit the use of processors by configuring the processor value to a lower number than the actual
number of processors installed. For instance, if a server has four processors and you want to use
only three for parallelism, then you should set the max degree of parallelism option to 3.
When you want to use a specific number of processors for an individual query or index operation,
you can use the MAXDOP query hint or index option to provide better control. MAXDOP overrides
the settings defined in the max degree of parallelism option.
The use of MAXDOP is limited to the execution of a query that contains the MAXDOP query hint
or index option.

Incorrect Answer:
A: If you set the max degree of parallelism option to 2, all databases on CERTKILLER-DB01 will
use only two processors, not four as required in the scenario. In this scenario, you want to use four
processors for any operations used by CK_PRODUCTS and in any other database. You can use

"Pass Any Exam. Any Time." - www.actualtests.com 11


Microsoft 70-450: Practice Exam
the following script to set CERTKILLER-DB01 to use four processors. sp_configure 'max degree of
parallelism1, 4; GO RECONFIGURE WITH OVERRIDE; GO
D: MAXDOP does not have a default value. The max degree of parallelism option has a default
value of 0, which defines the actual number of processors installed in the system for parallel
execution of queries and indexes.
E: If you use MAXDOP to set the processor number to four, all four processors will be used by the
query. As stated earlier, the use of MAXDOP is limited to the execution of query that contains the
MAXDOP query hint or index.

QUESTION NO: 13

You are employed as a database administrator at CertKiller.com. CertKiller.com currently makes


use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 hosts five databases.

m
CERTKILLER-DB01 contains two processors. You have received instruction from the CIO to make
.co
use of more than one processor for parallelism. You thus set the Show Advanced Options to 1.
You then write the subsequent code:
sp_configure 'max degree of parallelism', 6;
sts

GO
RECONFIGURE WITH OVERRIDE;
lTe

GO

You need to determine what the result will be when you execute the code above.
tua

What should you identify?

A. It will result in four processors being used.


Ac

B. It will result in three processors being used.


C. It will result in two processors being used.
D. It will result in one processor being used.

Answer: C

Explanation:
When you are using the maximum degree of parallelism, you must first set the Show Advanced
Options to 1, which was already done in the scenario. The number of processors that can be used
for all query and index operations is configured with the max degree of parallelism option, which
by default is set to 0. The default option, 0, uses the actual number of processors installed in the
system for the parallel execution plans of queries and index operations. Any non-zero numeric
value indicates the exact number of processors being used. If you specify more processors than
are installed in the system, then it will use all available processors and not return an error. In this

"Pass Any Exam. Any Time." - www.actualtests.com 12


Microsoft 70-450: Practice Exam
scenario, the server only has two processors. You configured the max degree of parallelism option
to use 6 processors. Since you do not have 6 processors, only two will be used.
If you do not want to use all of the installed processors for SQL Server, you can configure the max
degree of parallelism option to the value equal to the number of processors you wish to use. For
instance, if the server has four processors and you want to use only three for parallelism, you
should set the max degree of parallelism option to 3.
When you want to use a specific number of processors for an individual query or index operation,
you can use the MAXDOP query hint or index option to provide better control over operations than
the max degree of parallelism option. MAXDOP overrides the settings defined in the max degree
of parallelism option. The use of MAXDOP is limited to the execution of a query that contains the
MAXDOP query hint or index. For instance, if you have a query for which you want to utilize all
processors installed in the system, then you can use MAXDOP to override the max degree of
parallelism option.
SQL Server will use more than one processor, but only use the maximum of 2 processors even
though the max degree of parallelism option is set to 6. You cannot three or four processors

m
because the server only has two processors.

.co
QUESTION NO: 14
sts

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
lTe

database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com requires information about the system resources like the amount of
memory available and consumed by CERTKILLER-DB01.
tua

What should you do?

A. You should consider making use of the sys.dm_os_memory_nodes dynamic management


Ac

view.
B. You should consider making use of the sys.dm_os_sys_info dynamic management view.
C. You should consider making use of the sys.dm_os_stacks dynamic management view.
D. You should consider making use of the sys.dm_os_process_memory dynamic management
view.

Answer: B

Explanation:
This dynamic management view was introduced in SQL Server 2008. The sys.dm_os_sys_info
view provides rather simple display of physical and virtual memory available with the operating
system. This view also provides information regarding the system resources available and
consumed by SQL Server. You can also use the sys.dm_os_sys_memory view to see a detailed
view of physical memory and memory-resource notification bits, which provide the state of the

"Pass Any Exam. Any Time." - www.actualtests.com 13


Microsoft 70-450: Practice Exam
memory resource. The sys.dm_os_sys_memory view displays the memory usage in ten columns.
Some of the columns are total_phys . avail_phys ,sys _cache , and sys_hi_signal .
Incorrect Answers:
A: You should not use the sys.dm_os_memory_nodes view. This view displays information
regarding the memory nodes and the amount of physical memory reserved by SQL Server.
C: You should not use the sys.dm_os_stacks view. This view keeps track of debug data such as
outstanding allocations.
D: You should not use the sys.dm_os_process_memory view. This view is used to display
memory allocations for the SQL Server process space. For instance, you can use it to track the
number of page fault count incurred by the SQL Server process.

QUESTION NO: 15

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of

m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to select
what the recommended size of the allocation unit should be when your database is expected to
have a high number of transactions.
sts

What should you do?


lTe

A. You should consider having the allocation unit size 64 K.


B. You should consider having the allocation unit size 32 K.
C. You should consider having the allocation unit size 4096.
tua

D. You should consider having the allocation unit size 8192.

Answer: A
Ac

Explanation:
By default, the allocation unit for a logical unit number (LUN) is 4096 bytes on an NTFS partition.
When you are storing data with large files on a RAID 5 volume, you should change the allocation
unit to 64 KB, which is 65536 bytes. The format f: / A : 64K /V: Data command will allow you to
format the RAID 5 disk with a new allocation unit. In this command, you would need to provide the
volume letter, which is f: in this case. The /A :size clause defines the allocation unit size, which is
64 KB in this scenario, and /V: is the volume name.
Incorrect Answers:
B: 8192 and 32 KB are incorrect because these are not recommended options for storing large
databases with high transaction rates. However, if required, you can set the allocation unit to these
values.
C: The allocation unit size 4096 is the default size assigned to a RAID 5 volume. To be able to
change this value, you need to format the volume with a new allocation unit size.

"Pass Any Exam. Any Time." - www.actualtests.com 14


Microsoft 70-450: Practice Exam
D: 8192 and 32 KB are incorrect because these are not recommended options for storing large
databases with high transaction rates. However, if required, you can set the allocation unit to these
values.

QUESTION NO: 16

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 containing four processors with an instance that
hosts a database named CK_SALES. During the course of the day CertKiller.com decided to
configure the MAX Degree of Parallelism option set to 2. You have later created an index making
use of the MAXDOP option and set the number of processors to 3. CertKiller.com wants you to
determine what the results would be?

m
A. The current configuration would make use of one processor only.
B. The current configuration would make use of two processors by the default setting of Max
.co
Degree of Parallelism option overriding the MAXDOP option.
C. The current configuration would make use of four processors only.
D. The current configuration would make use of three processors only.
sts

Answer: D
lTe

Explanation:
The option stating that three processors will be used for index creation is correct. The number of
processors that can be used for all query and index operations are set using the Max Degree of
tua

Parallelism option, which by default is set to 0. The default option, 0, uses the actual number of
processors installed in the system for parallel execution plans for queries and index operations.
When you want to use a specific number of processors for an individual query or index operation,
you can use the MAXDOP query hint or index option to provide better control. The MAXDOP
Ac

query hint overrides the settings defined in the Max Degree of Parallelism option. The use of the
MAXDOP query hint is limited to the execution of query that contains the MAXDOP query hint or
index option. This query hint can also be used with online index creation, and allows you to restrict
the number of processors in the SQL Server 2008 server to be used in the online index creation.
During online index creation, the MAXDOP setting overrides the Max Degree of Parallelism option.
Incorrect Answers:
A: Only one processor will not be used. One processor can be used only under two conditions,
either using a MAXDOP value that overrides the Max Degree of Parallelism option, or by setting
the Max Degree of Parallelism option to 1 when MAXDOP is not used explicitly used in any of the
query or index creatio
B: The default setting for the Max Degree of Parallelism option will not override the MAXDOP
setting. MAXDOP overrides the default setting of the Max Degree of Parallelism option. Also, the
default setting for Max Degree of Parallelism option is 0, not 2

"Pass Any Exam. Any Time." - www.actualtests.com 15


Microsoft 70-450: Practice Exam
C: The option stating that all four processors will be used for index creation is incorrect. As stated
in the scenario. MAXDOP is set to use three processors.

QUESTION NO: 17

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 containing multiple processors and has an instance
that hosts a database named CK_SALES. During the course of the day you receive instruction
from CertKiller.com to create a large volume of indexes and delete older indexes whilst optimizing
CPU performance on CERTKILLER-DB01.

What should you do?

m
A. You should consider making use of the MAXDOP index option in the index statement.
B. You should consider making use of the MAXDOP index option with the ALTER INDEX
REORGANIZE statement. .co
C. You should consider setting the Max Degree of Parallelism option to 0.
D. You should consider setting the Max Degree of Parallelism option to 1.
sts

Answer: A
lTe

Explanation:
You should use the MAXDOP index option in the index statement to optimize the CPI performance
on SQL Server 2008. The number of processors that can be used for all query and index
tua

operations is set using the Max Degree of Parallelism option, which by default is set to 0. The
default option, 0, uses the actual number of processors installed in the system for parallel
execution plans for queries and index operations. When you want to use a specific number of
processors for an individual query or index operation, you can use the MAXDOP query hint or
Ac

index option to provide better control. MAXDOP overrides the settings defined in the Max Degree
of Parallelism option. The use of MAXDOP is limited to the execution of a query that contains the
MAXDOP query hint or index option. MAXDOP can also be used with online index creation, and
allows you to restrict the number of processors in the SQL Server 2008 server to be used in the
online index creation. MAXDOP overrides the Max Degree of Parallelism option with index
creation as well.
Incorrect Answers:
B: You should not set the Max Degree of Parallelism option to 1. When you set the Max Degree of
Parallelism option to 1, the parallel plan generation is suppressed. The query execution is no
longer executed in parallel, and is executed in serial. You cannot use the MAXDOP index option
with the ALTER INDEX REORGANIZE statement.
C: You should not set the Max Degree of Parallelism option to 0. This is the default value defined
for this setting. With the default value as 0, this option uses the actual number of processors

"Pass Any Exam. Any Time." - www.actualtests.com 16


Microsoft 70-450: Practice Exam
installed in the system for parallel execution plans for queries and index operations.
D: You can use the MAXDOP index option with SQL statements, such as CREATE INDEX,
ALTER INDEX REBUILD, and DROP INDEX, used for clustered indexes, ALTER TABLE ADD
(index) CONSTRAINT, and ALTER TABLE DROP CONSTRAINT, used for clustered index.

QUESTION NO: 18

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES.

CERTKILLER-DB01 has four quad-core processors and regularly experiences CPU pressure. The
users at CertKiller.com use the large mission critical database frequently, which resides on

m
CERTKILLER-DB01. During the course of the day you receive an instruction from the CIO to make
sure that the online index rebuilds does not utilize all thye CPU cycles that are available.
.co
What should you do?
sts
A. You should consider having the max degree of parallelism option configured.
B. You should consider running the Netsh utility.
C. You should consider using the Hyper-V feature on the quad-core servers.
lTe

D. You should consider configuring the Background Intelligent Transfer Service (BITS) server
extensions.
tua

Answer: A

Explanation:
Part 3: Design physical database and object placement. (15 Questions)
Ac

QUESTION NO: 19

You work as a database administrator at CertKiller.com. Your duties include administrating a SQL
Server 2008 instance. You are currently planning to deploy a new database named CK_Data to
the 2008 instance.

CK_Data will have multiple schemas as well as being subjected to regular inserts and updates. A
large amount of read-only reference information will be hosted on one of the schemas. You have
received instructions from the management to set up a physical database structure to optimize the
backup performance.

What should you do?


"Pass Any Exam. Any Time." - www.actualtests.com 17
Microsoft 70-450: Practice Exam
A. This can be accomplished by using multiple filegroups and a single log file to set up the
database.
B. This can be accomplished by using caching on the multiple data files.
C. This can be accomplished by using multiple downstream servers to create the database.
D. This can be accomplished by using the Database Engine Tuning Advisor tool to create the
database.

Answer: A

QUESTION NO: 20

You are employed as the database administrator at CertKiller.com. CertKiller.com currently makes
use of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.

m
CERTKILLER-DB01 is configured with 1024 MB of RAM, 80 GB system drive with SQL Server
.co
installed as well as a single Core2 Duo 1.6 GHz processor. CERTKILLER-DB01 hosts a database
named CK_DATA. CK_DATA contains:
One primary data fileTwo secondary data filesOne transaction log file.
sts

During routine monitoring you discover that the hard drive has only 2 GB of free space available.
You notice that the performance of CK_DATA has degraded. You have received instruction from
lTe

the CIO to optimize the performance of CK_DATA.

What should you do?


tua

A. Your best option would be to increase the memory to 2048 MB.


B. Your best option would be to add additional hard drives as well as moving the database files
Ac

across the hard drives.


C. Your best option would be to compress the hard drive in order to create more space.
D. Your best option would be to add a new processor to CERTKILLER-DB01.

Answer: B

Explanation:
It is highly recommended that for better disk I/O usage, you place the data files and log files on
different hard drives dedicated to these files. If you place all of them in the same hard drive, there
is going to be a performance bottleneck.
As a recommended practice, you should separate the database files and transaction log files on
different disks, preferably disks attached to different disk controllers. As stated in the scenario, you
have 2 GB space left in the drive that contains data and log files. To meet the required goal, you
would need to add more hard drives in the system and move the data files and transaction logs on
separate new hard drives.
"Pass Any Exam. Any Time." - www.actualtests.com 18
Microsoft 70-450: Practice Exam
Incorrect Answers:
D: Adding new processors or increasing memory will not help in this scenario. The problem is with
the hard drive free space. Adding a new processor or more RAM to the server will not resolve the
issue stated in the scenario.

QUESTION NO: 21

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 hosts a database named CK_DATA.

You are in the process of adding additional tables to CK_DATA in order to support the new
application. The additional tables will BLOBs that is greater than 1 MB. You need to maximize the
read access. At present the application makes use of a middle tier for application logic. You need

m
to determine the data type that needs to be configured for CK_DATA.

What should you do?


.co
A. You should consider configuring the varbinary(max) data that is stored in CK_DATA.
sts
B. You should consider configuring the varchar(max) data using FILESTREAM storage on an
NTFS partition.
C. You should consider configuring the varchar(max) data stored in CK_DATA.
lTe

D. You should consider configuring the varbinary(max) data using FILESTREAM storage on an
NTFS partition.
tua

Answer: D

Explanation:
You should use FILESTREAM data when you are storing BLOBs that are on the average larger
Ac

than 1MB. FILESTREAM data can take advantage of the NTFS file system and disk subsystem for
the operating system to maximize read access. FILESTREAM should be used if the applications
that you are implementing use a middle tier for application logic. FILESTREAM data must use a
datatype of varbinary ( max).
Incorrect Answers:
A: You should not store BLOBS in the database if the objects are larger than 1 MB and fast read
access is important.
B: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage.
C: You cannot use a varchar(max) datatype to store a BLOB for FILESTREAM storage.

QUESTION NO: 22

"Pass Any Exam. Any Time." - www.actualtests.com 19


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. You are responsible for a Microsoft SQL
Server 2008 server named CERTKILLER-DB01. CERTKILLER-DB01 contains two hard drives
named Drive B and Drive C. Both these drives have at least 50 GB of free space available.

CERTKILLER-DB01 has one transaction log file and three data files that contain large indexes.
You receive an instruction from the CIO to optimize performance of the database. The data files as
well as the transaction files is stored in currently stored on Drive A. Drive A also contains the
system drive where CERTKILLER-DB01 is installed. Due to budgetary constraints you are unable
to add additional hard drives on CERTKILLER-DB01.

What should you do?

A. This can be accomplished by installing a new SQL Server instance on CERTKILLER-DB01.


Thereafter the database should be moved to the new SQL Server instance.
B. This can be accomplished by placing the transaction log file on Drive B and keeping the

m
database files on the same location.
C. This can be accomplished by moving the largest data file from Drive A to Drive B and leaving
the remaining files in the same location. .co
D. This can be accomplished by moving the files to Drive B.
sts
Answer: B

Explanation:
lTe

When data is written on to a database, the transaction log file is the file that records this activity. In
most SQL Server environments, the transaction log file is one of the most used files, as it keeps
writing information based on the transactions that were either committed to the database or rolled
tua

back. As this file writes every change that occurs in the database, it needs more processing power
than the data files. Therefore, Microsoft recommends you have the transaction log on a separate
drive. Even the data files should be stored on separate drives.
Ac

It is highly recommended that for better disk I/O usage, you should place data files and log files on
different hard drives dedicated for these files. If you place all of them in the same hard drive, there
is going to be a performance bottleneck. As a recommended practice, you should separate the
database files and transaction log files on different disks, preferably disks attached to different disk
controllers. As stated in the scenario, you have 2 GB space left in the drive that contains the data
and log files. As a recommended practice, you should have data files and transaction log on
separate drives to achieve better performance throughput of the database.
Incorrect Answers:
A: You should not install a new SQL Server instance on the computer and move the database to
the new SQL Server instance. This change will not make any difference in the performance of the
database in this scenario if the database files and the log files are not separated. Installing a
second SQL Server instance will actually slow performance because you will have two instances
of SQL Server competing for resources on the same computer.
C: You should not move the biggest data file to Drive B and keep the remaining files in the same

"Pass Any Exam. Any Time." - www.actualtests.com 20


Microsoft 70-450: Practice Exam
location on Drive 0, or move all four files to Drive B. As a recommended practice, you should move
the transaction log file to a separate hard drive.
D: You should not move the biggest data file to Drive B and keep the remaining files in the same
location on Drive 0, or move all four files to Drive B. As a recommended practice, you should move
the transaction log file to a separate hard drive.

QUESTION NO: 23

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES which is accessed frequently by network users updating the CK_SALES database
records for online users. CertKiller.com wants you to monitor the transaction log activities being
performed on CERTKILLER-DB01.

m
What should you do?
.co
A. You should consider making use of the SQL Server: SQL Statistics object.
B. You should consider making use of the SQL Server: Workload Group Stats object.
sts
C. You should consider making use of the SQL Server: Databases object.
D. You should consider making use of the SQL Server: General Statistics object.
lTe

Answer: C

Explanation:
tua

The SQL Server: Databases object contains counters that help you monitor backup/restore
throughput, transaction log activities, and bulk copy operations. There are a number of counters
used for monitoring log-related activities. Some of these counters are Log Bytes Flushed/sec, Log
Cache Hit Ratio, Log Cache Reads/sec, Log File(s) Size (KB), Log Growths, and Percent Log
Ac

Used. You should not use the SQL Server: General Statistics object to monitor the transaction log
activities. Using this object, you can capture information on number of current connections to the
SQL Server.
Incorrect Answers:
A: You can also view the number of users who either connect or disconnect with the SQL Server
instance. However, this object cannot be used for monitoring transaction log activities. You should
not use the SQL Server: SQL Statistics object to monitor the transaction log activities. This object
contains counters used for monitoring the compilation and recompilations of user queries sent to
an instance of SQL Server. However, this object cannot be used for monitoring the transaction log
activities.
B: You should not use the SQL Server: Workload Group Stats object to monitor the transaction log
activities. This object contains counters that monitor the performance of the Resource Governor
Workload group. However, this object cannot be used for monitoring the transaction log activities.

"Pass Any Exam. Any Time." - www.actualtests.com 21


Microsoft 70-450: Practice Exam
D: You can also view the number of users who either connect or disconnect with the SQL Server
instance. However, this object cannot be used for monitoring transaction log activities. You should
not use the SQL Server: SQL Statistics object to monitor the transaction log activities. This object
contains counters used for monitoring the compilation and recompilations of user queries sent to
an instance of SQL Server. However, this object cannot be used for monitoring the transaction log
activities.

QUESTION NO: 24

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES which is used for an online application generating large volumes of transactions on a
daily basis including update and insert operations. During the course of the day you receive

m
instruction from CertKiller.com to make use of a number of indexes for update and insert
operations whilst optimizing the indexing operations. CertKiller.com wants you to additionally
.co
locate the indexes which are most frequently used for performing the update and insert operations.

What should you do?


sts

A. You should consider making use of the sys.dm_db_index_physical_stats view or function.


B. You should consider making use of the sys.dm_db_index_operational_stats view or function.
lTe

C. You should consider making use of the sys.dm_fts_index_population view or function.


D. You should consider making use of the sys.dm_db_index_usage_stats view or function.
tua

Answer: D

Explanation:
The sys.dm_db_index_usage_stats dynamic management view allows you to track which index is
Ac

most frequently used for update and insert operations. Using this view, you can track when an
index was last used. This view also tracks the type of indexes used for update and insert
operations. Every time an index is used for an operation such as an update, the counter of the
index in the view is incremented by one. This view is also used for tracking unused indexes, which
typically cause maintenance overhead.
If you have a performance-related concern, you can use the Database Engine Tuning Advisor to
recommend indexes for a single or multiple databases. The Database Engine Tuning Advisor can
work with different types of indexes, such as clustered or nonclustered , and to resolve unused or
potential index issues.
Incorrect Answers:
A: The sys.dm_db_index_physical_stats function is a replacement of the DBCC SHOWCONTIG
statement from the previous version of SQL Server. This function returns the defragmentation of
indexes and data. The indexes and data can be part of a specific view or a table. This function will

"Pass Any Exam. Any Time." - www.actualtests.com 22


Microsoft 70-450: Practice Exam
not be able to track indexes that are most frequently used for update and insert operations, and
therefore should not be used.
B: The sys.dm_db_index_operational_stats function can be used to obtain details of a partition of
a table or about an index. This function will not be able to track indexes that are most frequently
used for update and insert operations, and therefore should not be used.
C: The sys.dm_fts_index_population view displays only the full-text indexes that are currently in
use. Any full-text index that is not currently being used is not displayed in this view. This view will
not be able to track indexes that are most frequently used for update and insert operations, and
therefore should not be used.

QUESTION NO: 25

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a

m
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you added four disk drives to CERTKILLER-DB01 which
configuration are shown below:
.co
Disk Drive 1: 40 GB. System drive with SQL Server installed.Disk Drive 2: 40 GB. System drive
with SQL Server installed.Disk Drive 3: 60 GB. Formatted and with 35 GB free.Disk Drive 4: 60
sts

GB. Formatted with 38 GB free.


lTe

CertKiller.com plans on creating an additional database named CK_PRODUCTS which will have a
primary data file and secondary data file with one transaction log file which is expected to have
high utilization in the production environment. CertKiller.com wants you to optimize the
tua

performance of the database.

What should you do?


Ac

A. You should consider having the primary data files placed on Drive 1 and the transaction log file
on Drive 2 with the secondary data file on Drive 3.
B. You should consider having the primary data files placed on Drive 2 and the transaction log file
on Drive 3 with the secondary data file on Drive 4.
C. You should consider having the primary and secondary data files placed on Drive 2 and the
transaction log file on Drive 3.
D. You should consider having the primary and transaction log files placed on Drive 2 and the
secondary data file on Drive 3.

Answer: B

Explanation:
To meet the required goal, you should place the primary data files on Drive2, the transaction log
file on Drive3, and the secondary data file on Drive4. It is highly recommended that for better disk

"Pass Any Exam. Any Time." - www.actualtests.com 23


Microsoft 70-450: Practice Exam
I/O usage, you place data files and log files on different hard drives dedicated to these files. If you
place all of them on the same hard drive, there is going to be a performance bottleneck.
As a recommended practice, you should separate database files and transaction log files on
different disks, preferably disks attached to different disk controllers. As stated in the correct
option, you are placing these files on different hard drives, which will provide the best performance
throughput. You should avoid placing the data files and transaction log files on the same drive as
the system drive. Disk operations for SQL Server, such as reads and writes, will be competing with
reads and writes for the operating system. You should group similar I/O characteristics on
common spindles. SQL Server performance depends heavily on the I/O subsystem.

You should not have the Windows operating system and SQL Server overload a disk with I/O
traffic.
Incorrect Answers:
A: You should not place the primary data files on Drive l, the transaction log file on Drive 2, and
the secondary data file on Drive 3. Placing the primary data files on the drive that contains the

m
Windows operating system (Drivel) will cause a performance bottleneck, and is not recommended
by Microsoft. There will be high I/O usage of Drivel, which will degrade database performance.
.co
Also, in case of disk failure, both the Windows operating system and the primary data files can be
at risk if appropriate backup solutions are not in place.
sts
C: You should not place the primary and secondary data files on Drive l and the transaction log file
on Drive 2. As a recommended practice, if possible, all data files and transaction logs should be
kept on separate drives for better I/O usage of the hard drive. You get better throughput of the
lTe

hard drive when there are fewer I/O operations.


D: You should not place primary and transaction log files on Drive l and the secondary data file on
Drive 2. As a recommended practice, if possible, all data files and transaction logs should be kept
tua

on separate drives for better I/O usage of the hard drive. You get better throughput of the hard
drive when there are fewer I/O operations.
Ac

QUESTION NO: 26

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you create a partitioned data fact table which is large
requiring data to be stored across several disks.

CertKiller.com is aware of the partitioning functions which horizontally split tables based on the
value in a specific column. CertKiller.com wants you to implement a sliding window scenario
switching partitions into and out of the table whilst archiving the oldest data to improve
performance.

"Pass Any Exam. Any Time." - www.actualtests.com 24


Microsoft 70-450: Practice Exam
What should you do?

A. You should make use of the statement: ALTER PARTITION FUNCTION and MERGE RANGE.
B. You should make use of the statement: ALTER TABLE and MERGE RANGE.
C. You should make use of the statement: ALTER PARTITION FUNCTION and SPLIT RANGE.
D. You should make use of the statement: ALTER TABLE and SPLIT PARTITION.

Answer: A

Explanation:
The alter partition function statement can be used to merge or split a partition based on values.
The following partition function creates partitions:
CREATE PARTITION FUNCTION AutoPartsRangePFl ( int )AS RANGE LEFT FOR VALUES (1,
500, 1000);GO
The following function can merge the partitions between boundary values 1 and 500 and between
boundary values 500 and 1000 to create a single partition between boundary values 1 and 1000:

m
ALTER PARTITION FUNCTION AutoPartsRangePF1 ( ) MERGE RANGE (500);
Incorrect Answers:
.co
B: You cannot use the alter table statement with either split range or merge range, split range or
merge range can only be used with the alter partition function statement.
sts
C: You should not use alter partition function and split range. This would split one partition of a
partitioned table into two partitions. In this scenario, you want to combine two partitions of a
partitioned table into one partition.
lTe

D: You cannot use the alter table statement with either split range or merge range, split range or
merge range can only be used with the alter partition function statement.
tua

QUESTION NO: 27

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Ac

Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 used to test applications and packages and
CERTKILLER-DB02 with an instance that hosts a database named CK_SALES. During the course
of the day you receive instruction from CertKiller.com to move the maintenance and backup jobs
from CERTKILLER-DB01 running SQL Server 2008 Developer edition to CERTKILLER-DB02
running SQL Server 2008 Enterprise Edition. CertKiller.com is aware that the hardware of both
servers is similar.

What should you do? (Choose two)

A. You should consider making use of the sp_add_jobserver stored procedure to move the two
jobs from CERTKILLER-DB01 to CERTKILLER-DB02.
B. You should consider making use of the sp_add_jobstep stored procedure to move the two jobs
from CERTKILLER-DB01 to CERTKILLER-DB02.
"Pass Any Exam. Any Time." - www.actualtests.com 25
Microsoft 70-450: Practice Exam
C. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore
the backup on CERTKILLER-DB02.
D. You should consider making use of a Script Job on the two jobs on CERTKILLER-DB01and run
the scripts on CERTKILLER-DB02.
E. You should consider making use of the sp_add_job stored procedure to move the two jobs from
CERTKILLER-DB01 to CERTKILLER-DB02.

Answer: A,D

Explanation:
You should use Script Job as on the two jobs on CERTKILLER-DB01 and run the scripts on
CERTKILLER-DB02. You can script a current job by using the SQL Server Management Studio
(SSMS). You can highlight the job and choose Script Job as. You can script the job to a file or to
the query window for editing. Once you have scripted the job, you can run the script to create the
jobs on CERTKILLER-DB02.

m
You can use sp_add jobserver to move the jobs from CERTKILLER-DB01 to CERTKILLER-
.co
DB02. This stored procedure can be used to assign a job to run on a different server. The job must
exist on a source server. You must have a target server registered to assign a multiserver job to it.
In this scenario, CERTKILLER-DB01 has the two jobs. You must register CERTKILLER-DB02 as
sts
the target server. The following code assigns the multiserver job Backup Job Orders to
CERTKILLER-DB02:
USE msdb ;
lTe

GO
EXEC dbo.sp _add_jobserver@job_name = N' BackupJobOrders ',@ server_name =
N'CERTKILLER-DB02;
tua

GO
Incorrect Answers:
B: You should not use sp_add Jobstep to move the two jobs from CERTKILLER-DB01to
Ac

CERTKILLER-DB02. This stored procedure is used to add a step to a multistep job. This stored
procedure cannot be used to move or copy a job to another server.
C: You should not back up the msdb database on CERTKILLER-DB01and restore it on
CERTKILLER-DB02. The msdb database stores jobs, operators, alerts, and backup history. If you
backup the msdb database from one server and restore it on another server, you will overwrite any
jobs, operators or alerts that currently exist on the destination server. In this scenario, you only
wanted to copy two jobs to SQL1. You would not be able to restore the msdb database on
CERTKILLER-DB02because CERTKILLER-DB01and CERTKILLER-DB02have different builds
and different editions of SQL Server. You can only restore system databases on the same build
and same edition of SQL Server.
E: You should not use sp_addjob to move the two jobs from CERTKILLER-DB01to CERTKILLER-
DB02. This stored procedure is used to create a job. This stored procedure cannot be used to
move or copy a job to another server.

"Pass Any Exam. Any Time." - www.actualtests.com 26


Microsoft 70-450: Practice Exam

QUESTION NO: 28

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to create a
full-text index in the database containing multiple tables. CertKiller.com wants to know the amount
of full-text indexes will be created in the database.

What should you do? (Choose two)

A. You would only be able to create multiple full-text indexes per table.
B. You would only be able to create multiple full-text indexes per view created with the encryption

m
option.
C. You would only be able to create one full-text index per database.
.co
D. You would only be able to create one full-text index per view created with the encryption option.
E. You would only be able to create multiple full-text indexes per view created with the
schemabinding option.
sts
F. You would only be able to create one full-text index per table.
G. You would only be able to create one full-text index per view created with the schemabinding
option.
lTe

Answer: F,G
tua

Explanation:
For a full-text index, you must have a catalog in the database to store the full-text index. Full-text
indexes cannot be placed anywhere except in full-text catalogs. Therefore, full-text catalogs must
exist. Only one full-text index can be created per table or indexed view. An indexed view can only
Ac

be created if it the view is created with the schehabinding option. A full-text catalog can hold
multiple full-text indexes. It is highly recommended that tables and full-text indexes refer to the
same full-text catalog. There can be multiple full-text indexes per database because a database
can have multiple tables, and each table can have maximum of one full-text index. Therefore,
each database is capable of having as many full-text indexes as the number of tables it contains.
Incorrect Answers:
A: You cannot have multiple full-text indexes per view created with the encryption option. Only an
indexed view can have a full-text index. You can create an indexed view by using the
schehabinding option, not the encryption option. The encryption option hides the source code of
the view from being seen.
B: You cannot have multiple full-text indexes per view created with the encryption option. Only an
indexed view can have a full-text index. You can create an indexed view by using the
schehabinding option, not the encryption option. The encryption option hides the source code of

"Pass Any Exam. Any Time." - www.actualtests.com 27


Microsoft 70-450: Practice Exam
the view from being seen.
C: There can be only one full-text index per table, one full-test index per indexed view, and
multiple full-text indexes per database.
D: There can be only one full-text index per table, one full-test index per indexed view, and
multiple full-text indexes per database.
E: You cannot have multiple full-text indexes per view created with the encryption option. Only an
indexed view can have a full-text index. You can create an indexed view by using the
schehabinding option, not the encryption option. The encryption option hides the source code of
the view from being seen.

QUESTION NO: 29

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a

m
database server named CERTKILLER-DB01 with an instance that hosts a number of databases.
During the course of the day you receive instruction from CertKiller.com to increase the
.co
performance of the database containing several large tables. CertKiller.com wants you to make
use of partitioning to improve the performance whilst also segregate old data from the existing
queries to return faster results. CertKiller.com wants you to have the table split into multiple tables
sts

with fewer rows than parent table and equal number of columns spread across tables.
lTe

What should you do?

A. You should consider making use of hardware partitioning.


B. You should consider making use of normalization partitioning.
tua

C. You should consider making use of horizontal partitioning.


D. You should consider making use of vertical partitioning.
Ac

Answer: C

Explanation:
You should use the horizontal partitioning method to improve database performance. This method
allows you to divide a single large table into multiple smaller tables with fewer rows and an equal
number of columns. Horizontal partitioning allows you to reduce the table data depending on your
requirements. For instance, if a table contains data from the last ten years, and you frequently
access only the current year's data, you can horizontally partition the table into 12 tables. Each
table in this method would represent data for a specific year. Database performance is enhanced
because you are accessing only a specific year's data from an individual table when queries are
executed. Therefore, it provides quicker response time and enhanced data performance because
less data is scanned.
Incorrect Answers:

"Pass Any Exam. Any Time." - www.actualtests.com 28


Microsoft 70-450: Practice Exam
A: You should not use hardware partitioning. This method uses hardware architecture to improve
database performance. This method does not split the database tables to improve performance.
Two examples of hardware partitioning are multiprocessors, which execute multiple threads, and
RAID devices, which stripe data across multiple disks that are part of the RAID array.
B: You should not use normalization. This method is an example of vertical partitioning.
Normalization is used to remove redundant columns from a table. The removed columns are
moved to secondary tables. The secondary tables must be linked with the table from which you
are removing redundant columns.
D: You should not use vertical partitioning. In vertical partitioning, there are more rows and a
reduced number of columns across tables. In this method, the number of columns is reduced
across the tables when a table is split. This method also improves database performance, but as
stated in the scenario, there should be fewer rows in the tables with an equal number of columns
across tables. This method does not achieve this goal.

m
QUESTION NO: 30
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts

CK_SALES. The CK_SALES database currently has more than 11 million rows and twenty
columns. During the course of the day you receive instruction from CertKiller.com to replicate the
lTe

data to several subscribers. CertKiller.com wants you to have the data partitioned horizontally for a
transformable subscription and know what the results will be when the subscription is received
during replication.
tua

What would the result be?

A. The current subscription would result in the table having fewer rows and the columns
Ac

unchanged.
B. The current subscription would result in the table having the columns and rows unchanged.
C. The current subscription would result in the table having the rows unchanged and fewer
columns.
D. The current subscription would result in the table having fewer columns and rows.

Answer: A

Explanation:
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
able to split the table into fewer rows and the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
the same. You gain a performance benefit because you will have fewer rows to work with.
Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.

"Pass Any Exam. Any Time." - www.actualtests.com 29


Microsoft 70-450: Practice Exam
As an example, you can split the table into four different tables where each table represents data
for a specific quarter for the year. However, in this type of partitioning, the number of columns
always remains the same across multiple tables.

In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
partitioning, the columns are divided amongst multiple tables with the same number of rows.
Vertical partitioning can be of two types: normalization and row splitting. In normalization,
redundant columns are removed from the primary table and moved into secondary tables. The
redundant columns are then linked with the primary table using primary or foreign key. In row
splitting, fewer columns are retained, which means that each row contains a portion of the logical
row in the partitioned table.

QUESTION NO: 31

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
.co
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to fine tune
CERTKILLER-DB01 by reducing the size of the backup logs and logs appended with every
sts

successful backup operation whilst avoiding entry in the error log when a successful backup is
performed.
lTe

What should you do?

A. You should consider making use of the 3226 flag.


tua

B. You should consider making use of the 3625 flag.


C. You should consider making use of the 1204 flag.
D. You should consider making use of the 1222 flag.
Ac

Answer: A

Explanation:
To meet the required goal in the scenario, you should set the trace flag 3226. When you add this
flag, it has the following effects:
Successful backup entries are not added to the SQL Server error logs.
Entries are prohibited from being logged in the System event log.
Only failed backup event entries are logged.
No successful backup entries are logged.

You should ensure that no script is dependent on any successful backup entries that are logged
either in the error log or in the System event log. A trace flag can be either specific to a session or
a global trace flag. A trace flag can be switched on or off by using the dbcc traceon and dbcc

"Pass Any Exam. Any Time." - www.actualtests.com 30


Microsoft 70-450: Practice Exam
traceoff commands.
Incorrect Answers:
B: You should not set the trace flag 3625. This trace flag reduces the amount of information that is
returned in an error message.
C: You should not set the 1204 or 1222 trace flags. The only difference between the two is that the
1222 trace flag returns the output in an XML format, but the 1204 does not. The XML generated by
the 1222 trace flag contains the information on the resources and types of locks in a deadlock.
Both trace flags also return the current command that is affected by the deadlock.
D: You should not set the 1204 or 1222 trace flags. The only difference between the two is that the
1222 trace flag returns the output in an XML format, but the 1204 does not. The XML generated by
the 1222 trace flag contains the information on the resources and types of locks in a deadlock.
Both trace flags also return the current command that is affected by the deadlock.

QUESTION NO: 32

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance. CERTKILLER-DB01 is configured
to host a database named CK_SALES. The hardware configuration of CERTKILLER-DB01 is
sts

shown below:
CERTKILLER-DB01 has 64-GB of RAM.CERTKILLER-DB01 has four quad-core
lTe

processors.CERTKILLER-DB01 has several independent raid volumes.

CertKiller.com wants you to implement a transactional database on CERTKILLER-DB01 which is


tua

expected to have high volumes of INSERT, UPDATE and DELETE activities. The CertKiller.com
CIO wants you to enhance the performance of the database by maximizing bandwidth and
reducing the connection in the storage allocation structure.
Ac

What should you do?

A. The best option is to use the default.trc file for the database.
B. The best option is to use the data collector for the database.
C. The best option is to create numerous data files for the database.
D. The best option is to use the Network Load Balancing for the database.

Answer: C

QUESTION NO: 33

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a

"Pass Any Exam. Any Time." - www.actualtests.com 31


Microsoft 70-450: Practice Exam
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a
new database to CERTKILLER-DB01 which will regularly received inserts and updates.
CertKiller.com is aware that the database will have numerous schemas however, with one schema
having a huge amount of read-only reference data. CertKiller.com wants you to set up the
database structure for best possible backup performance.

What should you do?

A. The best option is to use multiple filegroups and a single log file to create the database.
B. The best option is to use the master database to create the database.
C. The best option is to use resource database and a single log file to create the database.
D. The best option is to use SQL Server registry hive and multiple filegroups to create the
database.

m
Answer: A

Explanation:
.co
Part 4: Design a migration, consolidation, and upgrade strategy. (6 Questions)
sts

QUESTION NO: 34
lTe

You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance. At present the instance makes use of a 32-bit version on a Windows
Server 2008 64-bit server.
tua

CertKiller.com has enabled the awe option. You expect the instance to get an increase in the
query actions. You have received instructions from the CIO to use the best time to migrate the
databases to a 64-bit SQL Server 2008 server without changing the hardware. To comply with the
Ac

instructions, you need to the suitable data collector type that will supply you with the necessary
data.

What should you do?

A. The best option is to use the Performance Counters collector.


B. The best option is to use the default.trc file.
C. The best option is to use the Merge Replication topology.
D. The best option is to use the Hyper-V feature.

Answer: A

"Pass Any Exam. Any Time." - www.actualtests.com 32


Microsoft 70-450: Practice Exam
QUESTION NO: 35

CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of a Microsoft SQL Server 2008 server named CERTKILLER-DB01 that contains a
number of databases.

During routine monitoring you discovered an increase in the amount of queries. You check and
discover that the performance of CERTKILLER-DB01 has degraded. To ensure that a high level of
productivity is maintained you decide to install an additional SQL Server 2008 server on the
network. After the installation you will move a number of databases from CERTKILLER-DB01 to
the new server. You should also ensure that compression is enabled in the new server. You need
to determine the appropriate SQL version that should be installed on the new server.

What should you do? (Choose all that apply.)

m
A. You should consider installing SQL Server 2008 Standard edition.
B. You should consider installing SQL Server 2008 Developer edition.
.co
C. You should consider installing SQL Server 2008 Enterprise edition.
D. You should consider installing SQL Server 2008 Express edition.
sts
Answer: B,C

Explanation:
SQL Server 2008 supports compression at row-level and page-level for both tables and indexes.
lTe

You can use the create table and create index statements to create compressed tables and
indexes. To modify the compression state of an existing table, index, or partition, you can use the
alter table or alter index statements. However, configuring row and page compression can affect
tua

the performance of your sever. When you configure row and page compression, CPU utilization is
increased, while I/O utilization and memory utilization are decreased.
Incorrect Answers:
Ac

A: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition
because these editions of SQL Server 2008 do not support compression.
D: You cannot install SQL Server 2008 Express edition or SQL Server 2008 Standard edition
because these editions of SQL Server 2008 do not support compression.

QUESTION NO: 36

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2005 (32-bit) Express for hosting databases. You are responsible for
administering a database server named CERTKILLER-DB01 with an instance that hosts a
database named CK_SALES. During the course of the day you receive instruction from
CertKiller.com to upgrade CERTKILLER-DB01 to Microsoft SQL Server 2008.

"Pass Any Exam. Any Time." - www.actualtests.com 33


Microsoft 70-450: Practice Exam
CertKiller.com wants to know which SQL Server 2008 edition CERTKILLER-DB01 can be
upgraded to from SQL Server 2005 (32-bit) Express?

A. You would be able to upgrade to SQL Server 2008 Enterprise


B. You would be able to upgrade to SQL Server 2008 Standard
C. You would be able to upgrade to SQL Server 2008 Workgroup
D. You would be able to upgrade to SQL Server 2008 Express Advanced
E. You would be able to upgrade to SQL Server 2008 Express

Answer: C,D,E

Explanation:
These are the only editions of SQL Server on the supported upgrade path from SQL Server 2005
(32-bit) Express. You cannot upgrade SQL Server 2005 to SQL Server 2008 Standard, Enterprise
, or Workgroup. If you want to use a version other than SQL Server 2008 Express or SQL Server
2008 Express Advanced, you will have to perform a clean installation, and not an upgrade. You

m
can upgrade a server running SQL Server 2005 (32-bit) Standard Edition to SQL Server 2008
Standard Edition. You can upgrade a server running SQL Server 2005 (32-bit) Enterprise Edition
to SQL Server 2008 Enterprise Edition.
.co
sts

QUESTION NO: 37
lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 64-bit for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
tua

CK_SALES. During the course of the day you receive instruction from CertKiller.com to migrate a
database from a 32-bit version of SQL Server 2005 to CERTKILLER-DB01 using SQL Server
2008 64-bit. You have successfully detached and reattached the databases from SQL Server
2005 to SQL Server 2008. CertKiller.com wants you to ensure that the database will be
Ac

successfully migrated.

What should you do?

A. You should AWE Enabled option set to 1 on CERTKILLER-DB01.


B. You should consider recreating logins and user objects in the system databases.
C. You should ensure that the databases are published in replication on SQL Server 2005.
D. You should consider having the Show Advanced Options set to 1 on CERTKILLER-DB01.

Answer: B

Explanation:
In this case, you will also need to recreate any existing logins in the three system databases:
master, msdb , and model. To be able to migrate databases from a 32-bit version of SQL Server to

"Pass Any Exam. Any Time." - www.actualtests.com 34


Microsoft 70-450: Practice Exam
a 64-bit version of SQL Server, you need to ensure that the databases are not published in the
replication on SQL Server 2005, and you need to detach the databases from the 32-bit version.
After they are detached, these databases must be attached to the 64-bit SQL Server. It is also
mandatory to re-create the user logins and user objects in the system databases: master, msdb ,
and model.
Incorrect Answers:
A: You should not set the AWE Enabled option to 1. You cannot configure AWE support on a 64-
bit platform. AWE is designed for and supported only on 32bit versions of Windows 2000 Server
and Windows Server 2003. With the help of AWE, you can allow SQL Server to access the
physical memory above the limit that is configured on the virtual memory. AWE works differently
both on Windows 2000 Server and Windows Server 2003. In Windows 2000 Server, AWE support
can only be activated when there is more physical memory than virtual memory, after which it
locks the amount of memory specified in max server memory. If max server memory limit is more
than the physical memory, all memory except 128 MB is locked. In Windows Server 2003, SQL
Server allows dynamic allocation of AWE mapped memory. AWE mapped memory can be taken

m
or returned to the operating system as and when required by SQL Server
C: You should not ensure that the databases were published in replication on SQL Server 2005.
.co
The databases from a 32-bit version of SQL Server cannot be restored to a 64-bit version of SQL
Server 2008 if they are published in the replication. The databases first must be detached from the
sts
source SQL Server and then reattached to the 64-bit SQL Server. However, you must ensure that
the databases are not published in replication. If they are published, you will not be able to migrate
them to the 64-bit SQL Server.
lTe

D: You should not set the Show Advanced Options to 1. This option would be used when you are
enabling AWE support on a 32-bit system, but it should not be enabled on a64-bit system, which is
the target of the migration in this scenario. You would also enable this option when using
tua

parallelism, which is not the case in this scenario.


Ac

QUESTION NO: 38

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2005 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to install SQL
Server 2008 Standard Edition on a new server running Windows Server 2003 64-bit.
CertKiller.com wants you to migrate the existing databases from CERTKILLER-DB01 to the new
server.

CertKiller.com wants to know which facts below are true about migrating databases to SQL Server
2008 on a 64-bit computer?

A. The migration of this type will need to have Microsoft Windows Address Windowing Extensions
(AWE) API support enabled on the 64-bit platform to take advantage of existing memory.
"Pass Any Exam. Any Time." - www.actualtests.com 35
Microsoft 70-450: Practice Exam
B. The migration of this type would require you to enable the /3gb parameter in the boot.ini file.
C. The migration of this type would be done to the Windows on Windows (WOW64) 32-bit
subsystem
D. The migration of this type would have you being able to restore database to a 64-bit version of
SQL Server 2008 if published in the replication.

Answer: C

Explanation:
With WOW64, 32-bit processes run as if they are running on the 32-bit system, not a 64-bit
system. The operating system holds a directory named SYSWOW64 under the Windows directory.
This directory holds the 32-bit files that enable a 32-bit application to run on a 64-bit system. In this
scenario, you will be able to successfully migrate 32-bit SQL Server databases to the 32-bit SQL
Server on a 64-bit system because they will be installed to the WOW64 32-bit subsystem.
Incorrect Answers:

m
A: You cannot configure Microsoft Windows Address Windowing Extensions (AWE) API support
on a 64-bit platform. AWE is supported only on the 32-bit versions of Windows 2000 Server and
.co
Windows Server 2003. With the help of AWE, you can allow SQL Server to access physical
memory above the limit configured on the virtual memory. AWE works differently on Windows
2000 Server and Windows Server 2003. In Windows 2000 Server, AWE support can only be
sts
activated when there is more physical memory than virtual memory, after which it locks the
amount of memory specified in max server memoiy. If the max server memory limit is more than
the physical memory, then all memory except 128 MB is locked. In Windows Server 2003, SQL
lTe

Server allows the dynamic allocation of AWE mapped memory. AWE mapped memory can be
taken from or returned to the operating system as required by SQL Server.
B: You will not need to enable the /3gb parameter in the boot.ini file. If you have 4 GB of memory
tua

in a system, then by default 2 GB each are split between the operating system and the installed
applications. You can reduce the amount of memory assigned to the operating system and
allocate more memory by using the /3gb parameter in the boot.ini file. However, this parameter
Ac

does not affect the migration of databases.


D: The databases from a 32-bit computer running SQL Server 2008 cannot be restored to a 64-bit
computer running SQL Server 2008 if they are published in the replication. The databases first
must be detached from the source SQL Server and then reattached to the 64-bit SQL Server.
However, you must ensure that the databases are not published in replication. If they are
published, you will not be able to migrate them to the 64-bit SQL Server. In this case, you will also
need to recreate any existing logins in the system databases: master, msdb, and model.

QUESTION NO: 39

You work as a database administrator at CertKiller.com. CertKiller.com domain is named


CertKiller.com and currently makes use of Microsoft SQL Server 2008 and Microsoft SQL Server
2005 for hosting databases. You are responsible for administering the company's database

"Pass Any Exam. Any Time." - www.actualtests.com 36


Microsoft 70-450: Practice Exam
servers. The SQL Server configuration for the database servers in the CertKiller.com domain are
shown in the exhibit below:

CertKiller.com recently partnered with Weyland Industries which has their own Active Directory
domain named weyland.com. All servers at Weyland Industries are running Windows Server 2003.
The weyland.com domain runs a mix of Microsoft SQL Server 2005 and Microsoft SQL Server

m
2008 database servers.

.co
CertKiller.com wants you to ensure that all weyland.com clients are able to make use of Kerberos
authentication when accessing database servers in the CertKiller.com domain.
sts
What should you do?

A. You should consider having the named pipes protocol disabled on the database servers in the
lTe

CertKiller.com domain.
B. You should consider having the VIA protocol enabled on the database servers in the
CertKiller.com domain.
tua

C. You should consider creating a trust relationship between the weyland.com domain and the
CertKiller.com domain.
D. You should consider having the Service Principal Name (SPN) deactivated for the database
Ac

servers in the weyland.com domain.

Answer: C

Explanation:
The weyland.com domain is in a separate forest from CertKiller.com. For Kerberos authentication
to work between domains in separate forests, a trust must exist between the two domains. The
use of Kerberos authentication with SQL Server requires a Service Principal Name (SPN)
registered with Active Directory, and a client and server that are in the same domain or have a
trust relationship between different domains. The SPN maps to the Windows account associated
with the SQL Server instance.
Incorrect Answers:
A: You should not disable the named pipes protocol. Kerberos authentication in SQL Server 2008
can be used with TCP/IP, named pipes, or shared memory protocols, as long as the client and
SQL Server have the TCP/IP network layer protocol bound to their respective network adapters.
"Pass Any Exam. Any Time." - www.actualtests.com 37
Microsoft 70-450: Practice Exam
The client and SQL Server must have the TCP/IP network layer protocol bound to the network
adapter card to use Kerberos authentication with a domain controller in an Active Directory
domain. For the client to use Kerberos authentication with a SQL Server server in an Active
Directory domain, the client must be using the same SQL Server Network Configuration protocol.
A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/IP
network if both the client and the server are using the same named pipes protocol.
B: You should not enable the VIA protocol. The VIA protocol is used with a Virtual Interface
Adapter. Enabling or disabling the VIA protocol will not allow a SQL Server to use the Kerberos
authentication. You must have a trust relationship between the domains to use Kerberos
authentication.
D: You should not deactivate the Service Principal Name (SPN) for the database servers in the
weyland.com domain. You should have the SPN registered with Active Directory to use Kerberos
authentication.

m
QUESTION NO: 40
.co
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 Reporting Services (SSRS) instance.
sts

You have received instructions from the CIO to set up an authentication method that uses SQL
Server data connections for SSRS reports, that has the following criteria: the SSRS reports should
lTe

use the Kerberos authentication protocol for communication.

What should you do?


tua

A. This can be accomplished by accessing the Active Directory directory service and register a
service principal name (SPN) the SSRS instance.
B. This can be accomplished by configuring the Roaming user profiles to make use of a domain
Ac

account.
C. This can be accomplished by configuring the VPN solution to make use of the Integrated
Security type.
D. This can be accomplished by configuring Background Intelligent Transfer Service (BITS)
settings to make use of the Secure Sockets Layer (SSL) protocol.

Answer: A

QUESTION NO: 41

CertKiller.com has hired you as a database administrator for their network. The CertKiller.com
network contains ten of Microsoft SQL servers that run either SQL Server 2008 or SQL Server
2005.

"Pass Any Exam. Any Time." - www.actualtests.com 38


Microsoft 70-450: Practice Exam

You receive an instruction from the CIO to configure a Central Management Server in order to
administer other SQL servers on the network. You need to follow the guidelines for creating
Central Management Server to accomplish this task.

What should you do? (Choose all that apply.)

A. You need to ensure that the Central Management Server is a member of the Registered
Servers group that it maintains.
B. You need to ensure that the server acting as the Central Management Server is configured to
run SQL Server 2008.
C. You need to ensure that the Central Management Server as well as the subordinate servers is
registered using Windows Authentication.
D. You need to ensure that the Central Management Server as well as the subordinate servers is
registered using SQL Server Authentication.

m
Answer: B,C

Explanation:
.co
You must ensure that the server that will act as the Central Management Server must be running
sts
SQL Server 2008. Also, the Central Management Server and subordinate servers must be
registered by using Windows Authentication. You can use Central Management Servers to
administer multiple servers simultaneously. The Central Management Server uses server groups
lTe

to maintain connection information for one or more instances of SQL Server. You can use
Transact-SQL statements or Policy-Based Management policies to administer servers in server
groups. After you configure a Central Management Server, you can create a query to display the
tua

resource usage, such as CPU and memory, on the servers that are members of the server group.
You can designate only SQL Server 2008 servers as Central Management Servers.
Incorrect Answers:
Ac

A: The option stating that the Central Management Server must be a member of the Registered
Servers group that it maintains is incorrect. The Central Management Server cannot be a member
of a group that it maintains.
D: The option stating that the Central Management Server and subordinate servers must be
registered by using SQL Server Authentication is incorrect because Central Management Servers
only support Windows Authentication.

QUESTION NO: 42

You work as a database administrator at CertKiller.com. The CertKiller.com domain is an Active


Directory domain. All SQL servers on the CertKiller.com network run SQL Servers 2008 and all
domain controllers Windows Server 2008.

"Pass Any Exam. Any Time." - www.actualtests.com 39


Microsoft 70-450: Practice Exam
You are responsible for administering the SQL servers for the organization. Due to company
growth, CertKiller.com acquires a rival company named Courseware Publishers. The newly
acquired company does not have an Active Directory domain. However, it contains a workgroup
with a SQL Server 2008 server named CERTKILLER-DB01 as well as numerous Windows XP
clients. CERTKILLER-DB01 is configured as shown in the exhibit:

m
.co
sts
lTe
tua

You receive an instruction from the CIO to incorporate computers from the Courseware Publishers
workgroup into the CertKiller.com domain. You need to ensure that CertKiller.com users make use
Ac

of Kerberos authentication in order to communicate with the SQL Server from the Courseware
Publishers workgroup.

What should you do?

A. You should consider enabling the TCP/IP protocol.


B. You should consider enabling the VIA protocol.
C. You should consider having a Service Principal Name (SPN) registered with Active Directory.
D. You should consider disabling the named pipes protocol.

Answer: C

Explanation:
You must have a Service Principal Name (SPN) registered with Active Directory for the clients of
the CertKiller.com domain to use Kerberos authentication with the SQL Server from the

"Pass Any Exam. Any Time." - www.actualtests.com 40


Microsoft 70-450: Practice Exam
Courseware Publishers workgroup. In the scenario, the SQL Server from Courseware Publishers
will become part of the CertKiller.com domain. The client and SQL Server must be a part of the
same domain or in a trusted domain to use Kerberos authentication. Once a SPN is registered,
Active Directory acts as the Key Distribution Center (KDC) in a Windows domain, and the SPN will
map to the Windows account that started the SQL Server instance. If the SPN registration fails or
is not completed, Kerberos authentication will not be used because the Windows security layer
cannot determine if a Windows account is associated with a particular SQL Server instance.
Incorrect Answers:
A: You do not have to enable the TCP/IP protocol. Kerberos authentication in SQL Server 2008
can be used with TCP/IP, named pipes, or shared memory protocols, as long as the client and
SQL Server have the TCP/IP network layer protocol bound to their respective network adapters.
The client and SQL Server must have the TCP/IP network layer protocol bound to the network
adapter card to use Kerberos authentication with a domain controller in an Active Directory
domain. For the client to use Kerberos authentication with a SQL Server server in an Active
Directory domain, the client must be using the same SQL Server Network Configuration protocol.

m
A SQL client in the same domain can use Kerberos authentication with a SQL Server on a TCP/ IP
network if both the client and the server are using the same named pipes protocol.
.co
B: You should not enable the VIA protocol. The VIA protocol is used with a Virtual Interface
Adapter. Enabling or disabling the VIA protocol will not allow a SQL server to use the Kerberos
sts
authentication. In this scenario, you must have a Service Principal Name (SPN) registered with
Active Directory.
D: You should not disable the named pipes protocol. Kerberos authentication can be used with
lTe

TCP/IP, named pipes, or shared memory protocols.


tua

QUESTION NO: 43 DRAG DROP

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
Ac

database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to ensure
that all client connections to CERTKILLER-DB01 make use of SSL if the clients support SSL
encryption. CertKiller.com additionally wants clients not supporting SSL encryption to be denied
access.

What should you do? (Choose the correct options from the left and drag them to the right)

"Pass Any Exam. Any Time." - www.actualtests.com 41


Microsoft 70-450: Practice Exam

Answer:

m
.co
sts
lTe
tua

QUESTION NO: 44

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
Ac

database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to implement
an application that will use the Service Broker service and allows workers to send sales orders to
the CK_SALES database. CertKiller.com wants the application to guarantee the sender of the
sales order will have the CK_SALES databse as the intended target since the database is not
granted special privileges by the Service Broker service. CertKiller.com wants the requirements
set below met:
The application should have the initiating service protected from sending messages to the
CK_SALES database.The application should have the target service protected from receiving
messages from the CK_SALES database.The application should have the Service Broker encrypt
messages transmitted over the network.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 42


Microsoft 70-450: Practice Exam
A. You should consider making use of Full security.
B. You should consider making use of Anonymous security.
C. You should consider making use of Windows authentication.
D. You should consider making use of Mixed Mode authentication.

Answer: B

Explanation:
Anonymous security secures the initiating service when it sends messages to an untrusted
database. Anonymous security would not protect the target service from receiving messages from
the Orders database. In this scenario, the application uses the Server Broker service to send
messages to the Orders database. Any messages sent from the application over the network to
the Orders database will be encrypted when the conversation uses Anonymous security. In this
scenario, the initiating service needs to identify the recipient of the work order, but the target
service does not need to verify the identity of the initiating service.

m
Therefore, the initiating service should run as a member of the fixed database role public in the
Orders database.
Incorrect Answers: .co
A: You should not use full security for the Service Broker service. Full security would protect the
initiating service from sending messages to the Orders database and help protect the target
sts
service from receiving messages from the Orders database. In this scenario, it is not necessary to
protect the target service from receiving messages from the Orders database.
C: You cannot set Windows authentication or Mixed Mode authentication on the Service Broker
lTe

service. Windows authentication or Mixed Mode authentication can be set on the SQL Server.
Windows authentication allows a Windows user account from a computer or domain to log on to a
SQL server.
tua

D: Mixed Mode authentication allows both a SQL server login and a Windows user account from a
computer or domain to be authenticated to SQL Anonymous and full security can work with either
Windows authentication or Mixed Mode authentication.
Ac

QUESTION NO: 45

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure
CERTKILLER-DB01 to additionally run SQL Server Report Services (SSRS) which will be used by
client applications and Web browsers connecting to CERTKILLER-DB01. CertKiller.com is aware
that the clients make use of Kerberos authentication and all use third-party Web browsers.
CertKiller.com wants you to increase the security on the network so client applications and Web
browsers only use Kerberos authentication to connect to CERTKILLER-DB01.

"Pass Any Exam. Any Time." - www.actualtests.com 43


Microsoft 70-450: Practice Exam
What should you do?

A. You should consider having the AuthenticationTypes set to RSWindowsNegotiate in the


RSWebApplication.config file
B. You should consider having the AuthenticationTypes set to RSWindowsKerberos in the
RSWebApplication.config file
C. You should consider having the AuthenticationTypes set to SWindowsNTLM in the
RSReportServer.config file
D. You should consider having the AuthenticationTypes set to RSWindowsKerberos in the
RSReportServer.config file.

Answer: D

Explanation:
You should configure the AuthenticationTypes setting to RSWindowsKerberos in the
RSReportServer.config file to ensure that all client applications and third-party Web browsers use

m
Kerberos authentication. In the RSReportServer.config file, you have the option to set the following
AuthenticationTypes settings:
.co
RSWindowsNegotiate -Allows both Kerberos and NTLM authentication.
RSWindowsKerberos - Used if you have applications that only use Kerberos authentication.
sts
RSWindowsNTLM - Used if you have applications cannot use Kerberos authentication.
Incorrect Answers:
A: If you choose RSWindowsNegotiate, an error can occur if an application is configured to use
lTe

Kerberos only, the Report Server service is configured to run under a domain user account, and
the Service Principal Name (SPN) is not registered. In this scenario, you should have
AuthenticationTypes set to RSWindowsKerberos to avoid this error.The RSWebApplication.config
tua

file is also no longer used in SQL Server 2008. The configuration settings in the
RSWebApplication.config file that were used in previous versions of SQL Server have been
moved to the RSReportServer.config file.
Ac

B: You should not make any changes in the RSWebApplication.config file. The
RSWebApplication.config file is no longer used in SQL Server 2008. The configuration settings in
the RSWebApplication.config file that were used in previous versions of SQL Server have been
moved to the RSReportServer.config file.
C: RSWindowsNTLM is used if you have applications cannot use Kerberos authentication.

QUESTION NO: 46

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to administer
the newly installed instance of SQL Server 2008 Reporting Services (SSRS). CertKiller.com wants

"Pass Any Exam. Any Time." - www.actualtests.com 44


Microsoft 70-450: Practice Exam
you to plan and design an authentication method for SSRS reports which make use of SQL Server
data connections. CertKiller.com wants you to ensure that all SSRS reports communicate to the
new instance by using the Kerberos authentication protocol.

What should you do?

A. You should consider having the default Web site on the new instance configured to use the
Secure Sockets Layer (SSL) protocol.
B. You should consider having a service principal name (SPN) registered in the Active Directory
directory service for the new SSRS instance.
C. You should consider having the default Web site on the new instance configured to use the
Integrated Security type.
D. You should consider having the application pool configured used by the default Web site to use
a domain account.

m
Answer: B

QUESTION NO: 47
.co
sts
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
lTe

CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure
CERTKILLER-DB01 to allow legacy clients to connect to CERTKILLER-DB01. The CertKiller.com
network currently has Novell NetWare clients which require access to CERTKILLER-DB01.
tua

What should you do?

A. You should consider making use of Windows Authentication Mode with named pipes network
Ac

library.
B. You should consider making use of Windows Authentication Mode with NWLink network library.
C. You should consider making use of Windows Authentication Mode with TCP/IP network library.
D. You should consider making use of Mixed mode authentication.

Answer: D

Explanation:
Users who have accounts in the Windows domain or Active Directory can be authenticated with
Kerberos authentication or NTLM authentication with Windows Authentication. Users who have
accounts created only on the SQL server, called SQL logins, can also be authenticated.
Mixed Mode is used to provide backward compatibility for legacy clients. In this scenario, Novell
NetWare clients will be authenticating to the SQL server, not Windows clients. Novell Netware,
Linux, UNIX, and other operating system clients can connect to SQL Server 2008 by creating a

"Pass Any Exam. Any Time." - www.actualtests.com 45


Microsoft 70-450: Practice Exam
SQL login for the users that need to connect. The SQL login is native only to the SQL server on
which it is created, and cannot be used in Active Directory domains. If the client has the same
network layer protocol bound to its network adapter as the SQL server and is running the same
network library or SQL Server Network Configuration protocol, the client can connect with a valid
SQL Server login account. For example, a NetWare client that has TCP/IP bound to its network
adapter and is running the shared protocol network library or SQL Server Network Configuration
protocol can connect to a SQL server that has TCP/IP bound to its network adapter and is running
the shared protocol network library or SQL Server Network Configuration protocol.
Incorrect Answers:
A: You should not configure Windows Authentication Mode on the SQL Server 2008 server.
Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the
clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware
clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server
2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not
matter whether the NetWare client and the SQL Server attempt to use Windows Authentication

m
with the same network library or SQL Server Network Configuration protocol, such as shared
protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows
.co
account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network
library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as
sts
SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security
configurations (12 Questions)
B: You should not configure Windows Authentication Mode on the SQL Server 2008 server.
lTe

Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the
clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware
clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server
tua

2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not
matter whether the NetWare client and the SQL Server attempt to use Windows Authentication
with the same network library or SQL Server Network Configuration protocol, such as shared
Ac

protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows
account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network
library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as
SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security
configurations (12 Questions)
C: You should not configure Windows Authentication Mode on the SQL Server 2008 server.
Windows Authentication mode validates a Microsoft Windows user account. In this scenario, the
clients that will be authenticating to the SQL Server are not Windows clients, but Novell Netware
clients. Novell Netware, Linux, UNIX, and other operating system clients connect to SQL Server
2008 by creating a native SQL login that cannot be used in Active Directory domains. It does not
matter whether the NetWare client and the SQL Server attempt to use Windows Authentication
with the same network library or SQL Server Network Configuration protocol, such as shared
protocol or TCP/IP. The authentication will fail because the NetWare client will not use a Windows
account to connect to the SQL Server. SQL Server 2008 no longer supports the NWLINK network

"Pass Any Exam. Any Time." - www.actualtests.com 46


Microsoft 70-450: Practice Exam
library or SQL Server Network Configuration protocol. Previous versions of SQL Server, such as
SQL Server 2000, did support the NWLINK network library. Part 2: Design instance-level security
configurations (12 Questions)

QUESTION NO: 48

You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 infrastructure.

You receive an instruction from management to implement a solution to obtain hardware


configurations regarding the amount of processors on a workstation as well as the type of
processors on the SQL Server 2008 servers. However, the CIO wants the implementation to have
the following criteria:
A central system should do the implementation and it should verify hardware configurations for

m
numerous servers. Furthermore the CIO wants it to done with the least amount of effort.

What should you do?


.co
A. You should make use of the ExecuteWQL function in order to define policies based on
sts
conditions.
B. You should make use of the Delegation of Control Wizard.
C. You should make use of the Group Policy Management Console.
lTe

D. You should make use of the Windows System Resource Manager (WSRM) feature.

Answer: A
tua

QUESTION NO: 49
Ac

You are the newly appointed database administrator at CertKiller.com. You are in the process of
installing a SQL Server 2008 server in a testing environment.

You have received instruction from the CIO to create an assembly that needs access to the file
system as well as the registry. During routine monitoring you discover that the certificate server
has failed in the test environment. You decide to register the assembly in a database named
CK_RESEARCH with the subsequent code:
CREATE ASSEMBLY CKAssembly
FROM 'C:\CKApp\CKAssembly.dll'WITH PERMISSION_SET =
EXTERNAL_ACCESS

Which should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 47


Microsoft 70-450: Practice Exam
A. You should consider using the ALTER DATABASE CK_RESEARCH SET TRUSTWORTHY
OFF statement.
B. You should consider using the ALTER DATABASE CK_RESEARCH SET
COMPATIBILITY_LEVEL = 90 statement.
C. You should consider using the ALTER DATABASE CK_RESEARCH SET TRUSTWORTHY
ON statement.
D. You should consider using the ALTER DATABASE CK_RESEARCH SET
COMPATIBILITY_LEVEL = 80 statement.

Answer: C

Explanation:
To create an assembly with either external_access or unsafe permissions, you should have the
assembly strong name signed or Authenticode signed with a certificate, or you should have the
database configured with the set trustworthy on statement. In this scenario, the certificate server

m
has failed, which may prevent the assembly from being signed by a certificate. You can use the
alter database Sales set trustworthy on statement to ensure the success of the with
PERMISSION_SET = EXTERNAL_ACCESS Statement. .co
sts
QUESTION NO: 50

CertKiller.com has hired you as a database administrator for their network. Your duties include
lTe

administrating a SQL Server 2008 database server named CERTKILLER-DB01.

You are in the process of adding an assembly to CERTKILLER-DB01. You receive an instruction
tua

from the CIO to ensure that the assembly is created with safe permissions. You should also
ensure that information is accessed from the local SQL Server databases. You thus need to
determine the best way to configure the assembly.
Ac

What should you do?

A. This can be accomplished by excluding the finalizer methods from the classes in the assembly.
B. This can be accomplished by using the SQL Server Configuration Manager in order to register
the assembly in CERTKILLER-DB01.
C. This can be accomplished by ensuring that static data members are marked as read-write in
the classes of the assembly.
D. This can be accomplished by ensuring that the assembly code is not type-safe.

Answer: A

Explanation:
The classes in the assembly cannot contain finalizer methods. A finalizer method is a method that
runs when an object of a class is removed from memory. Classes within an assembly associated

"Pass Any Exam. Any Time." - www.actualtests.com 48


Microsoft 70-450: Practice Exam
with SQL Server 2008 do not need finalizer methods, because the SQL Server runtime handles
finalization.
Incorrect Answers:
B: You should not use the SQL Server Configuration Manager to register the assembly in SQL
Server. You should use the regasm.exe to register the assembly in SQL Server.
C: The assembly should only contain static data members in its classes if they are marked as
read-only, not if they are marked as read-write. The assembly in this scenario is created with safe
permissions, but even if the assembly was created with external_access permissions, the
assembly can only contain static data members in its classes if they are marked as read-only.
D: The assembly code should be type-safe. When the common language runtime verifier is run
against the assembly, the assembly code is considered type-safe. A type-safe assembly can only
access classes at specifically defined entry points, and it can only access memory buffers that are
owned by the code.

m
QUESTION NO: 51
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are assigned a database server named
CERTKILLER-DB01.
sts

You are in the process of adding an assembly to CERTKILLER-DB01. The assembly includes the
lTe

subsequent features:The classes should not contain finalizer methods.The code should be type
safe.The static data members are marked as read-only.
tua

You have received instruction from the CIO to ensure that the assembly is able to access
environmental variables as well as the registry. You thus need to configure the appropriate
permission set should will accomplish this.
Ac

What should you do?

A. You should consider configuring the UNSAFE permission set.


B. You should consider configuring the SAFE permission set.
C. You should consider configuring the EXTERNAL_ACCESS permission set.
D. You should consider configuring the DEFAULT permission set.

Answer: C

Explanation:
The EXTERNAL_ access permission set allows the assembly to access the registry and
environmental variables, along with external system resources such as the file system, the
external network, and Web services.

"Pass Any Exam. Any Time." - www.actualtests.com 49


Microsoft 70-450: Practice Exam
Incorrect Answers:
A: You should not set the permission set on the assembly to unsafe. An assembly that has unsafe
as the permission set is considered type -unsafe. Assemblies considered type-unsafe can
potentially access memory buffers in the SQL Server that are not owned by the code of the
assembly. In the scenario, the assembly code should be type-safe.
B: You should not set the permission set on the assembly to safe. This is the default permission
set for an assembly. The assembly cannot access external resources such as the registry and
environment variables if the safe permission set is configured on the assembly.
D: You should not set the permission set on the assembly to DEFAULT. There is no permission
set for an assembly called default

QUESTION NO: 52

You work as a database administrator at CertKiller.com. You are responsible for a administering a

m
SQL Server 2008 failover cluster.

.co
You receive an instruction from the CIO to change the startup account for SQL Server. You have
to make sure that the configuration of the SQL Server will remain intact when changes are made
to the startup account. You thus need to determine the utility that you need to use to accomplish
sts

this.
lTe

What should you use?

A. Your best option would be to make use of the SQL Server Configuration Manager utility.
B. Your best option would be to make use of the Add or Remove Programs utility.
tua

C. Your best option would be to make use of the Service Control Manager utility.
D. Your best option would be to make use of the SQL Server Installation Center utility.
Ac

Answer: A

Explanation:
You should use the SQL Server Configuration Manager to change the startup account. Using SQL
Server Configuration Manger is the most appropriate method of changing the startup account. The
startup account is used for running the SQL Server services. If you change the startup account,
the services must be restarted. Without restarting, the older startup account remains tied to the
SQL Server services. After you restart the services, the new account becomes active to run the
SQL Server services. You can invoke the SQL Server Configuration Manager form Start > All
Programs > Microsoft SQL Server 2008 > Configuration Tools > SQL Server Configuration
Manager. SQL Server Configuration Manager is used for configuring services, network protocols,
and network configuration on SQL Server 2008. You can also use the Services snap-in to change
the SQL Server startup account.

"Pass Any Exam. Any Time." - www.actualtests.com 50


Microsoft 70-450: Practice Exam
Incorrect Answers:
B: You should not use Add or Remove Programs to change the startup account for SQL Server.
Add or Remove Programs is used to install software, not to configure them.
D: You should not use the SQL Server Installation Center. This snap-in is used to view the
hardware and software requirements for SQL Server 2008, view the security documentation, and
add features.

QUESTION NO: 53

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that is a member of the CertKiller.com domain.

A number of CertKiller.com clients connect to CERTKILLER-DB01 using the SQLUser account. A

m
new CertKiller.com policy states that login attempts to CERTKILLER-DB01 to be denied
You want to deny login attempts to CERTKILLER-DB01 using the SQLUser account if four user
.co
sessions created by that login are currently running.

What should you do?


sts

A. You should consider limiting the SQLUser account properties in order to permit a maximum of
four simultaneous logins on the CertKiller.com domain.
lTe

B. You should consider creating a logon trigger that will limit the SQLUser account to four
simultaneous logins.
C. You should consider setting the Max Degree of Parallelism to 3 for the SQLUser account on
tua

CERTKILLER-DB01.
D. You should consider limiting the SQLUser account properties in order to only permit four
simultaneous logins on CERTKILLER-DB01.
Ac

Answer: B

Explanation:
Logon triggers are used to audit and control server sessions. You can track login activity and
restrict logins to SQL Server.
Incorrect Answers:
A: You cannot configure the SQLUser account properties on the CertKiller.com domain to allow no
more than four simultaneous logins You can limit which computers a domain account can log on
to, but not how many times a user account can be authenticated in the domain.
C: You should not set the Max Degree of Parallelism to 3 on CERTKILLER-DB01 for the SQLUser
account. The Max Degree of Parallelism setting restricts the number of processors to use in
parallel plan execution. The Max Degree of Parallelism will not restrict a user account's
simultaneous logins.

"Pass Any Exam. Any Time." - www.actualtests.com 51


Microsoft 70-450: Practice Exam
D: You cannot configure the SQLUser account properties on CERTKILLER-DB01 to allow no more
than four simultaneous logins. There is no option to limit the number of account sessions on a
SQL Server login account.

QUESTION NO: 54

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008. You are responsible for administering a database server named
CERTKILLER-DB01 hosts a database named CK_PRODUCTS.

You detach CK_PRODUCTS for maintenance purposes. You then decide to attach
CK_PRODUCTS and grant the database the necessary permission to access resources beyond
the scope of the database. You need to find a way to accomplish this.

m
What should you do?

.co
A. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY
FULL, PAGE_VERIFY CHECKSUM command.
B. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY
sts
OFF command.
C. You should consider running the ALTER DATABASE CK_PRODUCTS SET RECOVERY
FULL, PAGE VERIFY TORN PAGE DETECTION command.
lTe

D. You should consider running the ALTER DATABASE CK_PRODUCTS SET TRUSTWORTHY
ON command.
tua

Answer: D

Explanation:
When a database is attached to a SQL Server, the database is not initially trusted and cannot
Ac

access resources beyond the scope of the database. If you explicitly mark the database
trustworthy, then you can access resources beyond the scope of the database.
Incorrect Answers:
A: You should not run either the alter database Sales set recovery full, page_verify checksum
statement or the ALTER DATABASE Sales SET RECOVERY FULL, PAGE_VERIFY
TORN_PAGE_DETECTION Statement to configure the Sales database. The recovery full option
provides full recovery after a media failure with transaction log backups. You cannot use this
option to have the database to access resources beyond the scope of the database. The
page_verify option is used to discover damaged database pages. You can set this option to
checksum or torn_page_detection. checksum calculates a checksum and compares the checksum
when the data is written to the disk. torn_page_detection is used to detect pages that have
incomplete writes of the page. Neither checksum nor torn_page_detection can be used by a
database to access resources beyond the scope of the database once it has been reattached to a

"Pass Any Exam. Any Time." - www.actualtests.com 52


Microsoft 70-450: Practice Exam
SQL Server.
B: You should not run alter database CK_PRODUCTS set trustworthy off to configure the Sales
database. This statement marks the database as untrustworthy. This is the default setting for a
database. If you attached a database to a SQL Server, it would be marked untrustworthy. In this
scenario, you must have the database marked trustworthy to access resources beyond the scope
of the database.
C: You should not run either the alter database Sales set recovery full, page_verify checksum
statement or the ALTER DATABASE Sales SET RECOVERY FULL, PAGE_VERIFY
TORN_PAGE_DETECTION Statement to configure the Sales database. The recovery full option
provides full recovery after a media failure with transaction log backups. You cannot use this
option to have the database to access resources beyond the scope of the database. The
page_verify option is used to discover damaged database pages. You can set this option to
checksum or torn_page_detection. checksum calculates a checksum and compares the checksum
when the data is written to the disk. torn_page_detection is used to detect pages that have
incomplete writes of the page. Neither checksum nor torn_page_detection can be used by a

m
database to access resources beyond the scope of the database once it has been reattached to a
SQL Server.
.co
sts
QUESTION NO: 55

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


lTe

Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. The CertKiller.com network users make use of login accounts created in Active
tua

Directory. During the course of the day you receive instruction from CertKiller.com to assign a use
named Rory Allen to add or remote linked servers. CertKiller.com wants you to ensure that Rory
Allen is part of a fixed server role which allows him to accomplish the task.
Ac

What should you do?

A. You should consider making use of the Setupadmin fixed server role.
B. You should consider making use of the DBCreator fixed server role.
C. You should consider making use of the Sysadmin fixed server role.
D. You should consider making use of the Serveradmin fixed server role.

Answer: A

Explanation:
A user with the Setupadmin role will be able to add or remove linked servers. Without having this
role assigned, a user will not be able to add or remove linked servers. A user who is part of this
role can also execute stored procedures that relate to the linked servers. Some of the stored
procedures are sp_addlinkedserver , sp_addlirikedsrvlogin , and sp_droplinkedsrvlogin . If a user

"Pass Any Exam. Any Time." - www.actualtests.com 53


Microsoft 70-450: Practice Exam
is part of the role that has higher privileges than the Setupadmin role, the user will still be able to
add or remove linked servers.
Incorrect Answers:
B: You should not add Rory Allen to the Dbcreator role because a user with Dbcreator role can
perform database related tasks on the server, such as creating or restoring a database on the
SQL Server. This role does not allow a user to add or remove a linked server.
C: You should not add Rory Allen to the Sysadmin role because even though he will be able to
add or remove linked servers, he will have higher privileges than required for this scenario. A user
with the Sysadmin role assigned can perform any task on the server. The Sysadmin role has
complete authority on the SQL Server.
D: You should not add Rory Allen to the Serveradmin role because a user with Serveradmin role
can perform server configuration related tasks on the server. This role also allows a user to gain
the privilege of shutting down the server.

m
QUESTION NO: 56
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts

CK_SALES. CertKiller.com has several developers who have created different objects in the
CK_SALES database. You are currently unsure of the permissions which were granted to different
lTe

users and roles. CertKiller.com wants you to retrieve the information for every permission or
column-exception permission in the CK_SALES database.
tua

What should you do?

A. You should consider making use of the sys.server_permissions stored procedure.


B. You should consider making use of the sp_table_privileges stored procedure.
Ac

C. You should consider making use of the sp_helprotect stored procedure.


D. You should consider making use of the sys.database_permissions stored procedure.

Answer: D

Explanation:
You can use this security catalog view to audit every permission or column-exception permission
in the Sales database. You should not use sys.server_permissions . This security catalog view can
be used to view server-level permissions. In this scenario, you need to view database level
permissions.
Incorrect Answers:
B: You should not use sp_table_privileges. This stored procedure returns a list of table
permissions for a particular table. While you can use this stored procedure to find what
permissions are given to a table, you will not be able to use this stored procedure to find what

"Pass Any Exam. Any Time." - www.actualtests.com 54


Microsoft 70-450: Practice Exam
permissions are given to other objects, such as stored procedures and user-defined functions.
C: You should not use sp_helprotect. This stored procedure will return information on user
permissions for an object in a database. However, this stored procedure will not return information
about objects that were introduced in SQL Server 2005. Microsoft recommends that you use
sys.database_permissions and fn_builtin_permissions instead of using sp_helprotect.

QUESTION NO: 57

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com has recently begun suffering resource problems in the CK_SALES
database. CertKiller.com wants you to track the client login time, user name and the status of the
session for a specific user.

m
What should you do?
.co
A. You should consider making use of the sys.dm_exec_sessions dynamic management view.
B. You should consider making use of the sys.dm_exec_requests dynamic management view.
sts
C. You should consider making use of the sys.dm_os_waiting_tasks dynamic management view.
D. You should consider making use of the sys.dm_os_schedulers dynamic management view.
lTe

Answer: A

Explanation:
tua

You should use the sys.dm_exec_sessions view to track the client login time, login name, and the
status of the session for a specific user. This view allows you to track user connections with such
detailed information as the host name, host process ID, the protocol used by the client to connect
to the SQL, Windows security ID, login user name, and the status of the session. The
Ac

sys.dm_exec_sessions , sys.dm_exec_requests and sys.dm_os_waiting_tasks can be used


together to detect deadlocks and performance bottlenecks. All three views are part of the Server
Activity collection set.
Incorrect Answers:
B: You should not use the sys.dm_exec_re quests view to track the client login time, login user
name, and the status of the session for a specific user. This view details out information related to
requests, such as the session ID to which the request is related, the start time of the request, and
the status of the request.
C: You should not use the sys.dm_os_waiting_tasks view to track the client login time, login user
name, and the status of the session for a specific user. This view is used to track the tasks held in
the queue. The tasks held in the queue are typically waiting for resources to be allocated.
D: You should not use the sys.dm_os_schedulers view to track the client login time, login user
name, and the status of the session for a specific user. This view is mainly used to view the status

"Pass Any Exam. Any Time." - www.actualtests.com 55


Microsoft 70-450: Practice Exam
of a scheduler and to track runaway tasks, if any.

QUESTION NO: 58

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to add an
assembly to CERTKILLER-DB01 which has the characteristics listed below:
The added assembly contains static data members which are marked as read-only.The added
assembly should have the classed not containing finalizer methods.The added assembly code
should be type safe

CertKiller.com is aware that the assembly needs access to data from the local CERTKILLER-

m
DB01 databases and no other external resources.CertKiller.com wants you to configure the
permission set on the assembly.
.co
What should you do?
sts
A. You should consider having the UNSAFE permission set.
B. You should consider having the DEFAULT permission set.
C. You should consider having the SAFE permission set.
lTe

D. You should consider having the EXTERNAL_ACCESS permission set.

Answer: C
tua

Explanation:
This is the default permission set for an assembly. The assembly cannot access external
resources, such as the registry and environment variables, if the safe permission set is configured
Ac

on the assembly. The safe permission set does allow the assembly to access data from the local
SQL Server database.
Incorrect Answers:
A: You should not set the permission set on the assembly to unsafe. An assembly that has unsafe
as the permission set is considered to be type-unsafe. Assemblies considered to be type-unsafe
can potentially access memory buffers in the SQL Server that are not owned by the code of the
assembly. In the scenario, the assembly code should be type-safe.
B: You should not set the permission set on the assembly to default. There is no permission set for
an assembly called default
D: You should not set the permission set on the assembly to external_access. The
external_access permission set allows the assembly to access the registry and environmental
variables, along with external system resources such as the file system, the external network, and
Web services. In this scenario, the assembly should not access any external resources.

"Pass Any Exam. Any Time." - www.actualtests.com 56


Microsoft 70-450: Practice Exam

QUESTION NO: 59

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you decide to have the permission for several roles
updated in the database in CERTKILLER-DB01. CertKiller.com wants you to create a query which
will document the privileged associated with a database role.

What should you do?

A. You should consider making use of the following T-SQL statement:


sp_helprotect null, null, "enabled"

m
B. You should consider making use of the following T-SQL statement:
SELECT pri.name, per.permission_name
FROM sys.database_permissions per
INNER JOIN sys.database_principals pri
.co
ON per.grantee principal id = pri.principal id.
sts
C. You should consider making use of the following T-SQL statement:
SELECT pri.name, per.permission_name
FROM sys.sysprotects per
lTe

INNER JOIN sys.sysprotects pri


ON per.grantee_principal_id = pri.principal_id.
D. You should consider making use of the following T-SQL statement:
tua

EXEC sp_table_privileges '%.

Answer: B
Ac

Explanation:
The sys.database_permissions security catalog view can be queried to audit every permission or
column-exception permission in a database. The above query documents the privileges
associated with a database role in a database.
Incorrect Answers:
A: The sp_helprotectstored procedure will return information on user permissions for an object in a
database. However, this stored procedure will not return information about objects that were
introduced in SQL Server 2005. Microsoft recommends that you use sys.databasepermissions and
fn_builtin_permissions instead of sp_helprotect
D: The sp_table_privileges stored procedure returns a list of table permissions for a particular
table. While you can use this stored procedure to find what permissions are given to a table, you
will not be able to use this stored procedure to find what permissions are given to other objects,
such as stored procedures and user-defined functions. Part 3: Design database, schema, and

"Pass Any Exam. Any Time." - www.actualtests.com 57


Microsoft 70-450: Practice Exam
object security parameters (3 Questions)

QUESTION NO: 60

You are employed as a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 instance named CERTKILLER-DB03.

You are in the process of planning the deployment of a third party database application to
CERTKILLER-DB03. The application will make use of stored procedures that is developed using
SQL CLR integration. You have to make sure that the application is configured to allow the
EXTERNAL_ACCESS code access security setting. To ensure productivity you need to make sure
that the application id deployed without the loss of functionality.

What should you do?

m
A. Your first step should be to make use of the peverify.exe PEVerify utility in order to confirm
whether the code meets the type-safety requirements. .co
B. Your first step should be to replace the read write non-static fields in the code with static fields.
C. Your first step should be to make use of the regasm.exe assembly registration utility in order to
sts
register the assembly on CERTKILLER-DB03 prior to deployment.
D. Your first step should be to replace the read-only static fields in the code with read write static
fields.
lTe

Answer: A
tua

QUESTION NO: 61
Ac

CertKiller.com has hired you as a database administrator for their network. Your duties include
administrating a SQL Server 2008 instance named CERTKILLER-DB01.

You are currently designing the security requirements for a new database application named
TestAPP1. TestAPP1 makes use of a code segment. The components below are contained in the
code segment:The method that is used to access the file system on a network file serverA manner
in which to access the registry on the SQL serverThe class definition that will make use of the
public static fields

SQL CLR integration is used by the code segment. It is implemented as a single assembly. You
receive an instruction from the CIO to make sure that the application is installed to CERTKILLER-
DB01.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 58


Microsoft 70-450: Practice Exam
A. Your best option would be to replace the File Server Resource Manager (FSRM).
B. Your best option would be to replace the Distributed File System (DFS) role service.
C. Your best option would be to make use of the Database Engine Tuning Advisor tool for the
assembly.
D. Your best option would be to use public static read-only fields instead of public static fields.
Thereafter the EXTERNAL_ACCESS code should be used to access security for the assembly.

Answer: D

QUESTION NO: 62

You work as a database administrator at CertKiller.com. You are responsible for managing two
Microsoft SQL Server 2008 named CERTKILLER-DB01 and CERTKILLER-DB02.

m
CertKiller.com users all use login accounts that were created in the Active Directory. A
CertKiller.com employee named Kara Lang works in the Research and Development department.
.co
You have received instruction from the CIO to track the server login of Kara Lang as part of the
securityadmin role on CERTKILLER-DB01. You need to determine the appropriate way to
accomplish this.
sts

What should you do?


lTe

A. You should consider using IS_SRVROLEMEMBER.


B. You should consider using sys.server_role_members.
C. You should consider using sp_helpsrvrolemember.
tua

D. You should consider using sp_helpsrvrole.

Answer: A
Ac

Explanation:
You should use Is_srvrolemember to determine whether the securityadmin role contains Kara
Lang's server login. To do this, you would use the following syntax:
IS_SRVROLEMEMBER ('role'[,'login'])
In this syntax, you need to first list the role that you want to check for the user name. Then, you
should add the login account to be checked. As a result, one of the three values will be returned: 0
,1 , or NULL. The value 0 signifies that user is not part of the role. The value 1 signifies that the
user is part of the role. The value NULL signifies that the either the role or the login is not valid.
In this scenario, one of the three values will be returned as a result.
Incorrect Answers:
B: The option sys.server_roIe_members should not be used in this scenario. This view displays a
row for each of the member that is part of a specific role. However, this view does not return the
SQL Server login that is part of a specific role, as desired in the scenario.
C: The option sp_helpsrvrolemember should not be used in this scenario. This stored procedure
"Pass Any Exam. Any Time." - www.actualtests.com 59
Microsoft 70-450: Practice Exam
returns the members of a SQL Server fixed server role that you specify in the syntax. However,
this stored procedure does not return the SQL Server login that is part of a specific role, as desired
in the scenario.
D: The option sp_helpsrvrole should not be used in this scenario. This stored procedure returns
the server fixed roles on a server but does not return the SQL Server login that is part of a specific
role, as desired in the scenario. Part 4: Design a security policy and an audit plan (10 Questions)

QUESTION NO: 63

You are the newly appointed database administrator at CertKiller.com. Your job function
encompasses administering a SQL Server 2008 instance.

You are in the process of implementing the security requirements for a database. The database
will be installed on an SQL Server 2008 instance. The code segment below displays the table that

m
was created in the database:

CREATE TABLE CK_Staff


.co
(
StaffID INT NOT NULL IDENTITY(1,1),
sts

JobLevel INT NOT NULL,


Salary MONEY NOT NULL,
lTe

Bonus MONEY NULL


)
tua

The table contains a column named Bonus. You have received instructions from the CIO to make
sure that Bonus has the most secure method of protection from unauthorized access

What should you do?


Ac

A. This can be accomplished by ensuring that the Job Activity Monitor tool is utilized on all
columns in the database.
B. This can be accomplished by ensuring that the NTFS file system security is utilized and access
of the database files is limited to the SQL Server 2008 Service account.
C. This can be accomplished by ensuring that the appropriate trace flags are utilized for the
database.
D. This can be accomplished by ensuring that the SQL Profiler trace is utilized.

Answer: B

QUESTION NO: 64

"Pass Any Exam. Any Time." - www.actualtests.com 60


Microsoft 70-450: Practice Exam
You are employed as the database administrator at CertKiller.com. Your job function
encompasses administering a SQL Server 2008 instance that hosts a database named
CK_SALES.

CK_SALES is used by a Web based application that processes approximately 14,000 transactions
per minute. There is a column named CKDATA in a table in CK_SALES that is only used by the
application. CKDATA stores classified information. You receive an instruction from the CIO to
make sure that the classified information is stored is a secure manner and that the usage of
memory space as well as processor time is minimized.

What should you do?

A. You should consider making use of Database snapshot.


B. You should consider making use of the Internet Information Services.
C. You should consider making use of symmetric key encryption.

m
D. You should consider making use of Key Management Service (KMS).

Answer: C .co
sts
QUESTION NO: 65

You work as a database administrator at CertKiller.com. You are responsible for administering a
lTe

SQL Server 2008 instance named CERTKILLER-DB02.

CERTKILLER-DB02 hosts a database application named CK_App. You are in the process of
tua

implementing a data security strategy for CK_App. In order to replicate the information to another
SQL server 2008 instance you need to make use of Snapshot replication. Management wants you
to make sure that the stored information is encrypted with the minimum of administrative effort.
Ac

What should you do?

A. You should consider enabling transparent data encryption for the Publisher, Distribution as well
as the Subscriber databases.
B. You should consider enabling RAID 5 for the Publisher, Distribution as well as the Subscriber
databases.
C. You should consider enabling a VPN solution on the two instances.
D. You should consider enabling an ADM file between the instances.

Answer: A

QUESTION NO: 66

"Pass Any Exam. Any Time." - www.actualtests.com 61


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. Your job function encompasses
administering a SQL Server 2008 instance that hosts a database named CK_DATA. CK_DATA
contains confidential information of the organization.

You receive an instruction from management to develop a database backup strategy for
CK_DATA. It is vital that you make sure that all backups of CK_DATA are encrypted and that
unauthorized access is prevented.

What should you do?

A. You should consider using NTFS quotas and Event Viewer tasks.
B. You should consider using NTFS quotas and Performance Monitor alerts.
C. You should consider using the Transparent database encryption.
D. You should consider using the Background Intelligent Transfer Service (BITS).

m
Answer: C

QUESTION NO: 67
.co
sts
You work as a database administrator at CertKiller.com. You are responsible for administering a
database solution.
lTe

The database solution of CertKiller.com is log-shipped for high availability purposes. The E-drive
of the database hosts the data files and the F-drive the transaction log files. You receive an
instruction from management to implement a recovery test plan for the log-shipping solution with
tua

the following criteria:


Data loss should be nominal.Data should be reliable.The secondary database should be brought
online as soon as possible.
Ac

You need to determine the first step that should be performed in the test plan in the event that the
E-drive fails.

What should you do?

A. Your first step should be to run the folder redirection against the database.
B. Your first step should be to set up offline files.
C. Your first step should be to set up the Job Activity Monitor tool on the database.
D. Your first step should be to execute the tail-log backup of the primary database.

Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com 62


Microsoft 70-450: Practice Exam
QUESTION NO: 68

CertKiller.com has employed you as a database administrator. You are responsible for
administering a SQL Server 2008 instance.

You are in the process of installing a new SQL Server 2008 Integration Services (SSIS) packages.
This package was created using the SQL Server Import and Export Wizard. The users at
CertKiller.com will use their user names as well as passwords to the external data sources. You
receive an instruction from the CIO to prevent unauthorized users access by ensuring that the
user names and passwords are protected.

What should you do?

A. The best option is to use the Windows System Monitoring tool in the SQL Server 2008 server.
B. The best option is to store the packages and manage the security in the SQL Server 2008

m
server.
C. The best option is to use the Network Service account when the packages are saved.
.co
D. The best option is to implement Internet Protocol security (IPsec).

Answer: B
sts

QUESTION NO: 69 DRAG DROP


lTe

You work as a database administrator at CertKiller.com. All servers on the CertKiller.com network
run Windows Server2008 and all client computers run Windows Vista.
tua

A new CertKiller.com policy states that the Social Security numbers (SSNs) of all CertKiller.com
users needs to be tracked. You receive an instruction from the CIO to encrypt the SSN column in
the CKStaff table to stop unauthorized users from accessing the information.
Ac

What should you configure? (Click and drag the options on the left to the column on the right, and
place them in the correct order.)

"Pass Any Exam. Any Time." - www.actualtests.com 63


Microsoft 70-450: Practice Exam

Answer:

m
.co
sts
lTe
tua
Ac

QUESTION NO: 70

You work as a database administrator at CertKiller.com. CertKiller.com has itsheadquarters in


London and branch offices in Paris, Berlin, Milan, Madrid and Stockholm. You are responsible for
managing the SQL Server 2008 servers at every office.

A large number of data replication is occurring on the main SQL Server at the London office. To
ensure productivity continues management wants you to make sure that information is encrypted
during replication without affecting the performance of the server.

What should you do?

A. You should consider using asymmetric encryption.


B. You should consider using symmetric encryption.

"Pass Any Exam. Any Time." - www.actualtests.com 64


Microsoft 70-450: Practice Exam
C. You should consider applying Transparent Data Encryption (TDE).
D. You should consider using symmetric encryption and then compress the data encryption.

Answer: B

Explanation:
In this scenario, you should use symmetric encryption for encrypting the data during replication.
Symmetric encryption is typically used for large volumes of data. There is only one key used for
encrypting and decrypting the data. Compared to asymmetric encryption, symmetric encryption is
less resource-intensive and does not affect server performance. You typically use symmetric
encryption during replication when you have large volumes of data.
Incorrect Answers:
A: You should not use asymmetric encryption for replication. This type of encryption is resource-
intensive. It uses two different keys for encrypting and decrypting information, a private key and a
public key. However, compared to the symmetric encryption, this encryption provides a higher

m
level of security.
C: You should not use TDE encryption. TDE encryption encrypts data and log files using a
.co
database encryption key (DEK) stored in the master database. This type of encryption provides
real-time encryption and decryption of data and log files. You should not use TDE encryption for
data during replication. The TDE encryption is used for static data, such as data and the log files
sts
of the database. TDE encryption will not work during replication of data.
D: You should not use symmetric encryption and then compress the data encryption because
encrypted data cannot be compressed. Therefore, this solution will not be applicable in this
lTe

situation.
tua

QUESTION NO: 71

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Ac

Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_SALES.

You have received instruction from the CIO to encrypt a number of columns in various tables in
CK_SALES without modifying the applications that is used to access the tables. You decide to
make use of Transparent Data Encryption (TDE) on the CK_SALES and execute the subsequent
steps:You create a master key.You create a certificate named SalesCert that is protected by the
master key.You create a database encryption key and protect it with the SalesCert certificate

You need to complete the encryption of CK_SALES.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 65


Microsoft 70-450: Practice Exam
A. You should run the CIPHER /E /S:C:\Program Files\Microsoft SQL
Server\MSSQL10.MSSQLSERVER\MSSQL\DATA /F CK_SALES.mdf command.
B. You should run the ATTRIB +S C:\Program Files\Microsoft SQL
Server\MSSQL10.MSSQLSERVER\MSSQL\DATA \CK_SALES.mdf command.
C. You should run the EXEC sp_dboption 'CK_SALES', 'encrypted', 'TRUE' command.
D. You should run the ALTER DATABASE CK_SALES SET ENCRYPTION ON command.

Answer: D

Explanation:
In order to use Transparent Data Encryption (TDE) on CK_SALES you must ensure each of the
following actions is performed:
Create a master key in the master database.
Create a certificate called SalesCert , which is protected by the master key.
Create a database encryption key (DEK) and protect it with the SalesCert certificate.

m
Set the database to use encryption with the alter database statement.
Incorrect Answers:
.co
A: You cannot use the sp_dboption stored procedure to set the database to use encryption. You
can use the sp_dboption to set many other database options, such as automatically creating
statistics, updating statistics, setting the database as read only, or setting the database to use torn
sts
page detection.
B: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers
database. The ATTRIB command is used to set attributes on a file. You cannot use the ATTRIB
lTe

command to set an encryption attribute. The CIPHER command can be used to encrypt a file that
is stored on an NTFS volume using EFS encryption. However, if you use the CIPHER command to
encrypt the Customers.mdf file, this file can only be viewed by the person who encrypted it. The
tua

file will not be readable to SQL Server, thus making the Customers database unusable.
C: You cannot use the ATTRIB command or CIPHER command to encrypt the Customers
database. The ATTRIB command is used to set attributes on a file. You cannot use the ATTRIB
Ac

command to set an encryption attribute. The CIPHER command can be used to encrypt a file that
is stored on an NTFS volume using EFS encryption. However, if you use the CIPHER command to
encrypt the Customers.mdf file, this file can only be viewed by the person who encrypted it. The
file will not be readable to SQL Server, thus making the Customers database unusable.

QUESTION NO: 72

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_STAFF. During the course of the day you receive instruction from CertKiller.com to prevent
the backup file of the CK_STAFF database being compromised using the script below to secure
the data:

"Pass Any Exam. Any Time." - www.actualtests.com 66


Microsoft 70-450: Practice Exam

BACKUP DATABASE [CK_STAFF]


TO DISK = N'D:\Backup\CK_Staff.bak',[CK_StaffBackup] WITH FORMAT,
MEDIANAME = 'CK_StaffBackup',
MEDIADESCRIPTION = 'media set for CK_STAFF database',
MEDIAPASSWORD = 'T3$T<1N8$T@FF'

CertKiller.com wants it so that only the backup operators know the media password to restore the
media but your concerns is with rogue users using password crackers finding the password and
restoring the data to another server. CertKiller.com wants you to secure the information.

What should you do?

A. You should consider making use of Transparent Data Encryption (TDE) to encrypt the
CK_STAFF database.

m
B. You should consider having the TCP/IP network library loaded on CERTKILLER-DB01 and
enable the Force Encryption option.
.co
C. You should consider making use of Encrypted File Service (EFS) to encrypt the CK_Staff.bak
file.
D. You should consider making use of cipher.exe to encrypt the CK_Staff.bak file.
sts

Answer: A
lTe

Explanation:
With TDE, you do not have to modify existing applications to take advantage of the encryption.
The encryption is transparent to the application, so a backup application can access the data and
tua

store it on the backup media. You are not limited in copying or moving the backup file of the
database. However, you will not be able to open the database without the database encryption
key. With TDE, a rogue user may be able to steal the backup file, but will not be able to access the
Ac

encrypted backup content without the key.


You can use the mediapassword keyword to secure a backup. When you set a password using
the mediapassword keyword, you must supply the password when restoring data from the backup
media. With any password secured system, the system is only as good as the password. If several
people share the password, then security can be compromised easily. The mediapassword
keyword will not be available in future versions of SQL Server.
Incorrect Answers:
B: You should not load the TCP/IP network library on CERTKILLER-DB01 and enable the Force
Encryption option. You can use this option with TCP/IP, shared memory, and named pipes
network libraries. You can use the Force Encryption option to secure communications from a client
to the SQL server, but you cannot use this option to encrypt a database.
C: You should not use EFS or cipher.exe to encrypt the CK_Staff.bak file. You can use Windows
Explorer or cipher.exe to encrypt a file with EFS. Only the user who encrypts the file or an
encrypted recovery agent can access the file. If you encrypted the file with EFS, then the file would

"Pass Any Exam. Any Time." - www.actualtests.com 67


Microsoft 70-450: Practice Exam
not be available to SQL Server and could not be used as a backup file. Part 5: Design an
encryption strategy (12 Questions)
D: You should not use EFS or cipher.exe to encrypt the CK_Staff.bak file. You can use Windows
Explorer or cipher.exe to encrypt a file with EFS. Only the user who encrypts the file or an
encrypted recovery agent can access the file. If you encrypted the file with EFS, then the file would
not be available to SQL Server and could not be used as a backup file. Part 5: Design an
encryption strategy (12 Questions)

QUESTION NO: 73

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure all

m
the data in the CK_SALES database whilst ensuring the requirements below are met:
CertKiller.com wants to have all the data in the CK_SALES database encrypted.CertKiller.com
.co
wants to have the application which accesses the data not to be reconfigured.CertKiller.com wants
to ensure that there is no performance concern.
sts

What should you do?

A. You should consider making use of Cell-level encryption.


lTe

B. You should consider making use of EFS encryption.


C. You should consider making use of Transparent Data Encryption (TDE).
D. You should consider making use of BitLocker encryption.
tua

Answer: C

Explanation:
Ac

With TDE. You do not have to modify existing applications to take advantage of the encryption.
The encryption is transparent to the application. In this scenario, applications that access the data
must not be reconfigured. TDE does not hurt performance as much as cell-level encryption, and it
does not affect the use of indexes and other optimization tools used by the query engine. You
should not use cell-level encryption. Cell-level encryption should be used if you need to encrypt
only a small amount of data in the database. If you need to encrypt the entire database, you
should use TDE. The granular level of encryption that cell-level encryption provides ensures that
data is not decrypted until it is used. Cell-level encryption can be configured so that users can
have individual keys for their own data. Cell-level is highly configurable, so that applications that
access data can be modified to take advantage of it.
Incorrect Answers:
A: Cell-level encryption will also slow down performance. Columns that will be encrypted must be
altered to use the varbinary data type. With encryption, the original value of the data will have a

"Pass Any Exam. Any Time." - www.actualtests.com 68


Microsoft 70-450: Practice Exam
different value after encryption. Any referential constraints such as primary keys, foreign keys, and
unique keys will be affected by the encrypted values. Any indexes on the encrypted columns will
no longer use index scans, but table scans, thus affecting performance. In this scenario,
performance is a concern. Cell-level encryption may require that applications be modified to take
advantage of the encryption. With TDE, the applications do not need to be reconfigured.
B: You should not use EFS encryption. This type of encryption is used to encrypt individual files
and directories on an NTFS volume. EFS encryption can be used in conjunction with BitLocker
encryption to secure volumes, directories, and files on a Window Server 2008 server.
D: You should not use BitLocker encryption. This type of encryption is used to encrypt an entire
NTFS volume. BitLocker encryption can be used to protect a volume from being viewed after it is
stolen from a server. This type of encryption cannot be used to encrypt data in a database unless
the data is stored outside the SQL server such as FILESTREAM storage.

QUESTION NO: 74

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to create a
sts

policy prohibiting enabling Database Mail and SQL Mail on CERTKILLER-DB01. CertKiller.com
additionally wants the policy which requires all new views to enable Database Mail on a newly
lTe

added server whilst being able to create views in the CK_ORDERS database which are not
encrypted.
tua

What should you do?

A. You should consider having the facet to Database Options set.


B. You should consider having the MSSQL Server service restarted.
Ac

C. You should consider having the Expression for the condition set to @Name=CK_ORDERS.
D. You should consider having Encrypt View policy enabled.

Answer: D

QUESTION NO: 75

You are employed as the database administrator at CertKiller.com. Your job function
encompasses administering a SQL Server 2008 instance that hosts a database named
CK_SALES.

CK_SALES is used by a Web based application that processes approximately 18,000 transactions
per minute. There is a column in a table in CK_SALES that is only used by the application. The

"Pass Any Exam. Any Time." - www.actualtests.com 69


Microsoft 70-450: Practice Exam
column stores classified information. You receive an instruction from the CIO to make sure that the
classified information is stored is a secure manner and that the usage of memory space as well as
processor time is minimized.

What should you do?

A. You should consider making use of Point-to-Point Tunneling Protocol (PPTP).


B. You should consider making use of Layer Two Tunneling Protocol (L2TP).
C. You should consider making use of Secure Socket Tunneling Protocol (SSTP).
D. You should consider making use of symmetric key encryption.

Answer: D

QUESTION NO: 76

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_ORDERS. During the course of the day you receive instruction from CertKiller.com to apply
sts
real-time encryption to the CK_ORDERS database and log files whilst being able to encrypt the
backup copy of the database.
lTe

What should you do?

A. You should consider making use of the Encrypting File System (EFS).
tua

B. You should consider making use of Transparent Data Encryption (TDE).


C. You should consider making use of asymmetric encryption.
D. You should consider making use of symmetric encryption.
Ac

Answer: B

Explanation:
TDE encryption encrypts data and log files using a database encryption key (DEK) stored in the
master database. This type of encryption provides real-time encryption and decryption of data and
log files.
Incorrect Answers:
A: You should not use EFS encryption. This type of encryption is used to encrypt files on an NTFS
partition. If a file is encrypted, only the user who encrypted the file or the recovery agent can
decrypt the file. If you encrypt the backup file, then the SQL Server 2008 server will not be able to
access the database file, since the account that the SQL Server runs under did not encrypt the
backup file.
C: You should not use asymmetric encryption. This type of encryption is resource-intensive. It
uses two different keys: a private key and a public key for encrypting and decrypting information.

"Pass Any Exam. Any Time." - www.actualtests.com 70


Microsoft 70-450: Practice Exam
However, compared to the symmetric replication, this encryption provides a higher level of
security. Asymmetric encryption will not provide real-time encryption and decryption of data and
log files.
D: You should not use symmetric encryption. Symmetric encryption is typically used for large
volumes of data. There is only one key used for encrypting and decrypting the data. Compared to
asymmetric encryption, symmetric encryption is less resource-intensive and does not affect the
server performance. You typically use symmetric encryption during replication when you have
large volumes of data. Symmetric encryption will not provide real-time encryption and decryption
of data and log files.

QUESTION NO: 77

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a

m
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to add a
.co
column to the CK_PRODUCTS table in the CK_SALES database which will keep a PDF diagram
of the products. CertKiller.com is aware that some PDF files are larger than 2 GB. CertKiller.com
wants you to ensure that the requirements set below are met:
sts

CertKiller.com wants to have the PDF files stored in the files system outside the SQL
server.CertKiller.com wants to have the disk drive containing the PDF files protected from
lTe

theft.CertKiller.com wants to have FILESTREAM storage sued with the column.

What should you do? (Choose two)


tua

A. You should consider making use of Transparent Data Encryption.


B. You should consider making use of BitLocker encryption.
C. You should consider having the CK_PRODUCTS table altered to include a new column as an
Ac

ntext data type.


D. You should consider having the CK_PRODUCTS table altered to include a new column as a
varbinary(max) data type.
E. You should consider having the CK_PRODUCTS table altered to include a new column as an
image data type.

Answer: B,D

Explanation:
FILESTREAM storage uses the varbinary ( max) data type on a column for Binary Large Objects
(BLOB)s stored in the file system for example, the large PDF files that are stored outside SQL
Server. When BLOBs are stored in the file system, the standard varbinary ( max) data type
limitation of 2 GB does not apply. You can support PDF files even if they are over 2 GB in size.

"Pass Any Exam. Any Time." - www.actualtests.com 71


Microsoft 70-450: Practice Exam
Incorrect Answers:
A: You should not use Transparent Data Encryption (TDE). TDE is used to encrypt a database,
but TDE cannot encrypt FILESTREAM data. The new column of the MaintenanceRecords table
uses a FILESTREAM data type. FILESTREAM data is stored outside the database and cannot be
encrypted with TDE.
C: You should use BitLocker encryption to protect the volume that contains the PDF files.
BitLocker encryption provides full volume encryption for Windows Vista and Windows Server 2008
and protection against the physical theft of a hard drive. BitLocker encrypts all user and system
files in the operating system volume. Once you have encrypted the volume that contains the
operating system with BitLocker, you can use BitLocker to encrypt the other volumes. BitLocker
can use the security capabilities of computers that have a Trusted Platform Module (TPM) version
1.2 to ensure that data is accessible only if the encrypted disk is located in the original computer
and the computer's boot components have not been altered.
E: You should not alter the MaintenanceRecords table to include a new column as an ntext data
type or as an image data type. An image data type can support storage of up to 2 GB and an ntext

m
data type can support storage of up to 1 GB. To support FILESTREAM storage, you must use a
varbinary (max) data type on the column for the PDF files.You cannot use an ntext data type or an
.co
image data type for FILESTREAM storage.FILESTREAM data in a table is secured with
permissions that are granted at the table or column levels inside the SQL server database.
sts
Although the data is stored outside SQL server on a NTFS volume, the account under which the
SQL Server service account runs is the only account that is granted NTFS permissions to the
FILESTREAM data. SQL Server restricts access to the volumes and files that make up the
lTe

FILESTREAM data containers. T-SQL transactions and OpenSqIFilestream APIs are allowed to
access the FILESTREAM data.
tua

QUESTION NO: 78

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Ac

Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure the
data in the CK_SALES database whilst ensuring the conditions below are met:
When securing the data only a small percent of data in the CK_SALES database requires
encryption.When securing the data no data will be stored outside the SQL Server
database.CertKiller.com has the application custom designed to access the data.When securing
the data performance is of no concern but security of the data is.

What should you do?

A. You should consider making use of Call-level encryption.


B. You should consider making use of EFS encryption.

"Pass Any Exam. Any Time." - www.actualtests.com 72


Microsoft 70-450: Practice Exam
C. You should consider making use of Transparent Data Encryption (TDE).
D. You should consider making use of BitLocker encryption.

Answer: A

Explanation:
Cell-level encryption should be used if you need to encrypt only a small amount of data in the
database. The granular level of encryption that cell-level encryption provides ensures that data is
not decrypted until it is used. Cell-level encryption can be configured so that users can have
individual keys for their own data. Cell-level encryption is highly configurable, so that applications
that access data can be modified to best take advantage of it.
Cell-level encryption will slow down performance. Columns that will be encrypted must be altered
to use the varbinary data type. With encryption, the original value of the data will have a different
value after encryption. Any referential constraints such as primary keys, foreign keys, and unique
keys will be affected by the encrypted values. Any indexes on the encrypted columns will no

m
longer use index scans, but table scans, thus affecting performance.
Incorrect Answers:
.co
B: You should not use EFS encryption. This type of encryption is used to encrypt individual files
and directories on an NTFS volume. EFS encryption can be used in conjunction with BitLocker
encryption to secure volumes, directories, and files on a Window Server 2008 server.
sts
C: You should not use Transparent Data Encryption (TDE). If you need to encrypt the entire
database, you should use Transparent Data Encryption (TDE). In this scenario, you were required
to encrypt a small percentage of the data, and not the entire database. TDE offers advantages
lTe

over cell-level encryption. You do not have to modify an application to take advantage of TDE. The
encryption is transparent to the application. In this scenario, the application was customized to
access the data so cell-level encryption could be used. TDE does not hurt performance as much
tua

as cell-level encryption. TDE does not affect the use of indexes and other optimization tools used
by the query engine. In this scenario, performance is not a concern, so cell-encryption could be
used.
Ac

D: You should not use BitLocker encryption. This type of encryption is used to encrypt an entire
NTFS volume. BitLocker encryption can be used to protect a volume from being viewed after it is
stolen from a server. This type of encryption cannot be used to encrypt data in a database unless
the data is stored outside the SQL server such as FILESTREAM storage.

QUESTION NO: 79

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to plan the
implementation of Transparent Data Encryption (TDE) for the CK_SALES database using the
script below:

"Pass Any Exam. Any Time." - www.actualtests.com 73


Microsoft 70-450: Practice Exam

USE master;
GO
CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'T35T1K1N8';
GO
CREATE CERTIFICATE CERTKILLER-DB01Cert WITH SUBJECT = 'CERTKILLER-DB01
Certificate'
GO
USE CK_SALES
GO
CREATE DATABASE ENCRYPTION
KEY UITH ALGORITHM = AES_128 ENCRYPTION BY SERVER CERTIFICATE CERTKILLER-
DB01Cert
GO
ALTER DATABASE CK_SALES

m
SET ENCRYPTION ON
GO
.co
CertKiller.com has additionally configured the CK_SALES database to use the full recovery model.
sts
CertKiller.com wants you to ensure that you are able to restore the CK_SALES database after a
media failure by selecting what would be required to restore the database.
lTe

What additional information would be required? (Choose two)

A. To restore the database you would require backups of the msdb database and the CK_SALES
database.
tua

B. To restore the database you would require backups of the EFS recovery certificate for
CERTKILLER-DB01.
C. To restore the database you would require backups of the tempdb database and the
Ac

CK_SALES database.
D. To restore the database you would require backups of the master database and the
CK_SALES database.
E. To restore the database you would require a backup of the CERTKILLER-DB01Cert certificate.

Answer: D,E

Explanation:
For a database that has TDE enabled, the database is encrypted by using the database
encryption key. You should have a backup of the database, a backup of the certificate, and a
backup of the private key associated with the certificate. In this scenario, you must have a backup
of the CK_SALES database, a backup of the master database, and a backup of the
CERTKILLER_DB011Cert certificate. The CK_SALES database has Transparent Data Encryption
(TDE) enabled. You must have a backup of the certificate that protects the database encryption

"Pass Any Exam. Any Time." - www.actualtests.com 74


Microsoft 70-450: Practice Exam
key, which in this case is the CERTKILLER-DB01Cert certificate. You must have a backup of the
CK_SALES database to restore the objects and data in case of a failure. The master database
contains the certificate that is created with the database master key (DMK).
Incorrect Answers:
A: You do not have to restore the tempdb or msdb database. The tempdb system database is
used to store temporary objects. The msdb database is used to store jobs and alerts. Neither of
these two databases is used to store certificates or private keys for any databases. The master
database contains the certificate that is created with the DMK. You should back up the master
database instead of the tempdb or msdb databases.
B: You do not have to have a backup of the EFS recovery certificate for CERTKILLER-DB01. The
EFS recovery certificate is used to recover files and directories that are encrypted on a NTFS
partition. The EFS recovery certificate is not used to create a service master key (SMK) or a DMK
and does not need to be recovered. You must have backups of both the certificate and the private
key or the database cannot be opened.
C: You do not have to restore the tempdb or msdb database. The tempdb system database is

m
used to store temporary objects. The msdb database is used to store jobs and alerts. Neither of
these two databases is used to store certificates or private keys for any databases. The master
.co
database contains the certificate that is created with the DMK. You should back up the master
database instead of the tempdb or msdb databases.
sts

QUESTION NO: 80
lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
tua

database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to encrypt
the inventory information of the Products table in the CK_SALES database by performing the
action below:
Ac

You decided to create a master key for the database.You additionally created a certificate for
encryption using the statement below:

CREATE CERTIFICATE CERTKILLER-DB02 WITH SUBJECT = Inventory Level'You have later


created a symmetric key from the certificate using the statement below:

CREATE SYMMETRIC KEY SalesInventory_Key1

WITH ALGORITHM = AES_256 ENCRYPTION BY CERTIFICATE CERTKILLER-DB02;

You have finally altered the Employees table to add a column named Inventory_Encrypted to store
the encrypted data by writing the script below to encrypt the value in the column Inventory and
save the results in the table in the Inventory_Encrypted:

"Pass Any Exam. Any Time." - www.actualtests.com 75


Microsoft 70-450: Practice Exam

UPDATE CK_SALES.Products
SET Inventory_Encrypted = EncryptByKey(Key_GUID('SalesInventory_Key1'),

Inventory, 1, HashBytes ('SHA1', CONVERT( varbinary. Inventory)));

GO

CertKiller.com wants you to determine what should be done before running the update statement
on the table.

What should you do?

A. You should consider having the CERTKILLER-DB02 certificate used to open the table.
B. You should consider having the symmetric key opened that will be used to decrypt the data.

m
C. You should consider having the master key opened on the database.
D. You should consider having the CERTKILLER-DB02 certificate used to create a session key
with the table. .co
Answer: B
sts

Explanation:
You must open the symmetric key with which to decrypt the data before running the update
lTe

statement on the table. The command syntax is:


OPEN SYMMETRIC KEY SalesInventory_Key1 DECRYPTION BY CERTIFICATE CERTKILLER-
DB02
tua

The symmetric must be opened with the CERTKILLER-DB02 certificate before you encrypt the
value in the column Salary and save the results in the column Inventory_Encrypted .
Incorrect Answers:
Ac

A: You do not need to use the CERTKILLER-DB02 certificate to open the table. The
CERTKILLER-DB02 certificate is used to create the symmetric key. The CERTKILLER-DB02
certificate is not used for identity purposes with the table. The certificate is not related to the table.
C: You do not need to open the master key on the database. In this scenario, you are encrypting a
column. You must use the symmetric key to encrypt a column, not the master key on the
database.
D: You do not need to use CERTKILLER-DB02 certificate to create a session key with the table.
The symmetric key is used to encrypt a column in the table. A session key can be used when
creating a secure session between connections such as Web browser and a Web site. You are
trying to encrypt a column in a table, not establish a secure connection between a client and a
database server.

"Pass Any Exam. Any Time." - www.actualtests.com 76


Microsoft 70-450: Practice Exam
QUESTION NO: 81

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to add a
table for the CK_SALES database using the statement below:

CREATE TABLE Discontinued


(
[Id] [uniqueidentifier] ROWGUIDCOL NOT NULL UNIQUE,
[SerialNo] INTEGER UNIQUE,
[Design] VARBINARY(MAX) FILESTREAM NULL
)

m
CertKiller.com wants you to ensure that the data in the Design column in the Discontinued table is
secure whilst ensuring that the disk containing the CK_SALES database is protected from theft.

What should you do?


.co
sts
A. You should make use of EFS encryption.
B. You should make use of IPSec encryption.
C. You should make use of Transparent Data Encryption.
lTe

D. You should make use of BitLocker Encryption.

Answer: D
tua

Explanation:
BitLocker encryption provides full volume encryption for Windows Vista and Windows Server
2008. BitLocker provides protection against theft of a hard drive. BitLocker encrypts all user and
Ac

system files in the operating system volume. Once you have encrypted the volume that contains
the operating system with BitLocker , you can use BitLocker to encrypt the other volumes.
BitLocker can use the security capabilities of computers that have a Trusted Platform Module
(TPM) version 1.2 to ensure that data is accessible only if the encrypted disk is located in the
original computer and the computer's boot components have not been altered.
Incorrect Answers:
A: You should not use the EFS encryption. EFS encryption can encrypt files on an NTFS volume.
You can use Windows Explorer or the CIPHER command to encrypt a file that is stored on an
NTFS volume. If you use the CIPHER command or Windows Explorer to encrypt the files that
make up the Intelligence database file, this files will be only viewed by the person that encrypted
them. These files will not be readable by SQL Server, thus making the Intelligence database
unusable. Encrypting files via EFS encryption does not necessarily protect them against theft if a
user is able to export the certificate of Encrypted Recovery Agent to decrypt the files. You should
use BitLocker encryption to protect the volume against theft.
"Pass Any Exam. Any Time." - www.actualtests.com 77
Microsoft 70-450: Practice Exam
B: You should not use IPSec encryption. This type of encryption is used to encrypt
communications between sessions. IPSec encryption will not encrypt information on a NTFS drive
or within a SQL server database.
C: You should not use Transparent Data Encryption (TDE). TDE is used to encrypt a database,
but TDE cannot encrypt FILESTREAM data. The Chart column of the Records table uses a
FILESTREAM data type. FILESTREAM data is stored outside the database and cannot be
encrypted with TDE. FILESTREAM data in a table is secured with permissions that are granted at
the table or column levels inside the SQL server database. Although the data is stored outside
SQL server on a NTFS volume, the SQL Server service account is the only account that is granted
NTFS permissions to the FILESTREAM data. SQL Server restricts access to the volumes and files
that make up the FILESTREAM data containers. T-SQL transactions and OpenSqIFilestream APIs
are allowed to access the FILESTREAM data.

QUESTION NO: 82

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to secure the
sts

information which is submitted by the customers. CertKiller.com wants to have the credit card
numbers used by customers to be encrypted whilst other customer information remains
lTe

unencrypted by making use of the script below:

CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'T3$t1<lN8'


tua

CREATE CERTIFICATE DiscountRate WITH SUBJECT = 'Sales Discount';


CREATE SYMMETRIC KEY DiscountRate_0l
WITH ALGORITHM = AES_256 ENCRYPTION BY CERTIFICATE DiscountRate
Ac

CertKiller.com has additionally planned to have the CK_SALES database altered to have an
encrypted column created to store the encrypted column. CertKiller.com wants to know which data
type should be used for the encrypted column.

What should you do?

A. You should make use of the xml data type.


B. You should make use of the int data type.
C. You should make use of the varchar data type.
D. You should make use of the varbinary data type.

Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com 78


Microsoft 70-450: Practice Exam
Explanation:
Encryption of a column in SQL Server 2008 is only supported when the column's data type is set
to varbinary . The schema of the table must be changed to allow for encryption. You can either
add a column with the varbinary data type, or you can alter the column's data type to varbinary .
Incorrect Answers:
A: You should not set the data type of the column to int. An int data type is used to store exact
numbers. An int data type is can be used to store numbers from -2,147,483,648 to 2,147,483,648
and cannot be used to store encrypted data for a column.
B: You should not set the data type of the column to varchar. A varchar data type can support nun-
Unicode data can support a storage size of 2^31 --1 bytes and cannot be used to store encrypted
data for a column.
C: You should not set the data type of the column to xml. An xml data type is used to store XML
data and cannot be used to store encrypted data for a column.

m
QUESTION NO: 83
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts

CK_SALES. During the course of the day you receive instruction from CertKiller.com to have the
Credit Card Numbers encrypted for the CertKiller.com customers in the Orders table. You then
lTe

perform the actions listed below:

You created a master key in the database with a certificate for encryption.
tua

You created a symmetric key for the certificate and altered the Orders table to add a column called
CreditCardNo to store the encrypted Credit Card Number.
You additionally encrypted the value in the CreditCardNo column with a symmetric key.
Ac

CertKiller.com wants you to determine if the new CreditCardNo column contains the correct data
before removing the Credit Card column by making use of a query to compare the data in the
Credit Card column with the CreditCardNo column.

What should you do?

A. You should consider using the query:


SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card',
CONVERT(nvarchar, DecryptByKey (CreditCardNo))AS 'Decrypted Credit Card'
FROM CK_SALES.Orders.
B. You should consider using the query:
SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card',
CONVERT(nvarchar, DecryptByText (CreditCardNo)) AS 'Decrypted Credit Card'
FROM CK_SALES.Orders.
"Pass Any Exam. Any Time." - www.actualtests.com 79
Microsoft 70-450: Practice Exam
C. You should consider using the query:
SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card',
CreditCardNo AS 'Decrypted Credit Card'
FROM CK_SALES.Orders.
D. You should consider using the query:
SELECT Credit Card, CreditCardNo AS 'Encrypted Credit Card',
CONVERT(nvarchar, CreditCardNo) AS 'Decrypted Credit Card'
FROM CK_SALES.Orders.

Answer: A

Explanation:
The encrypted column must have a varbinaiy data type. To display the information in varbinaiy
column, you must convert the column to another readable data type, such as a varchar data type.
You must also include the DecryptByKey function. This function decrypts the data in the

m
CreditCardNo column by using the symmetric key.
Incorrect Answers:
.co
B: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted
Credit Card', CONVERT(nvarchar, DecryptByText (CreditCardNo)) AS 'Decrypted Credit Card'
FROM CK_SALES.OrdersThis query uses an incorrect function called DecryptByText. This
sts
function is not a standard T-SQL function.
C: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted
Credit Card', CreditCardNo AS 'Decrypted Credit Card' FROM CK_SALES.Orders.This query
lTe

does not use the DecryptByKey function to decrypt the data in the CreditCardNo column by using
the symmetric key.
D: You should not use the following query:SELECT Credit Card, CreditCardNo AS 'Encrypted
tua

Credit Card', CONVERT(nvarchar, CreditCardNo) AS 'Decrypted Credit Card' FROM


CK_SALES.Orders.This query does not use the DecryptByKey function to decrypt the data in the
CreditCardNo column by using the symmetric key.
Ac

QUESTION NO: 84

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES.

During the course of the day you receive instruction from CertKiller.com to implement the security
requirements for a new database application which will be deployed to CERTKILLER-DB01. You
make use of the code segment below to create a table in the new database:

CREATE TABLE CK_Discounts

"Pass Any Exam. Any Time." - www.actualtests.com 80


Microsoft 70-450: Practice Exam
(
ProductID INT NOT NULL IDENTITY(1,1),
SalePrice MONEY NOT NULL,
Discount VARBINARY(MAX) FILESTREAM
)

CertKiller.com wants you to ensure that the Discount column is protected from unauthorized
access using the most secure method.

What should you do? (Choose all that apply.)

A. The best option is to Event Subscriptions on all columns in the database.


B. The best option is to limit the access of the database files to the SQL Server 2008 Service
account.
C. The best option is to set up offline files to use encryption.

m
D. The best option is to use IPsec domain isolation.
E. The best option is to use NTFS file system security.

Answer: B,E
.co
sts

QUESTION NO: 85
lTe

CertKiller.com has hired you as a database administrator for their network. Your duties
encompass administering a SQL Server 2008 infrastructure.
tua

The instance hosts a business critical database named CERTKILLER-DB06. A CertKiller.com


policy states that CERTKILLER-DB06 should always be available to its users without any loss of
information. Filestream data is also included in CERTKILLER-DB06. You thus decide to make use
Ac

of a high-availability solution.

What should you do?

A. You should consider making use of a RAID 5 array.


B. You should consider making use of multiple downstream servers.
C. You should consider making use of failover clustering.
D. You should consider making use of the Job Activity Monitor tool.

Answer: C

QUESTION NO: 86

"Pass Any Exam. Any Time." - www.actualtests.com 81


Microsoft 70-450: Practice Exam
CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com
include administering four SQL Server 2008 instances.

All the instances host a single database application. You are currently implementing the migration
of the instances to a new SQL Server failover cluster. The four instances are configured as
follows:CERTKILLER-DB01 is configured with 8 processors that have 16 GB of
RAM.CERTKILLER-DB02 is configured with 4 processors that have 8 GB of RAM.CERTKILLER-
DB03 is configured with 2 processors that have 16 GB of RAM.CERTKILLER-DB04 is configured
with 4 processors that have 8 GB of RAM.

At present the instances are all optimized and contain no additional CPU cycles or memory.
However, a single virtual cluster IP address will be used for the new SQL Server failover cluster
will host the four databases. The CertKiller.com CIO wants the cluster to handle the workload of
the database applications without using too may hardware.

m
What should you do?

.co
A. This can be achieved by having a two-node active/active cluster configured where every node
will contain a 10 processors and 15 GB of memory.
B. This can be achieved by having a two-node active/passive cluster configured where every node
sts
will contain 18 processors and 50 GB of memory.
C. This can be achieved by having a four-node active/active/active/passive cluster configured
where every node will contain 9 processors and a 50 GB of memory.
lTe

D. This can be achieved by having a four-node active/active/active/active cluster configured where


every node will contain a 6 processors and a 11 GB of memory.
tua

Answer: B
Ac

QUESTION NO: 87

You work as a database administrator at CertKiller.com. You are responsible for administering
multiple servers that run SQL Server 2008 Enterprise Edition.

You are assigned a SQL Server 2008 Enterprise Edition server named CERTKILLER-DB01 that
hosts multiple databases. You receive an instruction from the CIO to:Ensure the highest
availability.Keep the downtime of these databases together with the system databases to a
minimum.The databases are available on one server for client access.

You need to determine the best solution to recommend to the CIO.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 82


Microsoft 70-450: Practice Exam
A. You should recommend Log shipping.
B. You should recommend Database mirroring.
C. You should recommend Replication.
D. You should recommend Failover clustering.

Answer: D

Explanation:
Failover clustering requires one or more servers that contain two or more shared disks. When you
create a SQL Server failover cluster, the entire cluster instance appears as a single computer on
the network. However, there are multiple functional servers on the back end. When a failure
happens, the failover cluster allows a new node, which was not the current node, to become the
current node. When this new current node fails, another node in the cluster is given the
responsibility of owning the resource group. In this solution, both the user databases and system
databases are provided the highest availability when a failure occurs.

m
Incorrect Answers:
A: The log shipping option is incorrect. Log shipping enables transactional log backup from the
.co
primary server to the secondary server. The logs of the primary database on the primary server
are backed up for the secondary database hosted on a secondary server. The transaction logs are
used for synchronizing both primary and secondary databases. Limited reporting functionality is
sts
available when the secondary databases are restored. This solution will not work in the scenario
because in case of a failure, the system databases will not be available. Log shipping, unlike
clustering, does not provide failover detection or automatic failover.
lTe

B: You should not implement database mirroring as a solution to meet the requirement stated in
the scenario. In database mirroring, databases are mirrored from one server to another server to
provide the highest availability and uptime. The database that is the primary copy is known as the
tua

principal database. The secondary copy or the standby copy is known as the mirror database. The
mirror database is created with no recovery. This solution will not work in the scenario because in
case of a failure, the system databases will not be available.
Ac

C: You should not use replication. In SQL Server replication, a publish-subscribe model is used
that allows the primary server to replicate information to the secondary servers. You can use
different types of replication, such as snapshot, merge, or transactional. Replication can be used
to replicate tables and objects from a database, but should not be used for data availability of that
database. Replication is generally used to replicate some of the objects of a database, and not the
entire database. You cannot use replication to system databases.

QUESTION NO: 88

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance.

"Pass Any Exam. Any Time." - www.actualtests.com 83


Microsoft 70-450: Practice Exam
All CertKiller.com users make use of the instance daily. You receive an instruction from the CIO to
execute a software upgrade on the instance. You need to accomplish this without affecting the
availability of the SQL server.

What should you do?

A. You should consider configuring automatic failover with synchronous database mirroring.
B. You should consider configuring automatic failover with asynchronous database mirroring.
C. You should consider configuring manual failover with synchronous database mirroring.
D. You should consider configuring manual failover with asynchronous database mirroring.

Answer: C

Explanation:
Manual failover can be used to upgrade hardware or software without sacrificing availability.
Manual failover is only supported by synchronous or high-safety mode.

m
Incorrect Answers:
A: You should not configure automatic failover with synchronous database mirroring because
.co
automatic failover cannot be used for upgrading hardware or software. Automatic failover is a
feature of database mirroring that is primarily used to prevent data loss during failover.
sts
B: You should not configure automatic failover with asynchronous database mirroring because
automatic failover is supported only in database mirroring sessions running with a witness in
synchronous or high-safety mode. Also, automatic failover cannot be used for upgrading hardware
lTe

or software without affecting availability.


D: You should not configure manual failover with asynchronous database mirroring because
manual failover is supported only with synchronous database mirroring.
tua

QUESTION NO: 89
Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure
a failover clustering solution for SQL Server 2008 by configuring the pre-requirements so the
clustering solution is successfully implemented.

CertKiller.com wants to know which pre-requirements should be met?

A. The failover clustering solution should have the account capable of running the Microsoft
Cluster Service (MSCS) assigned public rights on the SQL Server.
B. The failover clustering solution would require the Microsoft Cluster Service (MSCS) and the
SQL Server to use the same service account.

"Pass Any Exam. Any Time." - www.actualtests.com 84


Microsoft 70-450: Practice Exam
C. The failover clustering solution would require Microsoft Cluster Service (MSCS) to be able to
verify the failover cluster instance using the LooksAlive check.
D. The failover clustering solution would require Microsoft Cluster Server or the Microsoft Cluster
Service (MSCS) service to be configured on all nodes in the cluster.

Answer: A

Explanation:
MSCS needs to verify the failover cluster instance availability. MSCS uses the IsAlive check to
verify the failover cluster instance availability by polling the SQL Server every 60 seconds. The
account that runs the MSCS service is also used to run the IsAlive check. Therefore, MSCS must
have public rights on the SQL Server to run the IsAlive check for its availability.
Incorrect Answers:
B: You must not use the same service account for the MSCS and the SQL Server. As a
recommended practice, you should use different service accounts for both the MSCS and the SQL

m
Server. If the same accounts are used, you will not be able to change the password for the MSCS
service at a later date.
.co
C: The MSCS does not verify failover cluster instance availability using the LooksAlive check.
Instead, the IsAlive check is performed to check the availability of the failover cluster instance.
LooksAlive is a simple check performed every five seconds using the Windows NT Service Control
sts
Manager. IsAlive is performed every 60 seconds by connecting to the SQL Server.
D: The option stating that the Microsoft Cluster Server or the MSCS service must be configured on
all nodes in the cluster is incorrect. You need to have the MSCS service running on at least one of
lTe

the nodes in your cluster, not all nodes of the cluster. A clustering solution can be implemented
with SQL Server Standard version, with only two nodes, and SQL Server Enterprise version can
be implemented with eight nodes. The MSCS service must be running on at least one node in the
tua

cluster for each version. Part 2: Design database mirroring (6 Questions)


Ac

QUESTION NO: 90

You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance. A database configured using a high-safety mirroring operation mode
along with a witness server is hosted by the instance at CertKiller.com.

During routine monitoring you discover that the witness server is experiencing memory failure. The
witness server will thus be offline for a few hours. The CertKiller.com management wants you to
make sure that database unavailability is kept to a minimum. You thus decide to reconfigure the
mirroring strategy.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 85


Microsoft 70-450: Practice Exam
A. Your best option would be to make sure that the mirroring session is not used on the witness
server.
B. Your best option would be to make sure that the resource database is not used.
C. Your best option would be to make sure that the SQL Profiler trace is removed.
D. Your best option would be to make sure that Transaction Logs is removed.

Answer: A

QUESTION NO: 91

You are employed as the database administrator at CertKiller.com. You are responsible for
administering a database server named CERTKILLER-DB01 with an instance that hosts a
database named CK_MARKETING.

m
CK_MARKETING contains the backup strategy below:Weekly a full database backup is
executed.Daily a differential backup is executed.Hourly a transaction log backup is executed.
.co
You are in the process of implementing an end-of-year batch process. This process will take three
hours to complete and will modify 10 % percent of information within CK_MARKETING. You
sts
receive an instruction from the CIO to make sure that the batch operation is able to be rolled back.
You need to accomplish this in the least amount of time.
lTe

What should you do?

A. Your best option would be to use a Transaction log backup.


tua

B. Your best option would be to use the Windows System Resource Manager (WSRM).
C. Your best option would be to use a database snapshot.
D. Your best option would be to use Microsoft Multipath.
Ac

Answer: C

QUESTION NO: 92

You work as a database administrator at CertKiller.com. You are responsible for administering two
SQL Server 2008 servers.

You have received instruction from the CIO to configure synchronous database mirroring in high-
safety mode. You discover that the primary server failed. You decide to force the mirror server to
become the primary server. You need to determine role the primary server have with the mirror
database when it comes back online.

What will happen?


"Pass Any Exam. Any Time." - www.actualtests.com 86
Microsoft 70-450: Practice Exam
A. It will result in the original primary server not being recognized as part of the mirror.
B. It will result in the original principal server being recognized as primary server again.
C. It will result in no mirror and the secondary server will be identified as a standalone server.
D. It will result in the secondary server staying the primary server in the mirror.

Answer: D

Explanation:
When you have a synchronous database mirroring in high-safety mode and the principal server
goes down, the secondary server becomes the principal server hosting the working copy of the
mirrored database. If a principal server goes down or disconnects from the mirror, the secondary
server continues to act as a secondary server until a secondary server forces the secondary
server to become the principal server. When the secondary server becomes the principal server, it
may not have the latest logs for the database. Therefore, there may be some data loss depending
upon what was written from the principal server's log to the secondary server log. After the

m
secondary server becomes the principal server and the original principal server comes back
online, it cannot demote the new principal server back to being a secondary server. The original
.co
principal server in this case will become the secondary server and roll back its logs to synchronize
with the new principal server's logs.
Incorrect Answers:
sts
A: All the other options are incorrect because the secondary server will be the principal server in
the mirror in this scenario. When the original principal server comes online, the mirror will not be
broken. The original principal server will be recognized as part of the mirror, but will be the
lTe

secondary server.
B: All the other options are incorrect because the secondary server will be the principal server in
the mirror in this scenario. When the original principal server comes online, the mirror will not be
tua

broken. The original principal server will be recognized as part of the mirror, but will be the
secondary server.
C: All the other options are incorrect because the secondary server will be the principal server in
Ac

the mirror in this scenario. When the original principal server comes online, the mirror will not be
broken. The original principal server will be recognized as part of the mirror, but will be the
secondary server.

QUESTION NO: 93

You are employed as a database administrator at CertKiller.com. CertKiller.com has its


headquarters in Chicago and a branch office in Miami. You are responsible for administering
multiple Microsoft SQL Server 2008 servers.

CERTKILLER-DB01 and CERTKILLER-DB02 is located at the Chicago office and CERTKILLER-


DB03 at the Miami office. CERTKILLER-DB01 hosts a database named CK_PRODUCTS. To
ensure productivity you need to make sure that the client applications in the Miami and Chicago

"Pass Any Exam. Any Time." - www.actualtests.com 87


Microsoft 70-450: Practice Exam
offices is able to make use of CK_PRODUCTS in the event of CERTKILLER-DB01 failing.

What should you do?

A. This can be accomplished by ensuring that database mirroring is enabled with CERTKILLER-
DB03.
B. This can be accomplished by ensuring that replication is enabled with the CERTKILLER-DB03.
C. This can be accomplished by ensuring that clustering is enabled with the CERTKILLER-DB03.
D. This can be accomplished by ensuring that log shipping is enabled with the CERTKILLER-
DB03.

Answer: A

Explanation:
Database mirroring allows failover detection of user databases. With database mirroring, you can
configure a mirror set to automatically fail over to a secondary server when the primary server fails

m
if a witness server is configured. You can configure the Sales database to be mirrored on the
CERTKILLER-DB03 server and configure CERTKILLER-DB02 to be a witness server. You can
.co
program client applications to automatically connect to the new primary servers when database
mirroring is enabled. In this scenario, you can have the client applications connect to the mirrored
sts
copy of the Sales database on another SQL server in the branch office.
Incorrect Answers:
B: You should not enable clustering with CERTKILLER-DB03. Clustering does provide failover
lTe

detection and automatic failover for both system databases and user databases. You cannot
enable clustering for the SQL servers in the different offices.
C: You should not enable log shipping or replication with CERTKILLER-DB03. Replication and log
tua

shipping can be used to make a copy of a user database, but neither replication nor log shipping
provides failure detection or automatic failover. You cannot have applications automatically fail
over to a copy database with either log shipping or replication.
Ac

D: You should not enable clustering with CERTKILLER-DB03. Clustering does provide failover
detection and automatic failover for both system databases and user databases. You cannot
enable clustering for the SQL servers in the different offices.

QUESTION NO: 94

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008. These servers are used to manage the database.

You receive an instruction from the CIO to implement a high-availability solution in the network.
This high-availability solution should include database mirroring as well as log shipping. You need
to determine what benefit it will result in.

"Pass Any Exam. Any Time." - www.actualtests.com 88


Microsoft 70-450: Practice Exam
What should you identify?

A. It will result in you only requiring the principal server to be configured as primary server.
B. It will result in only one secondary server in log shipping when configured with database
mirroring.
C. It will result in the principal database in mirroring to be configured as a primary database in log
shipping.
D. It will result in the mirrored database in mirroring to be configured as a secondary database in
log shipping.

Answer: C

Explanation:
You can configure a principal database in mirroring to be the primary database in log shipping. In
most cases, you will configure mirroring before configuring log shipping. In mirroring, you would
typically have a principal server, a secondary server, and if you need automatic failover to the

m
secondary server, then a witness server as well. If configuring principal server to be the primary
server, which is principal/primary database combination, you must also configure the mirror
.co
database to be the primary database, which will be the mirror/primary database, for log shipping.
Incorrect Answers:
sts
A: The option stating that when log shipping is configured with mirroring, it requires only the
principal server to be configured as a primary server, is incorrect. You need to configure the
principal server as the primary server. Along with configuring the principal server, you must also
lTe

configure the mirror server as the primary server for log shipping. In mirroring, a principal and a
secondary server contain replicas of the databases on which mirroring has been configured. For
mirroring to work appropriately, you must also configure the mirror server as the log shipping
tua

primary server if the principal server has been configured as the primary server.
B: The option stating that there can be only one secondary server configured with mirroring in log
shipping is incorrect. In log shipping, you can have more than one secondary server configured. It
Ac

is not mandatory that you can have only one secondary server in log shipping
D: The option stating that the mirrored database in mirroring must also be configured as a
secondary database in log shipping is incorrect. The mirrored database must also be configured
as a primary database if the principal database is configured as a primary database.

QUESTION NO: 95

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure
synchronous database mirroring using high-safety mode. CertKiller.com has discovered that the
CERTKILLER-DB01 went down forcing the mirror to become the principal server. You later

"Pass Any Exam. Any Time." - www.actualtests.com 89


Microsoft 70-450: Practice Exam
promoted the secondary server to be the primary server.

What should you do next? (Choose two)

A. You should consider having user logins created from the CERTKILLER-DB01 to the promoted
principal server
B. You should consider having the jobs created on the newly promoted principal server.
C. You should consider having CERTKILLER-DB01 brought back online.
D. You should consider having the master database of CERTKILLER-DB01 copied to the newly
promoted server.
E. You should consider having the log files from CERTKILLER-DB01 copied to the newly
promoted server.

Answer: A,B

Explanation:

m
If a principal server goes down or disconnects from the mirror, the secondary server continues to
act as a secondary server until a secondary server forces itself to become the principal server.
.co
When the secondary server becomes the principal server, it may not have the latest logs for the
database, and therefore there may be some data loss, depending upon what was written from the
sts
principal server's log to the secondary server log. After the secondary server becomes the
principal server and the original principal server comes back online, it cannot demote the new
principal server back to being a secondary server. The original principal server in this case will
lTe

become the secondary server and roll back its logs to synchronize with the new principal server
logs.
The master database is not automatically mirrored from the original principal server to the
tua

secondary server. When the secondary server becomes the principal server, the master database
is not part of the database mirror. You will have to recreate any jobs that were running on the
original principal server on the newly promoted principal server.
Ac

Since the master database is not mirrored with the secondary database, and the master database
maintains user logins, you will also have to manually create the user logins on the newly promoted
principal server. Otherwise, the users will not be able to access newly promoted principal server.
Incorrect Answers:
C: When the original principal server comes online, it will be demoted to secondary server. Part 3:
Design a high-availability solution that is based on replication (2 Questions)
D: You do not have to copy the master database or the logs from the secondary server to the
newly promoted principal server. You would need to perform the required steps to ensure that the
newly promoted principal server is accessible.
E: You do not have to copy the master database or the logs from the secondary server to the
newly promoted principal server. You would need to perform the required steps to ensure that the
newly promoted principal server is accessible.

"Pass Any Exam. Any Time." - www.actualtests.com 90


Microsoft 70-450: Practice Exam

QUESTION NO: 96

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES.

During the course of the day you receive instruction from CertKiller.com to install a new database
application to the instance. The new database will use SQL CLR integration to develop stored
procedures. CertKiller.com wants you to ensure that the application is configured to enable
EXTERNAL_ACCESS code access security settings whilst ensuring the application is deployed
with no loss of functionality.

m
What should you do?

.co
A. You should consider having the peverify.exe utility used to confirm if the code meets the type-
safety requirements.
B. You should consider registering the VPN solution for the installation.
sts
C. You should consider using the File Server Resource Manager (FSRM) with static fields.
D. You should consider using the Windows System Resource Manager (WSRM) with read write
static fields.
lTe

Answer: A
tua

QUESTION NO: 97
Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you add a user named Rory Allen as a member of the
db_owner role in the newly created CK_PRODUCTS database. Rory Allen has later created a
user named Mia Hamm who is a user in the CK_SALES database in the CK_PRODUCTS
database.

Rory Allen has additionally created a stored procedure object in the CK_PRODUCTS database
named GetProductSales which call a stored procedure in the CK_SALES database named
SalePrice, both objects are owned by Miam Hamm. The database configuration is shown in the
exhibit below:

"Pass Any Exam. Any Time." - www.actualtests.com 91


Microsoft 70-450: Practice Exam

CertKiller.com wants you to ensure that Rory Allen has the permissions checked on the SalePrice
object.

m
What should you do? .co
A. You should consider changing the authentication mode from Mixed Mode authentication to
Windows security authentication.
sts

B. You should consider having cross-database ownership chaining disabled.


C. You should consider having Mia Hamm added to the db_owner database role in the
lTe

CK_SALES database.
D. You should consider having all of Rory Allen's permissions revoked on SalePrice.

Answer: B
tua

Explanation:
Part 4: Design a high-availability solution that is based on log shipping (2 Questions)
Ac

QUESTION NO: 98

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to perform a
manual role change on CERTKILLER-DB01 from a primary server to a secondary server. You
later backup the transaction logs using with norecovety clause from the primary server to the
secondary server.

What should you do? (Choose two)

"Pass Any Exam. Any Time." - www.actualtests.com 92


Microsoft 70-450: Practice Exam
A. You should consider having the primary server shut down.
B. You should consider having log shipping disabled on the secondary server.
C. You should consider having a new primary server configured as the primary server for other
secondary servers.
D. You should consider having the log shipping backup job disabled on the primary server.
E. You should consider having the jobs from the primary server copied and restored to the
secondary server.

Answer: D,E

Explanation:
You should perform the following two steps:
Disable the log shipping backup job on the primary server. You will later enable the log shipping
backup job on the secondary server.
Copy and restore the jobs from the primary to the secondary server. To be able to run the same

m
jobs on the secondary server, which will be the new primary server, you need to ensure that the
jobs are copied and restored on the secondary server from the primary server.
Incorrect Answers: .co
A: You should not shut down the primary server. If you shut down the primary server, you will not
be able to complete the role change process.
sts
B: You should not disable log shipping on the secondary server. Log shipping on the secondary
server should be enabled, not disabled.
C: You do not need to configure a new primary server as the primary server for other secondary
lTe

servers in this scenario. Even though you can configure the new primary server as the primary
server for the other secondary servers, this is an optional step.
tua

QUESTION NO: 99
Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES and CERTKILLER-DB02 as a database mirror configured with a full quorum. In the
current configuration CERTKILLER-DB01 is the principal server and CERTKILLER-DB02 is the
mirror server.

During the course of the day you add an additional server CERTKILLER-DB03 which is configured
as the witness server. CertKiller.com has later reported that CERTKILLER-DB01 went offline and
the mirror CERTKILLER-DB02 10 minutes later also goes offline. CERTKILLER-DB02 became
online before CERTKILLER-DB01. CertKiller.com wants to know that the result would be when
CERTKILLER-DB01 becomes online.

What would the result be?

"Pass Any Exam. Any Time." - www.actualtests.com 93


Microsoft 70-450: Practice Exam
A. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have mirrored database
remaining offline.
B. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB03 as
the principal server.
C. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB01
remaining the principal server.
D. CERTKILLER-DB01 coming online after CERTKILLER-DB01 will have CERTKILLER-DB02 as
the principal server.

Answer: D

Explanation:
Part 5: Select high-availability technologies based on business requirements (7 Questions)

m
QUESTION NO: 100

.co
You work as a database administrator at CertKiller.com. You are responsible for administering
SQL Server 2008 servers on a single site.
sts
CertKiller.com contains two instances on the site which is as follows: There is an Enterprise
Edition server instance on a server that contains a redundant array of independent disks (RAID)
10 disk system as well as a Standard Edition server instance on a server that contains a RAID 5
lTe

disk system.

The instances all host a single application. You receive a directive from management to devise a
tua

high availability solution for the site that will meet the subsequent requirements:You need to use
the implementation on the current systems.The database should be available with least amount of
downtime.The loss of information should be little.The solution should have least effect on the
Ac

current system.

What should you do? (Choose all that apply.)

A. This can be accomplished using the LUN Management settings.


B. This can be accomplished using log shipping.
C. This can be accomplished using replication.
D. This can be accomplished using downstream servers.

Answer: B,C

QUESTION NO: 101

"Pass Any Exam. Any Time." - www.actualtests.com 94


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. CertKiller.com has its headquarters in
London and branch offices in Paris, Stockholm and Athens. You are responsible for administering
the SQL Server 2008 instances at the four sites.

The four sites all share a mission critical database named CERTKILLER-DB09. A new directive
from management states that all users must be able to:Access and change information with the
least amount of latency of all the sites.Reduce the loss of information when server failure occurs.

You thus need to determine a high-availability solution that will accomplish this.

What should you do?

A. This can be accomplished by implementing a two-node failover cluster.


B. This can be accomplished by implementing the Activity Monitor tool.
C. This can be accomplished by implementing Asynchronous database mirroring.

m
D. This can be accomplished by implementing peer-to-peer replication.

Answer: D .co
sts
QUESTION NO: 102

You work as a database administrator at CertKiller.com. Your duties include administrating a SQL
lTe

Server 2008 infrastructure. You are in the process of implementing log shipping on three SQL
Server instances for numerous databases.
tua

The logs of the three SQL instances are shipped to a fourth SQL instance. You then decide to
implement a manual failover. You have received instruction from the CIO to make sure that the
secondary server is used by the database applications in the event of a failover. To ensure
Ac

productivity you need to make sure that the latest information is available to CertKiller.com users
to access.

What should you do? (Choose all that apply.)

A. You should make use the Synchronous database mirroring with a witness server.
B. You should make sure that the user workstations are redirected to the secondary instance.
C. You should make sure that the transaction log not applied should be backed up in sequence to
every secondary database with the WITH RECOVERY option on the last log.
D. You should use the WITH NORECOVERY option to make sure that the tail of the transaction
log of primary databases is backed up.
E. You should make sure that the stored procedures are copied to the secondary instance.

Answer: B,C,D

"Pass Any Exam. Any Time." - www.actualtests.com 95


Microsoft 70-450: Practice Exam

QUESTION NO: 103

You are the newly appointed database administrator at CertKiller.com. You are responsible for
administering the Microsoft SQL Server 2008 server.

You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02
and CERTKILLER-DB03. CERTKILLER-DB02 is configured as the primary server and
CERTKILLER-DB03 as the secondary server.
You decide to apply certain maintenance patches on CERTKILLER-DB02. To achieve this you
need to take the server offline. To ensure that productivity continues you need to make sure that
CERTKILLER-DB03 performs the role of the primary server. In order to start the [process you
copy the database backup files from the network share to CERTKILLER-DB03.

m
What is your next step?

.co
A. Your next step should be to roll the database forward on CERTKILLER-DB03.
B. Your next step should be to restore the transaction logs on CERTKILLER-DB03.
C. Your next step should be to disable all backup jobs on the CERTKILLER-DB02.
sts
D. Your next step should be to configure the CERTKILLER-DB03 as the primary server for other
secondary servers if they exist.
lTe

Answer: B

Explanation:
tua

You need to perform the following steps to bring a secondary server online as a primary server:
Copy onto the secondary server any backup files that are not already there. These backup files
might be stored in the network share.
The transaction logs must be restored on the secondary server. You need to back up the
Ac

transaction logs from the primary to the secondary server using the with norecovery clause. When
you back up transaction logs from the primary server using the with norecovery clause, the
database in the primary server goes into the restoring state. In this state, the database is not
available to users. On the secondary server, you need apply to the transaction logs to roll the
database forward.
After you roll the database forward on the secondary server, the secondary database server is
synchronized with the primary server and is updated with the latest information.
After CERTKILLER-DB03 is configured as the primary server, You can now redirect the SQL
clients to CERTKILLER-DB03. CERTKILLER-DB03 can be configured as the primary server for
various other secondary servers.
Incorrect Answers:
A: You only need to roll forward the secondary server database once you have restored the
transaction logs on the secondary server.

"Pass Any Exam. Any Time." - www.actualtests.com 96


Microsoft 70-450: Practice Exam
C: You do not need to disable all backup jobs on the primary server. You only need to disable log
shipping backup jobs when you are performing a role change between the primary and the
secondary server.
D: You do not need to configure the CERTKILLER-DB03 as the primary server for any other
secondary servers. This step is not required while you are bringing the secondary server online.

QUESTION NO: 104

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering multiple
database servers located in Miami and branch office at Toronto. The Toronto network users often
come to Miami and use data from the Toronto office servers. CertKiller.com wants you to configure
data replication between the Miami servers and Toronto servers whilst ensuring the replication
type used has the ability to resolve conflicts occurring during replication.

m
What should you do?
.co
A. You should consider making use of snapshot replication.
B. You should consider making use of peer-to-peer replication.
sts
C. You should consider making use of transactional replication.
D. You should consider making use of Merge replication.
lTe

Answer: D

Explanation:
tua

Merge replication has the ability to resolve conflicts that may occur during the replication. You
typically use merge replication when:

You must replicate information to mobile users who are not always connected to the SQL Server.
Ac

There is a requirement of data filtering. In data filtering, you can filter different updates to different
Subscribers at different locations.

You require the ability to resolve conflicts that occur during replication.
Incorrect Answers:
A: You should not use peer-to-peer replication. This type of replication is typically used when you
need high availability and scalability. This type of replication does not have the ability to resolve
conflicts that may occur during replication updates.
B: You should not use transactional replication. In this type of replication, fewer Subscribers keep
the read-only copy of replicated data. This type of replication does not have the ability to resolve
conflicts that occur during replication updates.
C: You should not use snapshot replication. This type of replication is used when you need to
replicate a large volume of information. This type of replication does not have the ability to resolve

"Pass Any Exam. Any Time." - www.actualtests.com 97


Microsoft 70-450: Practice Exam
conflicts that may occur during replication updates.

QUESTION NO: 105

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to add a
column to the SaleData table which has a varbinary(max) column containing the FILESTREAM
data files on the CK_SALES database. CertKiller.com wants you to configure a high availability
solution for the database.

What should you do? (Choose all that apply)

m
A. You should consider making use of replication.
B. You should consider making use of database snapshots.
.co
C. You should consider making use of failover clustering.
D. You should consider making use of log shipping.
E. You should consider making use of database mirroring.
sts

Answer: A,C,D
lTe

Explanation:
You can configure the following high availability solutions for a database that contains a varbinary
( max) column:
tua

Log shipping: This high availability solution works with the databases that have FILESTREAM data
in the vat binary (max) column. You must enable FILESTREAM in both the primary and the
secondary servers. Each server must be running SQL Server 2008 with FILESTREAM enabled. If
any of the required prerequisites are not met, the solution will not work.
Ac

Failover clustering: This high availability solution requires FILESTREAM data to be hosted on a
shared disk so that it can be accessible by all nodes in the cluster. Each node in the cluster must
have FILESTREAM enabled for it to work successfully in a clustered environment.
Replication: In merge replication, a uniqueidentifier data type column is automatically added to
tables that do not contain this data type. A UNIQUE constraint must also be defined for the column
along with ROWGUIDCOL property set.
Incorrect Answers:
B: You cannot configure database snapshots for the database that contains FILESTREAM data in
a varbinary (max) column. When you attempt to create a database snapshot of the database that
contains FILESTREAM data, you will be prompted with an error.
E: You cannot configure database mirroring for the database that contains FILESTREAM data in a
varbinary (max) column. FILESTREAM filegroups are not supported on the principal server in a
mirroring configuration. If mirroring does not support a database with the FILESTREAM data, the

"Pass Any Exam. Any Time." - www.actualtests.com 98


Microsoft 70-450: Practice Exam
secondary server will also not be able to support it. Therefore, database mirroring cannot be
configured with a database that has FILESTREAM data and filegroups, and this solution will not
work when you have FILESTREAM data.

QUESTION NO: 106

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to add an
additional server named CERTKILLER-DB02 and configure a database mirror which uses the full
quorum. CertKiller.com has configured CERTKILLER-DB01 as the principal server and
CERTKILLER-DB02 as the mirror server. CertKiller.com additionally configured a server named
CERTKILLER-DB03 as the witness server. CertKiller.com wants to know what would occur if

m
CERTKILLER-DB03 went offline.

What would your reply be?


.co
A. CERTKILLER-DB03 going offline would result in CERTKILLER-DB02 becoming the principal
sts
server.
B. CERTKILLER-DB03 going offline would result in CERTKILLER-DB01 and CERTKILLER-DB02
moving into partner-to-partner quorum.
lTe

C. CERTKILLER-DB03 going offline would result in the database going offline.


D. CERTKILLER-DB03 going offline would result in CERTKILLER-DB01 having the only copy of
the database.
tua

Answer: B

Explanation:
Ac

When a witness server goes offline, the full quorum is no longer used. Both the principal, which is
CERTKILLER-DB01, and mirror, which is CERTKILLER-DB02, will move into a partner-to-partner
quorum. Without the witness server, automatic failover will not be supported. A database
administrator will have to perform manual failover if the principal server becomes unavailable. Only
when the witness server is back online will the automatic failover be possible.
Incorrect Answers:
A: CERTKILLER-DB02 is the mirror server and will not become the principal server. The mirror
server resumes the role of a principal server only when the principal server is no longer available.
If this occurs, the witness server will assign the role of the principal server to the mirror server. If
there is no witness server and there is partner-to-partner quorum, the mirror server must be
assigned the role of principal server by the administrator using the manual failover process.
C: The database will not go offline. If both principal and mirror lose the quorum, the database will
be offline and the witness server will not be available. However, in the scenario, only the witness

"Pass Any Exam. Any Time." - www.actualtests.com 99


Microsoft 70-450: Practice Exam
server goes offline. A partner-to-partner quorum exists between CERTKILLER-DB01 and
CERTKILLER-DB02, and therefore the database does not go offline.
D: The principal server will not have the only copy of the database. Both the mirrored server and
the principal server will have a copy of the database. If you have a full quorum and witness server
goes down, you will then have a partner-to-partner quorum. For a copy of the database to exist
only on the principal server, you must remove the witness from the quorum so that if the mirror
server goes down, the database is available on the principal server.

QUESTION NO: 107

You are the newly appointed a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 instance that hosts a database named CK_SALES.

CK_SALES contains the subsequent backup strategy:The execution of full database backups on a

m
weekly basis.The execution of differential database backups every day.The execution of
transactional log backups on an hourly basis.The recovery plan necessitates that you execute an
unscheduled full backup.
.co
You receive an instruction from the CIO to execute a full database backup. You need to
sts

accomplish this tasks without the scheduled backup strategy being disrupted.
lTe

What should you do?

A. Your best choice would be to make use of the COPY_ONLY backup option.
B. Your best choice would be to make use of the database snapshot.
tua

C. Your best choice would be to make use of the Transaction log backup.
D. Your best choice would be to make use of the Hyper-V feature.
Ac

Answer: A

QUESTION NO: 108

CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for
administering a database server named CERTKILLER-DB01 with an instance that hosts a
database named CK_PRODUCT that stored highly confidential data.

You have received instruction from the CIO to ensure that data restored as soon as possible in the
event that an error occur. There are two tape devices from different manufacturers in
CERTKILLER-DB01. However, the tape devices make use of the same media and have the same
capacity. You thus need to confirm that the information on the backup of CK_PRODUCT can be

"Pass Any Exam. Any Time." - www.actualtests.com 100


Microsoft 70-450: Practice Exam
restored as well as ensuring that the information is not corrupted.

What should you do?

A. You should consider configuring a mirrored backup media sets.


Then the stop_on_error keyword can be used during the backup.
B. You should consider configuring a mirrored backup media sets.
Then checksum keyword can be used during the backup.
C. You should consider creating a media set.
Then the stop_on_error keyword can be used during the backup.
D. You should consider creating a media set.
Then the checksum keyword can be used during the backup.

Answer: D

Explanation:

m
The checksum keyword verifies each page for checksum and torn page errors and will generate a
checksum for the entire backup. The backup will be flagged as containing backup checksums in
.co
the backupset table in the MSDB database. To verify the backup, you should use restore
verifyonly . This command is used to determine if the following conditions are met:
sts
The backup set is complete.
Checksum is present on the media.
Volumes are all readable.
lTe

The destination drive has sufficient space to restore.

The restore verifyonly statement does not guarantee that the data can be recovered. This
tua

command can be used to determine database integrity problems that could compromise the
backup set.
Incorrect Answers:
Ac

A: You cannot create a mirrored backup media sets using the checksum keyword or the
stop_on_error keyword during the backup. A mirroring backup media set can increase the
reliability of the backup by reducing the possibility of a backup-device malfunction. If a malfunction
occurs in one device, the other device can still proceed with the backup. A mirrored backup set
can only be created if the tape devices are from the same manufacturer and have the same serial
number. The tape devices used on CERTKILLER-DB01 are similar, but not the same model. The
stop_on_error keyword is used to stop a backup if a checksum does not verify. This is the default
behavior and does not need to be specified.
B: You cannot create a mirrored backup media sets using the checksum keyword or the
stop_on_error keyword during the backup. A mirroring backup media set can increase the
reliability of the backup by reducing the possibility of a backup-device malfunction. If a malfunction
occurs in one device, the other device can still proceed with the backup. A mirrored backup set
can only be created if the tape devices are from the same manufacturer and have the same serial
number. The tape devices used on CERTKILLER-DB01 are similar, but not the same model. You

"Pass Any Exam. Any Time." - www.actualtests.com 101


Microsoft 70-450: Practice Exam
should add the checksum keyword in the backup statement to ensure that checksums are
performed. no_checksum is the default. You also cannot create a mirrored backup media sets
using the checksum keyword during the backup.
C: You should not create a media set and use the stop_on_error keyword during the backup. This
is the default behavior and does not need to be specified.

QUESTION NO: 109

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to set up
database mirroring with a witness server whilst ensuring that automatic failover to the mirror server
is available when CERTKILLER-DB01 goes down.

m
What should you do?
.co
A. You should consider making use of the full quorum of the witness-to-partner quorum.
B. You should consider making use of the partner-to-partner quorum only.
sts
C. You should consider making use of the witness-to-partner quorum only.
D. You should consider making use of the full quorum only.
lTe

Answer: A

Explanation:
tua

In this scenario, either full quorum or witness-to-partner quorum would meet the requirement. You
can set either of the two quorums for the automatic failover to the mirror server if principal server is
out of quorum. Three types of quorums can be configured:
Full quorum: In full quorum, there are three servers involved: a witness server, a principal server,
Ac

and a mirror server. All three servers interact with each other in a full quorum. If the principal
server fails, the mirror server takes over the role of the principal server. There is automatic failover
initiated by the witness server and the mirror server will be designated as the principal server.
When the principal server comes online in the quorum, it becomes the mirror server. On the other
hand, if the mirror server fails, the principal server suspends mirroring, and then resynchronizes its
copy of the database when the mirror server returns.
Witness-to-partner quorum: In this quorum, there is either a principal or a mirror server and one
witness server. If the mirror server is out of quorum, the principal server continues with the witness
server. However, the principal server keeps the database in an exposed state, meaning the
database is currently not being mirrored with its mirrored copy. In another condition where the
principal server fails, the witness server initiates the automatic failover and the mirror server is
assigned the role of principal server.

"Pass Any Exam. Any Time." - www.actualtests.com 102


Microsoft 70-450: Practice Exam
Incorrect Answers:
B: Partner-to-partner quorum: In this quorum, there is no witness server. Without the witness
server, automatic failover will not be supported. A database administrator will have to perform
manual failover if the principal server becomes unavailable. Only when the witness server is back
online will automatic failover be possible.
C: For an automatic failover to be applicable in a quorum, a witness server must be present.
Partner-to-partner quorum does not have a witness server, and therefore does not have the
capability for automatic failover.
D: For an automatic failover to be applicable in a quorum, a witness server must be present.
Partner-to-partner quorum does not have a witness server, and therefore does not have the
capability for automatic failover.

QUESTION NO: 110

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
.co
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to configure
high availability for the CK_SALES database by using database mirroring. CertKiller.com has
sts

additionally requested that you configure automatic failover database mirroring sessions whilst
improving reliability of the automatic failover.
lTe

What should you do? (Choose all that apply)

A. You should consider having the database mirroring session configured with a witness server.
tua

B. You should consider having the database mirroring session configured to run in synchronous
mode.
C. You should consider having the database mirroring session configured to run in asynchronous
Ac

mode
D. You should consider having the database mirroring sessions stored on different computers.
E. You should consider having the database mirroring sessions stored on a single computers.

Answer: A,B,D

Explanation:
Failover clusters provide high availability for an entire instance of SQL server, whereas database
mirroring provides high availability for a single database. When you want to use database
mirroring with failover clusters, both the principal server and mirror server should reside on
different clusters. However, a mirroring session can also be established when one partner resides
on the failover clustered instance of a cluster and the other partner resides on a separate,
unclustered computer. When you use database mirroring with failover clusters, the database
mirroring sessions can be configured for automatic failover. To support automatic failover, the

"Pass Any Exam. Any Time." - www.actualtests.com 103


Microsoft 70-450: Practice Exam
database mirroring session must be running with a witness in synchronous or high-safety mode. In
synchronous or high-safety mode, a transaction is committed on both servers, which ensures that
the mirror database is in synchronization with the principal database. To improve the reliability of
automatic failover, the principal database and the mirror database must reside on different
computers.
SQL Server 2008 also allows you to configure manual failover. Manual failover can be used to
perform a rolling upgrade to the server operating system or SQL Server instances. To achieve
this, you must ensure that you upgrade the mirror server first before initializing mirroring. Manual
failover is only supported by synchronous or high-safety mode.
Incorrect Answers:
C: The option stating that the database mirroring session must be running in asynchronous mode
is incorrect. To support automatic failover, the database mirroring session must be running with a
witness in synchronous or high-safety mode. In asynchronous or high-performance mode, the
transactions commit without waiting for the mirror server to write the log to disk. This will not
guarantee that the mirror database is updated with all the transactions committed on the principal

m
database.
E: The option stating that the principal database and the mirror database must be stored on a
.co
single computer is incorrect because this will not improve the reliability of automatic failover. When
both the principal and mirror databases are stored on a single computer, both the databases will
sts
become unavailable if the computer fails. In this case, automatic failover will not occur.
lTe

QUESTION NO: 111

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


tua

Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to move all
the operators and alerts from CERTKILLER-DB01 in the testing environment to a server named
Ac

CERTKILLER-DB02 in the production environment. CertKiller.com is aware that both servers are
running the same build and edition of SQL Server 2008 with different hardware.

What should you do?

A. You should consider having the master database on CERTKILLER-DB01 backed up and
restore the master database on CERTKILLER-DB02 to move the operators and alerts.
B. You should consider having the sysjobs, sysnotifications, and sysalerts tables for
CERTKILLER-DB01 copied to the appropriate database on CERTKILLER-DB02 to move the
operators and alerts.
C. You should consider having the model database on CERTKILLER-DB01 backed up and restore
the master database on CERTKILLER-DB02 to move the operators and alerts.
D. You should consider having the msdb database on CERTKILLER-DB01 backed up and restore
the msdb database on CERTKILLER-DB02 to move the operators and alerts.
"Pass Any Exam. Any Time." - www.actualtests.com 104
Microsoft 70-450: Practice Exam
Answer: D

QUESTION NO: 112

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts several databases
containing mission critical data. During the course of the day you receive instruction from
CertKiller.com to have the flexibility to revert the source database back to a specific point if there is
any error in the database whilst ensuring you are capable of retrieving historical data and use the
data for reporting and the backup should also be used for reporting purposes.

What should you do?

m
A. You should consider having the database mirrored using a full quorum.
B. You should consider configuring log shipping.
C. You should consider creating a full backup.
D. You should consider creating a database snapshot.
.co
sts
Answer: D

Explanation:
lTe

To meet the required goal in the scenario, you should create a database snapshot. Snapshots
provide a read-only image of the database that has a full working image of the database from the
time when the snapshot was created. Only committed transactions are part of the snapshot. If
tua

there is any open and uncommitted transaction on the database, it will not be a part of the
snapshot. If you have a snapshot readily available and there is any issue with the database, you
can bring the snapshot online but ensure that it is on the same SQL Server instance from where
the snapshot was created. Snapshots are typically used for reporting purposes.
Ac

Incorrect Answers:
A: You should not mirror the database with a full quorum. In a full quorum, there are three servers
involved: a witness server, a principal server, and a mirror server. All three servers interact with
each other. If the principal server fails, the mirror server takes over the role of the principal server
and automatic failover is initiated by the witness server. The mirror server, in this case, will be
designated as the principal server. If there is an error in the database or erroneous data in a table,
this data can be mirrored from the principal server to the mirrored server. If the mirror server fails,
the principal server suspends mirroring, and then resynchronizes its copy of the database when
the mirror server returns. This solution will not meet the requirement stated in the scenario.
B: You should not use log shipping. Log shipping will not help you revert to the database from the
point where you had taken the backup of the source database. Log shipping is used for backing up
transaction logs from the primary to the secondary server. You could also have a monitor server,
which will be the third server, to track transaction log updates from the primary to the secondary

"Pass Any Exam. Any Time." - www.actualtests.com 105


Microsoft 70-450: Practice Exam
server. If there is an error in the database or erroneous data in a table, this data can be mirrored
from the primary server to a secondary server. This solution will not meet the requirement stated in
the scenario.
C: You should not create a full back backup of the database. Even though backup will be used if
the database or the entire server goes down, you typically do not use a backup for reporting
purposes. You can use report snapshots to maintain historical reports.

QUESTION NO: 113

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_PRODUCT.

CK_PRODUCT is spanned across multiple disks. You receive an instruction from the CIO to add a

m
read-only filegroup to the CK_PRODUCT that will enclose historical data. You configure the
backup schedule for CK_PRODUCT as follows:A full backup will run on Mondays, Wednesdays
.co
and Fridays at 02:00 am.A Transaction Log backup will run every day at 08:00 am.A Transaction
Log backup will run every day at 14:00 pm.A differential backup will run on Tuesdays, Thursdays
and Saturdays at 01:00 am.
sts

In the event of a failure you need to be able to restore CK_PRODUCT up till the point of failure.
lTe

You need to determine a way to achieve this.

What should you do?


tua

A. You should consider moving the transaction log to another drive than that of the data files.
B. You should consider increasing the frequency of the transaction log backups.
C. You should consider increasing the frequency of the differential backups.
Ac

D. You should consider adding a filegroup backup of the read-only database.

Answer: A

Explanation:
Not only should you have the transaction log on a different drive than the data files for
performance reasons, you should have them on different drives for recovery purposes. If the
transaction log file is on a different drive than the database files and the drive that contains the
database files fails, you can still make a backup of the transaction log, referred to as a tail-log
backup. If the transaction log is on the same drive as the database files and the drive fails, you
cannot recover the database up to the point of failure.
To perform a complete restore up to the point of failure, you should do the following:
Restore the latest full backup by typing RESTORE DATABASE CK_PRODUCT FROM full
database backup WITH NORECOVERY;

"Pass Any Exam. Any Time." - www.actualtests.com 106


Microsoft 70-450: Practice Exam
Restore the latest differential backup since the last full backup by typing restore database
CK_PRODUCT from full_differential_backup WITH NORECOVERY;
Restore the transaction logs from the last differential in order by typing restore log CK_PRODUCT
from log_backup with NORECOVERY;
Repeat this restore-log step for each additional log backup since the last differential backup
Restore the tail-log backup that you created after the database failure by typing restore log
CK_PRODUCT from taillog_ backup WITH NORECOVERY;
Recover the database by typing restore database CK_PRODUCT with recovery;
Incorrect Answers:
B: You should not Increase the frequency of transaction log backups or increase the frequency of
differential backups. Increasing the frequency of the transaction log backups and differential
backups will help to recover data. However, unless you can create a tail-log backup as well, you
will not restore the database back to the point of failure.
C: You should not Increase the frequency of transaction log backups or increase the frequency of
differential backups. Increasing the frequency of the transaction log backups and differential

m
backups will help to recover data. However, unless you can create a tail-log backup as well, you
will not restore the database back to the point of failure.
.co
D: You should not add a filegroup backup. A filegroup backup may not allow the database to
recover to the point of failure. You will need a tail-log backup to get the database back to the point
sts
of failure.
lTe

QUESTION NO: 114

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


tua

Microsoft SQL Server 2008 for hosting databases. You are responsible for a database server
named CERTKILLER-DB01 that hosts a database named CK_ORDERS.

At present CK_ORDERS is configured to run a full backup daily and transaction log backups
Ac

hourly. The checksun keyword is included in all backup statements. There are two tape devices
from different manufacturers in CERTKILLER-DB01. However, the tape devices make use of the
same media and have the same capacity. The hard drives in CERTKILLER-DB01 are the same
model and have the same capacity.

Management wants you to increase the reliability of the backups, decrease the chances of data
loss as well as reduce the impact of backup-device malfunctions. You decide to implement
mirrored backup media sets to accomplish this.

How can this be accomplished?

A. BACKUP DATABASE CK_ORDERS


TO DISK ='E:\SQL2008\CK_Orders.bakl'MIRROR TO DISK =
'F:\SQL2008\CK_Orders.bak2'WITH MEDIANAME = 'CK_OrdersSetl';
"Pass Any Exam. Any Time." - www.actualtests.com 107
Microsoft 70-450: Practice Exam
B. BACKUP DATABASE CK_ORDERS
TO TAPE = '\\.\tape0'MIRROR TO TAPE = '\\.\tapel'WITH MEDIANAME = 'CK_OrdersSetl';
C. sp_addbackupdevice media= 'CK_OrdersSetl", device='\\.\tape0', device='\\.\tape1', MIRROR
DEVICE
D. BACKUP DATABASE CK_ORDERS
TO DISK = 'E:\SQL2008\CK_Orders.bakl'MIRROR TO DISK =
'E:\SQL2008\CK_Orders.bak2'WITH MEDIANAME = 'CK_OrdersSetl';

Answer: A

Explanation:
You should use the backup database statement to specify that you will back up the Sales
database. You must also specify the Mirror TO clause. You can mirror to disk or tape; however,
the backup devices must have the same model number and be from the same manufacturer. In
this scenario, CERTKILLER-DB01 has two tape drives from different manufacturers, but multiple

m
hard drives that are from the same manufacturer and are the same model.
Incorrect Answers:
.co
B: You can create a mirrored media set with the hard drives in CERTKILLER-DB01, not with the
tape drives. Therefore, you should not use the following statement:BACKUP DATABASE
CK_ORDERS TO TAPE = '\\.\tape0'MIRROR TO TAPE = '\\.\tape1'WITH MEDIANAME =
sts
'CK_OrdersSet1';
C: You should not use either statement that uses the sp_addbackupdevice statement. This stored
procedure was deprecated in SQL Server 2000. You cannot use this stored procedure in SQL
lTe

Server 2008.
D: You should not use the following statement because backup devices are being created on the
same drive:BACKUP DATABASE CK_ORDERS TO DISK =
tua

'E:\SQL2008\CK_Orders.bak1'MIRROR TO DISK = 'E:\SQL2008\CK_Orders.bak2'WITH


MEDIANAME = 'CK_ORdersSet1'. You can mirror backup devices on the same drive. However, if
there is an error with the drive, then both of your backup devices will be affected. You should have
Ac

the backup devices on separate drives.

QUESTION NO: 115

You work as a database administrator at CertKiller.com. You are responsible for administering the
Microsoft SQL Server 2008 servers. CertKiller.com has its headquarters in London and a branch
office in Paris.

Due to company growth the company opens another branch office in Athens. The Athens office is
allocated a new SQL server. You receive an instruction from the CIO to ensure that a full backup
of CK_DATA is shipped from the Athens office to the London office weekly. You need to make
sure that the shipped backup does not have any effect on the scheduled backups for CK_DATA.
You need to determine the statement the server operator should enter at the Athens office in order

"Pass Any Exam. Any Time." - www.actualtests.com 108


Microsoft 70-450: Practice Exam
to execute the backup.

What should you identify?

A. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak',


[FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA
Full Database Backup', SKIP, NOREUIND, NOUNLOAD, DIFFERENTIAL
B. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak',
[FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA
Full Database Backup', SKIP, NOREWIND, NOUNLOAD
C. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak',
[FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA
Full Database Backup', SKIP, NOREWIND, NOUNLOAD, COPY_ONLY
D. BACKUP DATABASE [CK_DATA] TO DISK = N'F:\Backup\CK_Data.bak',
[FullBackup] WITH NOFORMAT, NOINIT, NAME = N'CK_DATA

m
Full Database Backup', SKIP, NOREWIND, NOUNLOAD, DIFFERENTIAL,
COPY_ONLY

Answer: C
.co
sts
Explanation:
In this scenario, the SQL server operator should create a copy-only backup. This type of backup is
independent of the sequence of any current backups. Copy-only backups are useful for making a
lTe

backup to transport to another location because they will not affect the current sequence of regular
backups.
Incorrect Answers:
tua

A: If the differential parameter and copy only parameter are used together, the copy only
parameter is ignored.
B: This statement will perform a full backup that could disrupt the regular sequence of backups
Ac

that are performed in the Atlanta office. The SQL server operator should include the copy_only
parameter to perform a copy-only backup that will not interrupt the sequence of backups.
D: This statement will perform a differential backup. In this scenario, you need a full backup not a
backup of everything that has changed since the last backup.

QUESTION NO: 116

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_DATA. During the course of the day you receive instruction from CertKiller.com to create a
script to make a backup of the changed data only since the last full backup of the CK_DATA
database. CertKiller.com wants the backup to be part of the regular backup routine whilst

"Pass Any Exam. Any Time." - www.actualtests.com 109


Microsoft 70-450: Practice Exam
continuing to append the backup to the media.

What should you do?

A. You should consider adding the statement below in the script:


BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak' [Fullback]
WITH INIT, NAME = N'CK_DATA-Full Database Backup',
SKIP, NOREWIND, NOUNLOAD, DIFFERENTIAL
B. You should consider adding the statement below in the script:
BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak', [Fullback]
WITH NOFORMAT, NOINIT, NAME = N'CK_DATA-Full Database Backup',
SKIP, NOREWIND, NOUNLOAD
C. You should consider adding the statement below in the script:
BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak', [Fullback]
WITH NOFORMAT, NOINIT, NAME = N'CK_DATA-Full Backup',

m
SKIP, NOREUIND, NOUNLOAD, COPY_ONLY
D. You should consider adding the statement below in the script:
.co
BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_DATA.bak', [Fullback]
WITH NOFORMAT, NOINIT, NAME = D'CK_DATA-Full Database Backup',
SKIP, NOREHIND, NOUNLOAD, DIFFERENTIAL, COPY_ONLY.
sts

Answer: D
lTe

Explanation:
This statement will perform a differential backup that will back up the changes made in the
database since the last full backup. This statement also includes the differential parameter and the
tua

copy_only parameter. If both of these parameters are in the statement, the copy_only parameter is
ignored and the differential parameter is used.
When you perform a full backup, it resets the base backup. A differential backup takes all data that
Ac

has changed since the last full backup. If you were to perform another full backup in between the
current backup sequence of Full, Differential and Transaction log backups, you would disrupt the
regular backup schedule. Copy-only backups are useful for making a backup to transport to
another location because it will not affect the current sequence of regular backups.
You can use the backup database command to back up a database. The following are options
with the backup database command:
copy_only -allows a copy-only backup.
differential -backs up only the portions of the database or file that have changed since the last full
backup. If the DIFFERENTIAL parameter and COPY_ONLY parameter are used together, the
COPY_ONLY parameter is ignored. disk -specifies the destination of the backup.
noformat -does not format the media.
init -initializes the media and does not allow backups to be appended to media.
noinit -does not initialize the media and allows backups to be appended to media.
name -specifies name of the backup.

"Pass Any Exam. Any Time." - www.actualtests.com 110


Microsoft 70-450: Practice Exam
skip -Ignores the backup set expiration.
norewind -does not rewind media.
NOUNLOAD -does not unload media after the backup operations is complete.
Incorrect Answers:
A: This statement will not perform a differential backup, but will perform a full backup instead. The
scenario required you to make a differential backup. This statement also contains the INIT
parameter, which will not append backups. In this scenario, you were required to append backups.
B: This statement will not perform a differential backup, but will perform a full backup instead. The
scenario required you to make a differential backup.
C: This statement will perform a differential backup, but this statement also contains the INIT
parameter, which will not append backups. In this scenario, you were required to append backups.
Part 2: Design a recovery strategy (27 Questions)

QUESTION NO: 117

m
You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 database solution.
.co
Data modifications are executed via stored procedures that make use of the INSERT, UPDATE or
sts

DELETE statements. You are in the process of implementing a backup strategy. Management
wants you to make sure that the subsequent requirements are met:Point-in-time recovery in the
lTe

event of failure should be supported at any time.A minimum amount of disk space should be used
by the transaction log.
tua

What should you do?

A. Your best option would be to make use of Microsoft Multipath in conjunction with differential
backups.
Ac

B. Your best option would be to make use of Storage Reports Management snapshots.
C. Your best option would be to make use of the full-recovery model in conjunction with
transaction log backups.
D. Your best option would be to configure caching on the shared folder.

Answer: C

QUESTION NO: 118

You are employed as a database administrator at CertKiller.com. You are responsible for
administering a SQL Server 2008 server named CERTKILLER-DB01 with an instance that hosts a
database named CK_DATA.

"Pass Any Exam. Any Time." - www.actualtests.com 111


Microsoft 70-450: Practice Exam
The table below displays the backup strategy used CK_DATA:

You decide to run a batch process on Saturday from 20:00 pm to 22:00 pm. It has come to your
attention that the batch process is invalidated. This occurred when a client modified data on
Saturday at 20:10 pm. Management wants you to restore CK_DATA to the state prior to the start
of the batch process. You need to accomplish this task in the least amount time.

What should you do?

m
A. This can be accomplished by using the Windows System Resource Manager (WSRM).
Thereafter the entire database should be restored. .co
B. This can be accomplished by restoring the full database backup that was executed on
Thursday.
sts
Then restore the differential backup that was executed on Friday.
Thereafter the transaction logs should be restored from the time of the differential backup on
Friday and stop at 20:00 pm on Saturday.
lTe

C. This can be accomplished by installing a failover cluster that contains one node.
D. This can be accomplished by use a two-node failover cluster.
tua

Answer: B
Ac

QUESTION NO: 119

CertKiller.com has hired you as a database administrator for their network. Your duties include
administering the SQL Server 2008 infrastructure.

You are in the process of implementing a corporate backup and recovery strategy. This strategy
needs to be validated. Management wants you to guarantee the successful recovery of a single
database from a disastrous failure without needing a backup data center in another location. You
need to determine the tasks that need to be included.

What should you do? (Choose all that apply.)

A. You should consider using the cluster group.


B. You should consider scripting the SQL login accounts as well as the credentials.

"Pass Any Exam. Any Time." - www.actualtests.com 112


Microsoft 70-450: Practice Exam
C. You should consider using the SQL Server registry hive.
D. You should consider documenting the administrative processes as well as the application
access requirements.
E. You should consider storing the backup media offsite.

Answer: B,D,E

QUESTION NO: 120

You are employed as a database administrator at CertKiller.com. You are responsible for
administering the SQL Server 2008 servers for the organizations. You are assigned a database
server named CERTKILLER-DB01 with an instance named CK_SALES.

During routine monitoring you discover that the disk containing the FILESTREAM filegroup has

m
failed. You ordered a replacement disk but will only be available in seven days. You do not
anticipate new information to be added to the database the following seven days.
.co
You attempt to execute a partial restore on CK_SALES. You are able to restore the filegroups
excluding for the FILESTREAM filegroup. You then decide to execute a point-in-time restore,
sts
however, it fails. You need to determine a way to successfully restore the filegroup.

What should you do?


lTe

A. In order to make the make the point-in-time restore succeed you need to specify the
continue_after_error option in conjunction with stopat, stopatmark, or stopbeforemark.
tua

B. In order to make the make the point-in-time restore succeed you need to specify the checksum
option in conjunction with stopat, stopatmark, or stopbeforemark.
C. In order to make the make the point-in-time restore succeed you need to specify the checksum
Ac

option in conjunction with the standby option.


D. In order to make the make the point-in-time restore succeed you need to specify the
continue_after_error option in conjunction with the standby option.

Answer: A

Explanation:
When performing a partial restore that requires a point-in-time restore you must include one of the
stopat , stopatmark , or stopbeforemark options. If a FILESTREAM filegroup is excluded from a
point-in-time restore, the point-in-time restore will fail. For the point-in-time restore to continue, you
can specify the continue_after_error option together with the stopat , stopatmark , or
stopbeforemark . This will allow the restore to continue, but the FILESTREAM filegroup will
become unrecoverable. In this scenario, the database on the CERTKILLER-DB01 instance will be
able to operate until the new disk arrives, after which you can begin a full restore. Any data that
has been added to the database after the partial restore was performed would have to be
"Pass Any Exam. Any Time." - www.actualtests.com 113
Microsoft 70-450: Practice Exam
recreated.
Incorrect Answers:
B: You should not specify the checksuh option together with the stopat, stopatmark, or
stopbeforemark options. The checksum option checks each page for checksum verification and
torn page corruption and will generate a checksum for the entire backup. The backup will be
flagged as containing backup checksums in the backupset table in the msdb database. This option
will not help a point-in-time restore succeed if a FILESTREAM filegroup is not available for
restore.C; D: You should not specify checksum option or the continue_after_error option together
with the standby option. The standby option backs up the tail of the log, but leaves the database in
read-only state. This option requires a standby file that holds the standby data of rollback changes.
In this scenario, the STANDBYoption will not help a point-in-time restore succeed if a
FILESTREAM filegroup is not available for restore.

QUESTION NO: 121

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_SALES.
sts

CERTKILLER-DB01 contains a number of identical drives from the same manufacturer.


CK_SALES contains the FILESTREAM data and makes use of the full recovery model. The script
lTe

below is used to backup CK_SALES:

BACKUP DATABASE CK_SALES TO DISK=' Z:\CK_Backups\CK_SALES1.bak',


tua

CONTINUE_AFTER_ERROR
GO

Management wants you to make sure that you are able to restore CK_SALES in the event of a
Ac

disaster. You thus need to determine the appropriate changes that have to be made to the script
to accomplish this.

What should you do?

A. This can be achieved by using a mirrored media set for backup.


B. This can be achieved by using an extra drive to mirror drive Z.
C. This can be achieved by removing the continue_after_error keyword from the backup database
statement.
D. This can be achieved by adding the compression keyword in the backup database statement.

Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com 114


Microsoft 70-450: Practice Exam
Explanation:
The continue_after_error keyword is used to allow a backup to finish if an error is encountered. If
you have FILESTREAM data in the backup, the FILESTREAM data many not recover all data if an
error is encountered during the backup. The default setting of the backup database statement is
stop_on_error .
Incorrect Answers:
A: You should not use a mirrored media set for backup. A mirrored media set for backup can be
used to have fault tolerance with your backup devices. The devices should have the same
manufacturer and be the same model. If there is an error with a page or object in the database, a
mirrored media set will not prevent the error from being written to both backup devices.
B: You should not create a mirror drive for drive Z. A mirrored drive will provide fault tolerance in
case one drive fails. However, if your backup device is on a mirrored drive and the backup
encounters errors with a page or object in the database, the mirrored drive will not prevent the
errors from being written to the backup device.
D: You should not add the compression keyword in the backup database statement. This keyword

m
can be used to get more data on a backup device, but does not prevent errors from being written
to the device.
.co
sts
QUESTION NO: 122

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


lTe

Microsoft SQL Server 2008 for hosting databases. You are responsible for a database server
named CERTKILLER-DB01 hosts a database named CK_ORDERS.
tua

You enable Transparent Data Encryption (TDE) on CK_ORDERS. You decide to test a new
application that will be responsible for updating records in CK_ORDERS. The new application will
require:The TCP/IP network library.SSL encryption established on the server to guarantee a
secure connection.
Ac

You receive an instruction from the CIO to restore a backup of the CK_ORDERS onto a second
SQL Server 2008 server in a test environment. However, your attempt to restore the backup fails.
You thus need to determine what needs to be restored in order to rectify the error.

What should you do?

A. You should consider restoring the database master key.


B. You should consider restoring the SSL session key.
C. You should consider restoring the service master key.
D. You should consider restoring the SSL certificate.

Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com 115


Microsoft 70-450: Practice Exam
Explanation:
You must restore the service master key onto the second SQL Server 2008 server. The restore
operation failed in this scenario because the correct server certificate cannot be found and the
encrypted data is inaccessible. Although TDE encryption is completely transparent to client
applications, the data is encrypted and backup cannot be restored to other servers without the
server master key. When the service master key is restored, SQL Server can decrypt all keys that
been encrypted with the current service master key, including the database master key.
Incorrect Answers:
A: You should not restore the database master key. The entire user database is secured by the
database master key. However, you will need to restore the service master key to decrypt the
database master key. Restoring the service master key allows SQL Server to decrypt all keys that
have been encrypted with the service master key.
B: You do not need to restore the SSL session key or the SSL certificate. In the scenario, the
application requires a secure SSL connection to the SQL Server. Enabling a secure connection
between the application and the SQL Server will not cause an error in restoring a database. The

m
error is caused because the data is encrypted and the backup cannot be restored to other servers
without the server master key. If you need to force encryption between a client and a SQL Server,
.co
you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL
Server instance.
sts
D: You do not need to restore the SSL session key or the SSL certificate. In the scenario, the
application requires a secure SSL connection to the SQL Server. Enabling a secure connection
between the application and the SQL Server will not cause an error in restoring a database. The
lTe

error is caused because the data is encrypted and the backup cannot be restored to other servers
without the server master key. If you need to force encryption between a client and a SQL Server,
you can use the SQL Server Configuration Manager to set Force Encryption to Yes on the SQL
tua

Server instance.
Ac

QUESTION NO: 123 DRAG DROP

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a SQL
server named CERTKILLER-DB01.

You are in the process of performing daily full backups to all the databases on CERTKILLER-
DB01. You notice that errors occur when the server reboots after a power failure. You check and
discover that CERTKILLER-DB01 has to be rebuilt.

You continue to restore the other databases and discover numerous errors. You check and
discover that there are orphaned users in the Accounts database. You need to determine a way to
discover and resolve the orphaned users.

"Pass Any Exam. Any Time." - www.actualtests.com 116


Microsoft 70-450: Practice Exam
What should you do? (Click the steps on the left and place them in the correct order on the right to
detect orphaned users, and relink the logins to the users. It may not be necessary to use all the
steps provided.)

m
Answer:

.co
sts
lTe
tua
Ac

QUESTION NO: 124

You are the newly appointed database administrator at CertKiller.com. You are responsible for
administering the Microsoft SQL Server 2008 server.

You have received instruction from the CIO to configure log shipping between CERTKILLER-DB02
and CERTKILLER-DB03. CERTKILLER-DB02 is configured as the primary server and
CERTKILLER-DB03 as the secondary server. You discover during routine maintenance that a disk
failed on CERTKILLER-DB02. This disk contains the user database that is configured for log
shipping. To ensure productivity you need to bring CERTKILLER-DB03 online with the latest
CERTKILLER-DB02 database state.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 117


Microsoft 70-450: Practice Exam
Which step do you need to perform to bring the secondary server online?

A. This can be accomplished by disabling the backup jobs on CERTKILLER-DB02.


B. This can be accomplished by backing up the transaction logs from CERTKILLER-DB02 to
CERTKILLER-DB03 using the with norecovery clause.
C. You do not need to execute any steps since CERTKILLER-DB03 will have the synchronized
copy of the database and it will automatically come up.
D. This can be accomplished by deleting the transaction logs as well as the database data files
from CERTKILLER-DB02.
Thereafter the files can be restored on CERTKILLER-DB03 from a shared location.

Answer: B

Explanation:
Backup files which are not already on CERTKILLER-DB03 need to be copied onto the
CERTKILLER-DB03. These backup files might be stored in the network shares where you store

m
your backups for the SQL Server. The transaction logs must be restored on the CERTKILLER-
DB03. You need to back up the transaction logs from the CERTKILLER-DB02 to the
.co
CERTKILLER-DB03 using the with norecovery clause. When you back up transaction logs from
the CERTKILLER-DB02 using the with norecovery clause, the database in the CERTKILLER-
sts
DB02 goes into the restoring state. In this state, the database is not available to users. On
CERTKILLER-DB03 you need to apply the transaction logs to roll the database forward. After you
roll the database forward on CERTKILLER-DB03, the CERTKILLER-DB03 is synchronized with
lTe

the CERTKILLER-DB02 and is updated with the latest information. After CERTKILLER-DB03 is
configured as the primary server, You can now redirect the SQL clients to CERTKILLER-DB03.
CERTKILLER-DB03 can be configured as the CERTKILLER-DB02 for various other secondary
tua

servers.
Incorrect Answers:
A: You should not disable all backup jobs on CERTKILLER-DB02. You do not disable all backup
Ac

jobs on CERTKILLER-DB02. You only disable log shipping backup job when you are performing a
role change between CERTKILLER-DB02 and CERTKILLER-DB03.
C: The option stating that you do not need to perform any steps is incorrect. Database Mirroring
and Clustering provide automatic failover. Log shipping does not. To bring CERTKILLER-DB03
online, you need to perform manual failover from CERTKILLER-DB02 to the CERTKILLER-DB03.
The manual failover process requires you to back up the transaction logs from CERTKILLER-
DB02 and then restore them on the CERTKILLER-DB03 and so on.
D: You should not delete the transaction logs and the database data files from the CERTKILLER-
DB02 and restore the files on CERTKILLER-DB03 from a shared location. You do not delete files
from CERTKILLER-DB02. You can restore the latest database backup files from a network share
or any other storage location.

"Pass Any Exam. Any Time." - www.actualtests.com 118


Microsoft 70-450: Practice Exam
QUESTION NO: 125

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to have
FILESTREAM enabled in CK_SALES so that you are able to store MS Word documents in the
CK_SALES database. CertKiller.com wants you to determine the first step of the operation.

What should you do?

A. You should consider having T-SQL and local file system access enabled.
B. You should consider having FILESTREAM enabled using the sp_filestream_configure stored
procedure.
C. You should consider having a filegroup created.

m
D. You should consider having a table created with Binary Large Object (BLOB) column.

Answer: B

Explanation:
.co
To enable FILESTREAM in a database instance, you first need to enable FILESTREAM using the
sts
stored procedure named sp_fiIestream_configure . This is the first step in enabling FILESTREAM
for a database instance. For instance, you can execute the stored procedure with @ enable_level
and @ share_name parameters:
lTe

EXEC sp _filestream_configure@enable_level = 2, @ share_name = N '


WordDocumentsShare ';
In this case, FILESTREAM will be enabled for the database instance. The parameter enablejevel
tua

allows you to configure T- SQL, local file system access, or remote file system access depending
on which value is assigned. The value 2 allows only T- SQL and local file system access. The
share_name parameter creates a file share that is used for accessing BLOB. If you do not want to
Ac

use the stored procedure for enabling FILESTREAM, you can also use SQL Server Management
Studio (SSMS).
Creating a filegroup is the second step in enabling FILESTREAM for a database instance. This
step must be performed after enabling FILESTREAM. You need to use the CONTAINS
FILESTREAM attribute to create a filegroup .

The data in FILESTREAM is actually stored on the file system, which provides a number of
benefits. For instance, you will be able to compress data with the NTFS compression capabilities.
A Word document that is stored on the file system will be compressed with the NTFS compression
capabilities. When the data is stored, it is in compressed form, and when the data is retrieved, it is
decompressed.

"Pass Any Exam. Any Time." - www.actualtests.com 119


Microsoft 70-450: Practice Exam

QUESTION NO: 126

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you make full backups once a day of the CK_SALES
database. You have later discovered that there are errors when CERTKILLER-DB01 reboots after
a power failure. CertKiller.com wants you to have CERTKILLER-DB01 rebuild. The operating
system starts fine but the SQL Server service will not start. CertKiller.com wants to know what
should be done to rebuild CERTKILLER-DB01.

What should you do? (Choose all that apply)

A. You should consider having a tail-log backup created of the msdb database.

m
B. You should consider making use of a tail-log backup of the tempdb database
C. You should consider having the tempdb database restored.
.co
D. You should consider making use of the msdb database restored.
E. You should consider making use of the rebuildm.exe utility to rebuild the master database.
F. You should consider making use of the setup.exe utility from the SQL Server 2008 media with
sts
the rebuilddatabase keyword to rebuild the master database.

Answer: A,D,F
lTe

Explanation:
You will have to restore the master database to rebuild an SQL server instance. If you cannot get
tua

the SQL server service to start, you will have to rebuild the master database before you can
restore it. After rebuilding the master database, you will have to restore not only the master
database, but also the model and msdb databases.
Ac

You should make a tail-log backup of the msdb database and restore the msdb database. The
msdb database contains job information and any scheduled jobs. You should restore any
database backups for the msdb database and any log backups since the last full backup. You
should restore the tail-log backup to ensure that you can get the msdb database back up to the
point of failure.
Incorrect Answers:
B: You do not have to make a tail-log backup of the tempdb database or restore the tempdb
database. The tempdb database contains temporary objects. The tempdb database is recreated
when the SQL server service restarts.
C: You do not have to make a tail-log backup of the tempdb database or restore the tempdb
database. The tempdb database contains temporary objects. The tempdb database is recreated
when the SQL server service restarts.
E: You should not use the rebuildme.exe utility to rebuild the master database. This program was

"Pass Any Exam. Any Time." - www.actualtests.com 120


Microsoft 70-450: Practice Exam
used to rebuild the master database in SQL Server 2000, but the program was discontinued in
SQL Server 2005.

QUESTION NO: 127

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES configured to use the Full Recovery model by default. During the course of the day
you are instructed by CertKiller.com to develop a new backup strategy which keeps downtime to a
minimum.

CertKiller.com wants the backup strategy configured to have the database restored as quickly as
possible if a database failure occurs whilst ensuring that database can be restored as close as

m
possible to the point of failure.

What should you do?


.co
A. You should consider having a full database backup performed each Friday night whilst having
sts
differential backups performed each Monday, Thursday, Wednesday and Thursday night.
You should then have the transaction log back up every hour during business hours.
B. You should consider having a differential backup performed every other Friday night whilst
lTe

performing transaction log backups each Monday, Wednesday and Saturday nights.
C. You should consider having a full database backup performed monthly whilst having the
transaction log backups performed each Friday
tua

D. You should consider having a differential backup performed each Friday night whilst performing
transaction log backups each Monday, Wednesday and Saturday nights.
Ac

Answer: A

Explanation:
You should do the following:
You should perform a full database backup each Friday night.
You should perform differential database backups each Monday, Tuesday, Wednesday, and
Thursday night.
You should perform transaction log backups every hour during business hours.

By implementing a disaster recovery strategy that uses full database backups, differential
database backups, and transaction log backups, you can reduce the amount of time that is
involved in restoring the database to the moment of failure. Full database backups should be
performed regularly because a full backup creates a starting point for the sequence of transaction
log backups that you must restore in order to return the database to a consistent state.

"Pass Any Exam. Any Time." - www.actualtests.com 121


Microsoft 70-450: Practice Exam
Differential database backups are cumulative; each differential database backup includes all
changes made to the database since the last full database backup. Therefore, each subsequent
differential database backup includes all of the information from the previous differential backup.
Thus, more time is usually required to perform a differential backup than a series of transaction log
backups that cover the same time period. However, differential backups minimize restore time.
After restoring the latest full database backup, you do not need to restore all subsequent
differential database backups. You need to restore only the latest differential backup.
Transaction log backups, which do not contain redundant data, are necessary when a database
must be restored to a specific time. You must consecutively restore each of the transaction log
backups that have been made since the last full or differential database backup.
Incorrect Answers:
B: You should not perform your full database backups every other Friday night, differential
database backups every Monday, and filegroup backups at the end of each business day. A
filegroup backup is functionally equivalent to backing up all files in the filegroup. Generally,
filegroup backups are performed when a database is so large that a full backup becomes

m
unmanageable or when certain files change more frequently than others. However, if possible, you
should avoid performing filegroup backups because they increase administrative overhead.
.co
Additionally, filegroup backups do not include any information from a transaction log, whereas full
database backups and differential database backups do. When a filegroup backup is performed,
sts
you must also perform transaction log backups, because you must restore them to recover the
database after you have restored the filegroup backup.
C: You should not limit your full database backups to a monthly schedule, or limit transaction log
lTe

backups to each Friday. Transaction logs should be made often enough to reflect changes in the
database. Generally, you should perform a transaction log backup on a daily or hourly basis.
Performing a full backup once a month and transaction backups every week will not be sufficient
tua

to restore a database up to the point of failure.


D: You should not perform a differential database backup each Friday night and perform
transaction log backups each Monday, Wednesday, and Saturday nights. This solution does not
Ac

contain a full backup. A full backup creates a starting point for the sequence of transaction log
backups that you must restore in order to return the database to a consistent state.

QUESTION NO: 128

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES spanned across multiple disks. CertKiller.com has additionally located the transaction
logs on a separate disk subsystem for performance purposes. The backups listed below have
been scheduled for the CK_SALES database:
FullBackup1 - Full database backup performed from 08/20/2009 01:00TransactionBackup1 -
Transaction Log backup performed fromTransactionBackup2 - Transaction Log backup performed

"Pass Any Exam. Any Time." - www.actualtests.com 122


Microsoft 70-450: Practice Exam
from 08/21/2009 13:00DifferentialBackup1 - Differential Backup performed from 08/21/2009
01:00TransactionBackup3 - Transaction Log backup performed from 08/22/2009
07:00TransactionBackup4 - Transaction Log backup performed from 08/22/2009
13:00FullBackup2 - Full database backup performed from 08/23/2009 01:00TransactionBackup5 -
Transaction Log backup performed from 08/23/2009 07:00TransactionBackup6 - Transaction Log
backup performed from 08/23/2009 13:00DifferentialBackup2 - Differential Backup performed from
08/24/2009 01:00TransactionBackup7 - Transaction Log backup performed from 08/24/2009
07:00TransactionBackup8 - Transaction Log backup performed from 08/24/2009 13:00

During the course of the day on 08/24/2009 you receive reports from employees all stating that
errors are present in the CK_SALES database. You decided to check the log and notice the error
occurred at 05:42. CertKiller.com wants you to have the CK_SALES database restored to the
point of failure by selecting the order of the backup sets to restore.

What should you do?

m
A. You should consider creating a tail-log backup and restore FullBackup2, TransactionBackup5,
TransactionBackup6 and DifferentialBackup2.
You should then have the tail-log backup restored.
.co
B. You should consider restoring FullBackup2, TransactionBackup5, TransactionBackup6 and
sts
finally restore DifferentialBackup2.
C. You should consider having FullBackup2 restored and then restore DifferentialBackup2.
D. You should consider creating a tail-log backup and restore FullBackup2.
lTe

You should then restore DifferentialBackup2 and restore the tail-log backup.

Answer: D
tua

QUESTION NO: 129


Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES configured to use the Full Recovery model by default. During the course of the day
you are instructed by CertKiller.com to develop a new backup strategy which keeps downtime to a
minimum.

CertKiller.com wants the backup strategy configured to have the database restored as quickly as
possible if a database failure occurs whilst ensuring that database can be restored as close as
possible to the point of failure.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 123


Microsoft 70-450: Practice Exam
A. You should consider having a full database backup performed monthly whilst having the
transaction log backups performed each Friday.
B. You should consider having a differential backup performed each Friday night whilst performing
transaction log backups each Monday, Wednesday and Saturday nights.
C. You should consider having a full database backup performed every other Friday night whilst
having differential backups performed every Monday.
You should then have a filegroup backup performed at the end of each business day.
D. You should consider having a full database backup performed each Friday night whilst having
differential backups performed each Monday, Thursday, Wednesday and Thursday night.
You should then have the transaction log back up every hour during business hours.

Answer: D

Explanation:
You should do the following:

m
You should perform a full database backup each Friday night.
You should perform differential database backups each Monday, Tuesday, Wednesday, and
Thursday night. .co
You should perform transaction log backups every hour during business hours.
sts
By implementing a disaster recovery strategy that uses full database backups, differential
database backups, and transaction log backups, you can reduce the amount of time that is
involved in restoring the database to the moment of failure. Full database backups should be
lTe

performed regularly because a full backup creates a starting point for the sequence of transaction
log backups that you must restore in order to return the database to a consistent state.
Differential database backups are cumulative; each differential database backup includes all
tua

changes made to the database since the last full database backup. Therefore, each subsequent
differential database backup includes all of the information from the previous differential backup.
Thus, more time is usually required to perform a differential backup than a series of transaction log
Ac

backups that cover the same time period. However, differential backups minimize restore time.
After restoring the latest full database backup, you do not need to restore all subsequent
differential database backups. You need to restore only the latest differential backup.
Transaction log backups, which do not contain redundant data, are necessary when a database
must be restored to a specific time. You must consecutively restore each of the transaction log
backups that have been made since the last full or differential database backup.
Incorrect Answers:
A: You should not perform your full database backups every other Friday night, differential
database backups every Monday, and filegroup backups at the end of each business day. A
filegroup backup is functionally equivalent to backing up all files in the filegroup. Generally,
filegroup backups are performed when a database is so large that a full backup becomes
unmanageable or when certain files change more frequently than others. However, if possible, you
should avoid performing filegroup backups because they increase administrative overhead.
Additionally, filegroup backups do not include any information from a transaction log, whereas full
"Pass Any Exam. Any Time." - www.actualtests.com 124
Microsoft 70-450: Practice Exam
database backups and differential database backups do. When a filegroup backup is performed,
you must also perform transaction log backups, because you must restore them to recover the
database after you have restored the filegroup backup.
B: You should not perform a differential database backup each Friday night and perform
transaction log backups each Monday, Wednesday, and Saturday nights. This solution does not
contain a full backup. A full backup creates a starting point for the sequence of transaction log
backups that you must restore in order to return the database to a consistent state.
C: You should not limit your full database backups to a monthly schedule, or limit transaction log
backups to each Friday. Transaction logs should be made often enough to reflect changes in the
database. Generally, you should perform a transaction log backup on a daily or hourly basis.
Performing a full backup once a month and transaction backups every week will not be sufficient
to restore a database up to the point of failure.

QUESTION NO: 130 CORRECT TEXT

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com has configured the CK-SALES database with its transaction logs and
sts

database files stored on separate disk drives. During the course of the day one of the disk drives
of CERTKILLER-DB01 has failed. CertKiller.com wants you to perform a recovery of the database
lTe

up to the point of failure.

What should you do? (Choose all that apply, by placing options in the correct order)
tua
Ac

"Pass Any Exam. Any Time." - www.actualtests.com 125


Microsoft 70-450: Practice Exam
Answer:

QUESTION NO: 131

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to enable
FILESTREAM for a failover cluster of CertKiller.com.

CertKiller.com wants to know what should be kept in mind when configuring FILESTREAM in a
failover cluster? (Choose two)

A. You should keep in mind that you should have the FILESTREAM filegroup on all nodes in the

m
cluster.
B. You should keep in mind that FILESTREAM should be enabled on the primary node in the
cluster. .co
C. You should keep in mind that any node which is required to host FILESTREAM should have
FILESTREAM enabled.
sts
D. You should keep in mind that you should allow remote clients to have streaming access to
FILESTREAM data option enabled.
E. You should keep in mind that you should have the FILESTREAM filegroup on the shared disk.
lTe

Answer: C,E
tua

Explanation:
The following guidelines must be met when configuring FILESTREAM in a failover cluster:
You must have FILESTEAM filegroup on the shared disk so that it can be accessible to all nodes
in the cluster. Any node that needs to host FILESTREAM must have FILESTREAM enabled. If this
Ac

is not done, then the node cannot host FILESTREAM.


Incorrect Answers:
A: You are not required to have the FILESTREAM filegroup on all nodes. It should be enabled only
on the nodes on which you want to configure FILESTREAM.
B: Enabling FILESTREAM only on the primary node in the cluster will not work. You will need to
enable FILESTREAM on all nodes that need to host FILESTREAM data.
D: You would enable this option when you want to have remote access to FILESTREAM data. If
remote access is not required, you should not enable this option. This option is not a prerequisite
parameter to create a failover cluster with FILESTREAM data.

QUESTION NO: 132

"Pass Any Exam. Any Time." - www.actualtests.com 126


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts two database named
CK_SALES and CK_PRODUCTS which are used by an application making updates. During the
course of the day you receive instruction from CertKiller.com to make full backups everyday with
transaction log backups every hour. CertKiller.com wants the database to be restored to the same
consistent point if disaster should strike.

You have later decided to test the recovery of the databases to a marked transaction by doing the
tasks listed below:
You first created a tail-log backup of the databases.You secondly restore the most recent full
database backup.

CertKiller.com wants you to identify the most recent marked transactions available in all the
transaction log backups.

m
What should you do?
.co
A. You should look for the information in the syslogs table in the database that you are trying to
restore.
sts
B. You should look for the information in the logmarkhistory table in the master database.
C. You should look for the information in the logmarkhistory table in the msdb database.
D. You should look for the information in the logmarkhistory table in the CK_SALES and
lTe

CK_PRODUCTS databases.

Answer: C
tua

Explanation:
You can use the stopat , stopatmark or stopbeforemark keywords to have a point in time restore.
Ac

The stopat key word can be used to stop at a specific time. You can use the stopatmark or
stopbeforemark keyword to stop at a marked transaction.
Incorrect Answers:
A: You should not look in the syslogs table in the database that you are trying to restore. In
previous versions of Microsoft SQL Server, the syslogs table allowed users to see the transactions
that were in the transaction log. After SQL Server 7.0, the syslogs table was not used. The syslogs
table cannot be used with SQL Server 2008 to find the most recent marked transactions.
B: You should not look in the logmarkhistory table in either the master database or the database
that you are trying to restore. The logmarkhistory table is kept in the msdb database.
D: You should not look in the logmarkhistory table in either the master database or the database
that you are trying to restore. The logmarkhistory table is kept in the msdb database.

"Pass Any Exam. Any Time." - www.actualtests.com 127


Microsoft 70-450: Practice Exam
QUESTION NO: 133

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES spanned across multiple disks. CertKiller.com has additionally located the transaction
logs on a separate disk subsystem for performance purposes. The backups listed below have
been scheduled for the CK_SALES database:
FullBackup1 - Full database backup performed from 08/20/2009 01:00TransactionBackup1 -
Transaction Log backup performed fromTransactionBackup2 - Transaction Log backup performed
from 08/21/2009 13:00DifferentialBackup1 - Differential Backup performed from 08/21/2009
01:00TransactionBackup3 - Transaction Log backup performed from 08/22/2009
07:00TransactionBackup4 - Transaction Log backup performed from 08/22/2009
13:00FullBackup2 - Full database backup performed from 08/23/2009 01:00TransactionBackup5 -
Transaction Log backup performed from 08/23/2009 07:00TransactionBackup6 - Transaction Log

m
backup performed from 08/23/2009 13:00DifferentialBackup2 - Differential Backup performed from
08/24/2009 01:00TransactionBackup7 - Transaction Log backup performed from 08/24/2009
.co
07:00TransactionBackup8 - Transaction Log backup performed from 08/24/2009 13:00

During the course of the day on 08/24/2009 you receive reports from employees all stating that
sts
errors are present in the CK_SALES database. You decided to check the log and notice the error
occurred at 05:42. CertKiller.com wants you to have the CK_SALES database restored to the
point of failure by selecting the order of the backup sets to restore.
lTe

What should you do?


tua

A. You should consider creating a tail-log backup and restoring FullBackup2, DifferentialBackup2,
TransactionBackup7 and the tail-log backup.
B. You should consider creating a tail-log backup and restoring FullBackup2, TransactionBackup5,
Ac

TransactionBackup6, DifferentialBackup2, TransactionBackup7 and the tail-log backup.


C. You should consider restoring FullBackup2, DifferentialBackup2 and TransactionBackup7.
D. You should consider restoring FullBackup2, TransactionBackup5, TransactionBackup6,
DifferentialBackup2 and TransactionBackup7.

Answer: A

QUESTION NO: 134 DRAG DROP

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES which uses the full recovery model and has multiple online filegroups. The

"Pass Any Exam. Any Time." - www.actualtests.com 128


Microsoft 70-450: Practice Exam
CertKiller.com secondary file groups are shown below:
KingGroup1 - contains the most valued tables of the database.KingGroup2 - contains the historic
dataKingGroup3 - contains the inventory table

CertKiller.com wants you to develop a plan to do a piecemeal restore in case of a disaster.

What should you do? (Move the correct steps from the left column to the right column, and place
them in the correct order)

m
.co
sts
lTe
tua

Answer:
Ac

"Pass Any Exam. Any Time." - www.actualtests.com 129


Microsoft 70-450: Practice Exam

QUESTION NO: 135 DRAG DROP

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you discover that there are damaged pages present in
the CK_SALES database. You later concluded that the damaged pages are not in the transaction
log and are not metadata pages, but are in the database.

What should you do? (Click and drag the required steps from the left column in the correct order
on the column to the left)

m
.co
sts
lTe
tua
Ac

Answer:

"Pass Any Exam. Any Time." - www.actualtests.com 130


Microsoft 70-450: Practice Exam

m
QUESTION NO: 136
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
sts
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to ensure
lTe

that CERTKILLER-DB01 does not have Database Mail or SQL Mail enabled. You later use the
user named Rory Allen to create the policy by adding Rory Allen to the PolicyAdministrator Role
role. Rory Allen has later applied the policy to CERTKILLER-DB01. CertKiller.com wants to know
tua

in event of disk drive failures suffered on CERTKILLER-DB01 which database should be restored
from backup to restore the policy.
Ac

What should you do?

A. You should consider having the msdb database restored.


B. You should consider having the model database restored.
C. You should consider having the distribution database restored.
D. You should consider having the master database restored.

Answer: A

Explanation:
You should restore the msdb database to ensure that policies are applied after a disk in the server
has failed. Policies for Policy-Based Management are stored in the msdb database. You should
ensure that the msdb database is backed up on a regular basis. Besides policies for Policy-Based
Management, the msdb database stores jobs, operators, and alerts.

"Pass Any Exam. Any Time." - www.actualtests.com 131


Microsoft 70-450: Practice Exam
Incorrect Answers:
B: The model database is used as a template database for any new databases that are created in
the SQL server instance.
C: The distribution database is used by SQL replication. None of these databases stores policies
from Policy-Based Management.
D: You should not restore the master, model, or distribution database. The master database
contains information that pertains to the SQL server configuration.

QUESTION NO: 137

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES which are used by users running geospatial queries on database tables. During the

m
course of the day you discover that queries are slow and you think the problem is caused with the
spatial indexes. You later conclude that no physical corruption is evident and page-level
.co
checksums have not been turned off. CertKiller.com wants you to perform logical checks on the
spatial indexes.
sts

What should you do?

A. You should consider having the DBCC CHECKDB with the REPAIR_FAST option command
lTe

run.
B. You should consider having the DBCC CHECKDB with the REPAIR REBUILD Option
command run.
tua

C. You should consider having the DBCC CHECKDB with the ESTIMATEONLY Option command
run.
D. You should consider having the DBCC CHECKDB with the EXTENDED_LOGICAL_CHECKS
Ac

option command run.

Answer: D

Explanation:
This option performs logical checks on an indexed view, XML indexes, and spatial indexes. You
would specify with extended_logical_checks only if you have the following issues:

Index problems that are not due to physical corruption


Disabled page-level checksums
Column-level hardware corruption.

In this scenario, you wanted to perform logical checks on the spatial indexes in the database.
Therefore, running DBCC CHECKDB with the extended_logical_checks option would be the best

"Pass Any Exam. Any Time." - www.actualtests.com 132


Microsoft 70-450: Practice Exam
choice.
Incorrect Answers:
A: You should not run dbcc checkdb with the repair_fast option. This option will not actually
perform any repair actions on the database. This option is kept in SQL Server 2008 for backward
compatibility only.
B: You should not run dbcc checkdb with the repair_rebuild option. This option performs quick
repairs with no possibility of data loss. This option can rebuild an index or repair rows in non-
clustered indexes. This option is not designed to perform logical checks on the spatial indexes in
the database. You should run dbcc checkdb with the extended_logical_checks option to perform
logical checks on the spatial indexes in the database.
C: You should not run dbcc checkdb with the estimateonly option. This option does not perform a
database check. This option only displays the amount of tempdb space needed to run DBCC
checkdb.

m
QUESTION NO: 138
.co
CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use
of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts

CK_PRODUCTS.
lTe

CK_PRODUCTS contains two filegroups named Primary and FileGroup1 as shown in the exhibit:
tua
Ac

"Pass Any Exam. Any Time." - www.actualtests.com 133


Microsoft 70-450: Practice Exam

m
.co
sts

There are no tables spanning these two filegroups. You receive notification from the Sales
manager stating that an incorrect change was made to the Specifications table in FileGroup1. You
lTe

decide to restore CK_PRODUCTS from the backups two minutes prior to entering the wrong
specifications. CK_PRODUCTS is configured by default to make use of the full recovery model.
The transaction log backups are executed hourly and a full database backup is executed every
tua

evening.

What should you do? (Choose all that apply.)


Ac

A. Your best option would be to ensure that a restore is executed without recovery on the log
backups that were made since the last database backup.
B. Your best option would be to ensure that a restore is executed with recovery on the tail-log
backup.
C. Your best option would be to ensure that a restore is executed with recovery on the database
from the latest full database backup.
D. Your best option would be to ensure that transaction log is truncated.
E. Your best option would be to ensure that a restore is executed without recovery on KingGroup1
from the latest full database backup.
F. Your best option would be to ensure that a tail-log backup is made.

Answer: A,B,E,F

"Pass Any Exam. Any Time." - www.actualtests.com 134


Microsoft 70-450: Practice Exam
Explanation:
The latest transaction log backup was made within the last hour, and the incorrect transaction was
recorded a few minutes ago. To correct the situation, you should do the following:
Immediately make a tail-log backup, which contains the transactions that have been recorded
since the previous log backup. Restore FileGroup1 from the latest full database backup and
specify with norecovery in the restore statement. The norecovery option is required in this scenario
because you will be applying transaction log backups after the database is restored.
Consecutively restore each of the transaction log backups that were made after the last full
database backup. Each transaction log backup must be restored by specifying the norecovery
option so that all subsequent transaction log backups can be restored.
Restore the transaction log backup that was made on the active transaction log. This is the latest
log backup.
When the restore statement that will use the latest transaction log backup is executed, the stopat
and with recovery options must be specified. The stopat option specifies the desired moment in
time to which you must restore the database, and the with recovery option brings the database to

m
a consistent state.
Because the Specifications table is located on FileGroup1 and no tables span filegroups , it is not
.co
necessary to restore the entire database in order to expunge the incorrect change made to
Specifications. Each time a transaction log is backed up using the default settings, the inactive
sts
portion of the log is automatically truncated. Therefore, it is not necessary to truncate the
transaction log again.
lTe

QUESTION NO: 139


tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES and CK_PRODUCTS. During the course of the day you decided to use an application
Ac

which makes updates to the databases. You test the application and know some data would be
lost but you want to recover transactions the application has made. If a disaster should occur you
should be able to restore each of the databases to the same consistent point. The application
makes use of the script below:

BEGIN TRANSACTION UpdateDiscount WITH MARK 'UPDATE CK_PRODUCTS discount'; GO


UPDATE CK_SALES.Products SET discount = Price * 0.925 WHERE Code LIKE '70-%'; GO

CertKiller.com has additionally scheduled the tasks below:


CertKiller.com has configured a full backup to be performed at midnight (12:00
A.M.).CertKiller.com has configured a differential backup to be performed at noon (12:00
P.M.).CertKiller.com has configured transaction log backups to be performed every two hours
beginning at 1:00 A.M.CertKiller.com has configured a snapshot of the databases to be taken at

"Pass Any Exam. Any Time." - www.actualtests.com 135


Microsoft 70-450: Practice Exam
12:30 P.M. for reporting purposes.

CertKiller.com wants to know what should be done to recover transactions made by the
application in each database to a consistent point if the error occurs at 12:35 P.M.

What should you do?

A. You should consider having the database reverted with the database snapshot on each
database.
B. You should consider having the latest full backup restored on each database with the latest
differential backup, and the transaction log backups in order. You should then make use of the
recovery keyword and STOPMARK = 'UPDATE CK_PRODUCTS discount';
C. You should consider having the database restored with the latest full backup each transaction
log backup in order on each database. You should then have each database recovered by using
WITH RECOVERY.

m
D. You should consider having the latest full backup restored on each database followed by the
latest transaction log backup. You should then have each database recovered with RECOVERY.

Answer: B
.co
sts
Explanation:
You should restore the full backup, the latest differential backup, and the transaction log backups
in order on each database. You should also use the recovery keyword and stopmark = i update
lTe

CK_PRODUCTS discount' ; to bring both databases back to the same consistent point. These
actions will not recover each database to the point of failure, but will recover each database to the
marked transaction of updating the CK_PRODUCTS discount. Any committed changes after the
tua

marked transaction will not be restored. When using marked transactions in two related
databases, you should have full database backups with differential backups. You should mark a
transaction block in both databases. You can use the WITH mark keyword in your script. You
Ac

should back up the transaction log for both databases. You must restore the database backups
with norecovery , and restore the logs with stopatmark to return to the marked transaction.
Incorrect Answers:
A: You should not revert the databases using the database snapshot. This action will only restore
the database up to 12:30 P.M. In the scenario, the error occurred at 12:35 P.M. Reverting the
snapshot would not bring the database up to the point of failure. When you revert a database from
a snapshot, you break the log backup chain. The tail-log backup that you made is not usable when
reverting a database. You will have to take a full backup of the database before you can make a
log backup.
C: You should not restore the latest full backup, each differential backup, and the latest transaction
log backup on each database and recover each database with recovery. You should not recover
each differential backup. You should only restore the latest differential backup since the last full
backup.
D: You should not restore the latest full backup, restore each transaction log backup in order on

"Pass Any Exam. Any Time." - www.actualtests.com 136


Microsoft 70-450: Practice Exam
each database, and recover each database with recovery. This action will not consistently recover
both databases. You must restore the latest differential backup after recovering the full backup. If
you omit the differential backup, the database will be an inconsistent state.

QUESTION NO: 140

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com also makes use of an application which sets product prices. The
application makes use of the script below:

USE CK_SALES GO BEGIN TRANSACTION DiscountUpdate

m
WITM MARK 'UPDATE Product Discount prices';
GO
UPDATE CK_Sales.Products SET Discount = Price * 0.95;
.co
GO
sts

CertKiller.com has additionally scheduled their backups as shown below:


CertKiller.com has full backups performed on the CK_SASLES database at midnight (12:00
lTe

A.M.)CertKiller.com has transaction log backups performed at 8. A.M. and 4 P.M.CertKiller.com


has a snapshot of the database backup at noon for reporting purposes.
tua

CertKiller.com is aware that the CK_SALES database is set to use the full recovery model and that
the application updates the prices at noon. During the course of the day you discover that a error
has occurred in the CK_SALES database. CertKiller.com wants you to ensure that all data is
recovered up to point of failure.
Ac

What should you do?

A. You should consider having a tail-log backup created and restore the full backup with
norecovery.
You should then have the transaction log backups and tail-log backup restored with norecovery,
and recover the database with recovery.
B. You should consider having a tail-log backup created and revert the CK_SALES database
using the database snapshot.
You should then have the tail-log backup restored with RECOVERY and STOPATMARK.
C. You should consider having the full backup restored with norecovery and restore the
transaction log backup with recovery and stopatmark.
D. You should consider having the CK_SALES database reverted using the database snapshot.

"Pass Any Exam. Any Time." - www.actualtests.com 137


Microsoft 70-450: Practice Exam
Answer: A

Explanation:
You should do the following to ensure that all data is recovered up to the point of failure:
Create a tail-log backup.
Restore the full backup with norecovery .
Restore the transaction log backups with norecovery and restore the tail-log backup with recovery.

To restore the database to the point of failure, you must create a tail-log backup. A tail-log backup
contains all the transactions that have not been backed up since the last transaction log backup
was performed. After performing the tail-log backup, you should restore the full backup that was
taken at midnight using the norecovery keyword and restore the transaction log taken at 8 A.M.
with the norecovery keyword.
You should then restore the tail-log backup with the recovery keyword. You should use the

m
recovery keyword only after the latest full backup, the latest differential backup, the latest
transaction log backups, and the tail-log backup have all been restored in the proper sequence.
.co
The database recovery, however, should be performed using the recovery keyword to ensure that
data can be rolled back after the entire set of data has been restored.
Incorrect Answers:
sts
B: You should not create a tail-log backup, revert the Products database using the database
snapshot, and restore the tail-log backup with recovery and stopatMark. When you revert a
database from a snapshot, you break the log backup chain. The tail-log backup that you made is
lTe

not usable when reverting a database. You will have to take a full backup of the database before
you can make a log backup.
C: You should not restore the full backup with norecovery and restore the transaction log backup
tua

with recovery and stopatMark. This action will not recover the database to the application update
performed at noon. The stopatMark keyword is used to recover a marked transaction. The script
used to update retail prices contains with mark 'update Product Discount prices'. This action will
Ac

only recover the database to the previous time that the application ran an update. Because the last
transaction log backup was taken at 8 P.M., it would not contain the update that was done at noon,
or restore data changes that were performed after noon.
D: You should not revert the Products database using the database snapshot. This action will only
restore the database up to noon. In the scenario, the error occurred sometime after noon.
Reverting the snapshot would not bring the database up to the point of failure.

QUESTION NO: 141

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES which has the full recovery model set. During the course of the day you perform full
"Pass Any Exam. Any Time." - www.actualtests.com 138
Microsoft 70-450: Practice Exam
backups on the database at midnight 1:00 A.M. with transaction log backups every hour.

CertKiller.com recently finished and application which updates the data in the database. You have
later discovered checking the logs that the application has added corrupt data in the database at
3:15 A.M. You decided to restore the database using the statement below:

RESTORE DATABASE CK_SALES FROM CK_SalesBackups WITH NORECOVERY;

What should you do next?

A. You should consider making use of the restore statement below:


RESTORE LOG CK_SALES
FROM CK_SalesBackups WITH RECOVERY,
RESTART, STOPATMARK = 'Jun 14, 2009 3:15 AM';
B. You should consider making use of the restore statement below:

m
RESTORE LOG CK_SALES
FROM CK_SalesBackups WITH RECOVERY,
STOPBEFOREMARK = 'Jun 14, 2009 3:15 AM' .co
C. You should consider making use of the restore statement below:
RESTORE LOG CK_SALES
sts
FROM CK_SalesBackups WITH RECOVERY,
STOPAT = 'Jun 14, 2009 3:15 AM';
D. You should consider making use of the restore statement below:
lTe

RESTORE LOG CK_SALES


FROM CK_SalesBackups WITH RECOVERY,
STOPATMARK = 'Jun 14, 2009 3:15 AM';
tua

Answer: C
Ac

Explanation:
To restore a database, you should restore the latest full backup, restore the latest differential
backup, and then the transaction log backups after the latest differential backup. You must use the
recovery keyword with restore log statement. This keyword is used to ensure that data can be
rolled back after the entire set of data has been restored. The stop AT keyword allows a point in
time restore to an exact time. In this scenario, the restore is to June 14, 2009 at 3:15 A.M. You
should restore the each transaction log backup transaction after midnight with the stop at keyword.
You should also issue the restore database CK_SALES WITH RECOVERY to complete the
restore process.
Incorrect Answers:
A: You should not use the STOPATMARK keyword. This keyword can restore a database to a
marked transaction. This keyword accepts a mark name, not a date and time. You can use an
optional after <datetime> clause that will allow the STOPATMARK or STOPBEFOREMARK
keyword to accept a date. If you do not use the AFTER <datetime> clause, you can only use a

"Pass Any Exam. Any Time." - www.actualtests.com 139


Microsoft 70-450: Practice Exam
unique mark name for the transaction, and not a date. The restart keyword is used to restart a
restore operation that may have been interrupted due to a power failure.
B: You should not use the STOPBEFOREMARK keyword. This keyword can restore a database to
a marked transaction. This keyword accepts a unique mark name, but not a date.
D: You should not use the STOPATMARK keyword. This keyword can restore a database to a
marked transaction. This keyword accepts a mark name, not a date and time. You can use an
optional after <datetime> clause that will allow the STOPATMARK or STOPBEFOREMARK
keyword to accept a date. If you do not use the AFTER <datetime> clause, you can only use a
unique mark name for the transaction, and not a date. The restart keyword is used to restart a
restore operation that may have been interrupted due to a power failure.

QUESTION NO: 142

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of

m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_PRODUCTS which is configured to use the full recovery model. CertKiller.com currently
possesses full backups and multiple log backups of the CK_PRODUCTS database. The
CK_PRODUCTS database has several file groups shown in the exhibit below:
sts
lTe
tua
Ac

"Pass Any Exam. Any Time." - www.actualtests.com 140


Microsoft 70-450: Practice Exam
During the course of the day you discover that there are problems with the FileGroup1 file group
and FileGroup2 file group. You later discover that the file containing FileGroup3 file group is
undamaged and is consistent with the CK_PRODUCTS database. CertKiller.com wants you to
perform a piecemeal restore of the CK_PRODUCTS database to a specific point in time by
selecting which statements are true regarding piecemeal restores to a specific point in time.

Which of the statements are correct? (Choose two).

A. You would be required to restore the FileGroup2 filegroup first.


B. You would be required to restore the FileGroup1 filegroup first.
C. You would be required to have all the filegroups of the CK_PRODUCTS database restored.
D. You would not have to worry about the sequence order of the restoration of the
CK_PRODUCTS database filegroups.
E. You would be required to specify every step of the restore sequence and specify the same point
in time.

m
F. You would be required to indicate the partial option in the restore database option.

Answer: E,F .co


Explanation:
sts
The restore sequences of a piecemeal restore that uses the full recovery model must do the
following:
Restore the primary filegroup first. Secondary filegroups can be restored in the order of
lTe

importance. Read-only filegroups , such as FileGroup3, can be restored last.


The restore database statement must specify the partial option. The partial option indicates that a
partial restore is being performed.
tua

You must have a full database backup that contains the primary filegroup . You do not require a
single backup that contains all filegroups .
You must specify the time in which you want to restore to in the partial restore sequences.
Ac

Incorrect Answers:
A: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you
must restore the Primary filegroup first. The sequence order of restoration of the filegroups is
important. You should restore the more important filegroups first. Read-only filegroups need to be
restored should be restored last because their data is static.
B: You should not restore either FileGroup1 or FileGroup2 first. To begin a partial restore, you
must restore the Primary filegroup first. The sequence order of restoration of the filegroups is
important. You should restore the more important filegroups first. Read-only filegroups need to be
restored should be restored last because their data is static.
C: You do not have to restore all filegroups of the CK_PRODUCTS database. You do not have to
restore a read-only filegroup if the file that contains the filegroup is undamaged and consistent with
the database. In this scenario, FileGroup3 is undamaged and consistent with the CK_PRODUCTS
database.
D: You should restore the primary filegroup first; the secondary filegroups can be restored in the

"Pass Any Exam. Any Time." - www.actualtests.com 141


Microsoft 70-450: Practice Exam
order of importance and read-only filegroups, such as FileGroup3, can be restored last.

QUESTION NO: 143

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to save
consumed disk space with the Invoices table which contains reoccurring data and is partitioned
across multiple partitions in the CK_SALES database.

What should you do?

A. You should consider running the statement:

m
ALTER TABLE Invoices
REBUILD PARTITION ALL WITH (DATA_COHPRESSION = PAGE ON PARTITIONS(1) );
B. You should consider running the statement:
ALTER TABLE Invoices
.co
REBUILD PARTITIONS WITH (DATA COMPRESSION = ROW);
sts
C. You should consider running the statement:
ALTER TABLE Invoices
REBUILD WITH (DATA_COHPRESSION = PAGE);
lTe

D. You should consider running the statement:


ALTER TABLE Invoices
REBUILD WITH (DATA_COHPRESSION = ROW);
tua

Answer: A

Explanation:
Ac

Page compression is usefully if the table stores reoccurring data. Page compression reduces data
redundancy in columns in multiple rows on a page. The redundant data is stored in on a single
page and then the data is referenced to multiple columns. By contrast, row compression reduces
the metadata overhead, uses variable-length storage format for numeric data types, and stores
fixed character strings by not storing the blank characters similar to the variable length format.
Incorrect Answers:
B: This statement is syntactically incorrect:
C: These statements apply data compression to a non-partitioned table. The Invoices table is a
partitioned table. You should use the rebuild partition keyword to compress a partitioned table.
Part 3: Design a recovery test plan (5 Questions)
D: These statements apply data compression to a non-partitioned table. The Invoices table is a
partitioned table. You should use the rebuild partition keyword to compress a partitioned table.
Part 3: Design a recovery test plan (5 Questions)

"Pass Any Exam. Any Time." - www.actualtests.com 142


Microsoft 70-450: Practice Exam

QUESTION NO: 144

You work as a database administrator at CertKiller.com. You are responsible for administering the
SQL Server 2008 database servers.
You have finished configuring log shipping between a primary server and a secondary server. The
secondary database was configured in standby mode. You need to determine what effect the
configuration will have on the secondary database.

What should you identify?

A. It will result in employees being disconnected when the secondary database is in standby
mode.
B. It will result in employees being unable run any queries on the secondary server.

m
C. It will result in transaction log restores not taking place on the secondary server.
D. It will result in the ability of configuring read-only queries on the secondary server.

Answer: D
.co
Explanation:
sts

The option stating that you will be able to configure read-only queries on the secondary server is
correct. When you configure the secondary database on the secondary server in standby mode,
lTe

you have the flexibility to shift the load of the read-only queries from the primary server to the
secondary server. This eases the load on the primary server. When you configure the database on
the secondary server in the standby mode, you can schedule users either to be disconnected or to
tua

be connected to the primary database only when there is no connection to the primary database.
The transaction log will be restored on the secondary server. If you choose to disconnect the
users, the users will be disconnected as soon as the restore of the transaction logs on the
secondary server is initiated.
Ac

Incorrect Answers:
A: The option stating that the users will always be disconnected when the secondary database is
in the standby mode is incorrect. The users are not able to connect to the database when it is in
the norecovery mode. In the standby mode, you can configure the users to be disconnected when
transaction logs are restored on the secondary server or wait for users to disconnect.
B: The option stating that the users will not be able to run any queries is incorrect. The users are
not able to run any queries when the database is in the norecovery mode. Users will be able to
perform queries on the secondary server when the secondary database is in STANDBY mode
.When you are backing up the transaction log on the secondary server, you should use the
norecovery mode. You need to back up the transaction logs using with norecovery from the
primary to the secondary server. When you back up the transaction logs from the primary server
using with norecovery, the database in the primary server goes into the restoring state. In this
state, the database is not available to users for updates.

"Pass Any Exam. Any Time." - www.actualtests.com 143


Microsoft 70-450: Practice Exam
C: The option stating transaction log restores on the secondary server will not take place is
incorrect. This option is true only if you have chosen not to disconnect the users when you must
run the restore of the transaction log backups. In this condition, the restore will not take place as
long as the users are connected. Only when there is an idle session, which means that there are
no users connected, will the restore operation will take place.

QUESTION NO: 145

CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use
of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_SALES.

The sales information of the company is located on CK_SALES. You receive an instruction from
the CIO to make sure that you are able to recover CK_SALES without any data loss exposure.

m
You thus need to devise a restore strategy that will accomplish this.

What should you include? (Choose all that apply)


.co
A. The strategy should include differential backups as well as log backups.
sts
B. The strategy should include full backups as well as log backups.
C. The strategy should include the bulk-logged recovery model.
D. The strategy should include full backups as well as differential backups.
lTe

E. The strategy should include the simple recovery model.


F. The strategy should include the full recovery model.
tua

Answer: B,D,F
Ac

QUESTION NO: 146

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to design a
disaster recovery plan. CertKiller.com wants to know which of the following would be included in
the plan.

What should you do? (Choose all that apply)

A. The recovery plan should have a RAID 1 volume tested and used that contains the operating
system.
B. The recovery plan should have a RAID 5 volume tested and used that contains the database
files.
"Pass Any Exam. Any Time." - www.actualtests.com 144
Microsoft 70-450: Practice Exam
C. The recovery plan should have a base-functionality script run.
D. The recovery plan should have the locations determined to store offsite backups.
E. The recovery plan should have a schedule created for overwriting backup media.

Answer: C,D,E

Explanation:
Your disaster recovery plan should include the following tasks:
Schedule for overwriting backup media
Determine locations to store offsite backups
Run a base-functionality script

There are number of items that should be included in your disaster recovery plan. You should
consider how long you will keep the media, how often you should overwrite the media, and where
to store the media. If you store the media offsite, you should also determine how long will it take to

m
retrieve the media and restore the data. Determining where you store this media could be a factor
in the time it takes to retrieve the data.
.co
You should always perform a restore of a database to test the backup sets and to test whether the
operator is skilled in performing a restore. You should also have a base-functionality script that
may execute insert, update, and delete statements or a batch of stored procedures to determine if
sts
everything is working correctly after a restore.
Incorrect Answers:
A: You should not test and use RAID-1 for the volume that has the operating system as part of a
lTe

disaster recovery plan. Using a RAID-1 can provide fault tolerance for the operating system if a
disk fails. RAID-1 is designed to prevent the server from stopping if a failure of a disk occurs. It
should be part of the design process, but not a part of the disaster recovery process.
tua

B: You should not test and use RAID-5 for the volume that contains the database files as part of a
disaster recovery plan. Using a RAID-5 can provide fault tolerance be supporting up to one drive
failure. RAID-5 should not be implemented for the drive that contains the transaction log files for a
Ac

database. RAID-5 is designed to prevent the server from stopping if a failure of a disk occurs. It
should be part of the design process, but not a part of the disaster recovery process.

QUESTION NO: 147

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to make full
backups once a day with transaction log backups every hour of the CK_SALES database.
CertKiller.com is aware that all backup statements include the checksum keyword. CertKiller.com
wants you to verify that the backup of the CK_SALES database can be restored.

"Pass Any Exam. Any Time." - www.actualtests.com 145


Microsoft 70-450: Practice Exam
What should you do?

A. You should consider making use of the restore verifyonly statement check the integrity of the
backup.
B. You should consider making use of the binary_checksum statement to on the backup device to
validate the checksum on the backup.
C. You should consider making use of the dbcc checkdb statement on the backup device to check
the integrity of the backup.
D. You should consider making use of the dbcc showcontig statement on the backup device to
check the integrity of the backup.

Answer: A

Explanation:
This statement can ensure the following conditions are met:
The backup set is complete.

m
Checksum is present on the media.
Volumes are all readable.
.co
The destination drive has sufficient space to restore.
sts
The restore verifyonly command does not guarantee that the data can be recovered. This
statement can be used to determine database integrity problems that could compromise the
backup set. Using the checksum keyword with your backup statement and using the restore
lTe

verifyonly statement to validate a backup increases the chances that your backup can be restored.
Incorrect Answers:
B: You should not use the binary_checksum statement to on the backup device to validate the
tua

checksum on the backup. This statement is used to check the checksum value for a row of a table.
It cannot be use to check the checksum of the backup media.
C: You should not use the dbcc checkdb statement. The dbcc checkdb statement is used to check
Ac

the integrity of a database and can be used on tables, indexes, and filegroups, but not on backup
devices.
D: You should not use the dbcc showcontig statement. The dbcc showcontig statement displays
fragmentation information for indexes and tables.

QUESTION NO: 148

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_DATA. During the course of the day you decided to enable Transparent Data Encryption
(TDE) on the CK_DATA database using the statement below to backup the database:

"Pass Any Exam. Any Time." - www.actualtests.com 146


Microsoft 70-450: Practice Exam
BACKUP DATABASE [CK_DATA] TO DISK = N'C:\Backup\CK_Data.bak',[CK_DATABackup]
WITH FORMAT, MEDIANAME = 'CK_DATABackup',
MEDIADESCRIPTION = 'media set for CK_DATA database',
MEDIAPASSWORD = 'T3$tl<1n8'

CertKiller.com wants you to plan for a disaster recovery by selecting what would be required to
restore the CK_DATA database should disaster strike.

What should you do?

A. You would require having a backup of the SSL certificate of the server.
B. You would require having the password for the media.
C. You would require having a backup of the certificate used to protect the database encryption
key.
D. You would require having the password for the account used for the SQL Server Agent service

m
E. You would require having access to CK_SALES.bak.

Answer: B,C,E .co


Explanation:
sts
The following three things are required to restore the CK_DATA database:
The password for the media
Access to CK_Data.bak
lTe

A backup of the certificate used to protect the database encryption key

You should have access CK_Data.bak. This is the backup file for the database. It is imperative
tua

that you can access the backup file for the Sales database because without access to this file, the
database cannot be restored.
You should know the password to the media. The MEDIAPASSWORD keyword places a
Ac

password on the media to protect the media from being restored by rogue operators. However, a
rogue operator could use a password cracker to reveal the password for the media. The
MEDIAPASSWORD keyword is not a recommended way to secure your backup. Transparent
Data Encryption (TDE) is recommended by Microsoft to encrypt any backups of your database.
The MEDIAPASSWORD keyword will not be available in future versions of SQL Server 2008.
You should have a backup of the certificate used to protect the database encryption key as well as
a backup of the database. The backup of the database and the certificate should not be stored in
the same location for security reasons. If the certificate is lost, data on the encrypted backup will
not be decrypted, and thus will be unreadable.
Incorrect Answers:
A: You do not need to have a backup of the SSL certificate for the SQL server. The SSL certificate
can be used to have a SSL connection between a client and the SQL server, but you do not need
this certificate to restore a database.
D: You do not need the password for the SQL Server service or the SQL Server Agent service.

"Pass Any Exam. Any Time." - www.actualtests.com 147


Microsoft 70-450: Practice Exam
The password for these accounts may be needed to make changes to the respective accounts,
but they are not needed to restore a database.

QUESTION NO: 149

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you move parts of the CK_SALES database from
CERTKILLER-DB01 to a new server named CERTKILLER-DB02.

You later inspect the application used to update the database and discover that an invalid out-of-
range value were entered into the database by the network users based on column data type in
the tables in the CK_SALES database. You later come to the conclusion that the problem was not

m
caused by indexes in the database or hardware corruption. CertKiller.com wants you to find the
out-of-range values manually and modify them.
.co
What should you do?
sts
A. You should run the DBCC CHECKDB command with the EXTENDED_LOGICAL_CHECKS
Option.
B. You should run the DBCC CHECKDB command with the REPAIR_ALLOW_DATA_LOSS
lTe

Option.
C. You should run the DBCC CHECKDB command with the PHYSICAL_ONLY option.
D. You should run the DBCC CHECKDB command with the DATA_PURITY option.
tua

Answer: D

Explanation:
Ac

This option causes dbcc checkdb to check column values of tables to see if the data is out-of-
range or not valid. When a database is upgraded from a previous version of SQL Server, column-
value checks are not enabled by default. Because the Parts database used to be on a SQL Server
2000 server, you must run dbcc checkdb with the data_purity option to enable column-value
checks. Once dbcc checkdb with data_purity has been run error-free on the Paris database,
column-value integrity will be checked with dbcc checkdb .
You should not run dbcc checkdb with the extended_logical_checks option. This option performs
logical checks on an indexed view, XML indexes, and spatial indexes. You would specify with
extended_logical_checks only if you have the following issues:
Index problems that are not due to physical corruption
Disabled page-level checksums
Column-level hardware corruption

"Pass Any Exam. Any Time." - www.actualtests.com 148


Microsoft 70-450: Practice Exam
Incorrect Answers:
A: In this scenario, you do not believe that index issues or hardware corruption are the cause of
the out-of-range issues with the column values. Therefore running dbcc checkdb with the
extended_logical_checks option would not be the best choice.
B: You should not run dbcc checkdb with the repair_allow_data_loss option. This option will
attempt to correct errors in the database and might delete some pages in the database. Therefore,
this option might delete some data. In this scenario, you wanted to determine the out-of-range
column values and manually change them. Therefore, you should not run dbcc checkdb with the
repair allow data loss option.
C: You should not run dbcc checkdb with the physical_only option. When the physical_only option
is specified, column-integrity checks are not performed. In this scenario, you need to run column-
integrity checks on the tables in Parts database. Part 2: Design a monitoring solution at the
instance level (2 Questions)

m
QUESTION NO: 150
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
sts

CK_SALES. CertKiller.com additionally added a new server named CERTKILLER-DB02 and


configured log shipping between CERTKILLER-DB01 and CERTKILLER-DB02 and a new monitor
lTe

server. You have successfully configured log shipping with the monitor server and require
assigning the role of monitor server to another server removing the existing monitor server.
tua

What should you do?

A. You should consider having the new monitor server brought up and simply shut down the older
one.
Ac

B. You should consider having log shipping removed from the old monitor server first and then
configure the new monitor server with log shipping.
C. You should consider having the new server designated as the monitor server from the primary
server.
D. You should consider having the new server designated as the monitor server from the primary
and secondary servers.

Answer: B

Explanation:
To be able to configure a new server as the monitor server and remove the existing monitor
server, you will need to remove log shipping first from the existing monitor server, and then
reconfigure the new monitor server. This is the only method that can be used to change to a new
monitor server. After you configure log shipping with a monitor server, you cannot change the

"Pass Any Exam. Any Time." - www.actualtests.com 149


Microsoft 70-450: Practice Exam
monitor server unless log shipping has been removed and reconfigured on the new monitor
server. A monitor server is responsible for tracking activities that take place in log shipping. For
instance, a monitor server will track the last backup of the transaction log from the primary to the
secondary server. A monitor server can be configured to monitor more than one log shipping
configuration. All the remaining methods are incorrect and will not allow you to change the monitor
server.
Incorrect Answers:
A: You cannot shut down the old monitor server and bring the new server up as the monitor
server.
C: You cannot designate the new server as the monitor server if a monitor server currently exists.
D: You cannot designate the new server as the monitor server if a monitor server currently exists.

QUESTION NO: 151

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
.co
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day CertKiller.com planned using the
sys.server_event_notifications catalog to view and track server-scoped event notifications.
sts

CertKiller.com wants you to select which database stores such events?

A. The model database would store such events.


lTe

B. The tempdb database would store such events.


C. Any database would store such events.
D. The master database would store such events.
tua

Answer: D

Explanation:
Ac

When you execute a query for retrieving an event notification, the WMI Provider for Server Events
translates the query into another form, which is an event notification. The event notification is
created in the master database, which is used only for server-scoped event notifications. You use
the sys.server_event_notifications view to view the event notifications in rows, where each row
represents an event notification.
Server-scoped event notifications are not stored in the model or tempdb databases, or in any
database other than the master database. The event notifications specific to database or object
are stored in the database that you have specified in the query. The model and tempdb databases
are never used for event notifications.

Part 3: Design a solution to monitor performance and concurrency (22 Questions)

"Pass Any Exam. Any Time." - www.actualtests.com 150


Microsoft 70-450: Practice Exam

QUESTION NO: 152

You work as a database administrator at CertKiller.com. You are responsible for administering a
database server named CERTKILLER-DB01 with a SQL Server 2008 instance.

CERTKILLER-DB01 contains the following attributes:64-GB RAM4 quad-core


processorsNumerous independent physical raid volumes

You are in the process of using a transactional database on the instance. It is anticipated that the
transactional database will have a high volume of INSERT, UPDATE, and DELETE activities. The
activities encompass the creation of new tables.

You receive an instruction from management to optimize the performance of the database as well

m
as maximizing the disk bandwidth. You need to accomplish this by ensuring that the contention in
the storage allocation structures is minimized.
.co
What should you do?
sts
A. You should consider enabling Server Auditing.
B. You should consider using multiple data files for the database.
C. You should consider using row-level compression.
lTe

D. You should consider using the checksum page verify option.

Answer: B
tua

QUESTION NO: 153


Ac

You work as a database administrator at CertKiller.com. Your duties include administrating the
SQL Server 2008 infrastructure of CertKiller.com.

You receive a notification from management requesting capacity planning data. You thus decide to
implement a long-term infrastructure monitoring strategy. You need to determine the tasks you
need to include in the design.

What should you include? (Choose all that apply.)

A. You should consider deploying the production databases after base lining the system.
B. You should consider using database snapshot.
C. You should consider setting the max worker threads.
D. You should consider creating a new Database profile.

"Pass Any Exam. Any Time." - www.actualtests.com 151


Microsoft 70-450: Practice Exam
E. You should consider, on a regular basis, reviewing the system monitor counters.

Answer: A,E

QUESTION NO: 154

CertKiller.com has employed you as a database administrator. You are responsible for
administering the SQL Server 2008 infrastructure.

During routine maintenance you discover that the instance is experiencing poor performance due
to excessive CPU usage, server processes paging as well as deadlocks. You receive an
instruction from the CIO to design a monitoring solution that will:Supply information including
detailed deadlock informationMonitor and troubleshoot performance issues.

m
You need to design this solution with the least amount of administrative effort.

What should you do? .co


A. This can be accomplished using the SQLAGENT.OUT log.
sts
B. This can be accomplished using the Netsh utility.
C. This can be accomplished using the Extended Events utility.
D. This can be accomplished using the ServerManagerCMD utility.
lTe

Answer: C
tua

QUESTION NO: 155

CertKiller.com has employed you as a database administrator. You are responsible for
Ac

administering a SQL Server 2008 instance.

You decide to implement a monitoring solution plan for the instance. You want to monitor the
object usage statistics. Your solution needs to identify a list of at least 15 objects for the
subsequent components:Stored procedures and functions that are often performed.Transact-SQL
statements that is long running.

Management wants you to use the monitoring solution plan in order to decrease the performance
effect. You need to accomplish this with the minimum amount of administrative effort.

What should you do?

A. You should consider using the Hyper-V feature.

"Pass Any Exam. Any Time." - www.actualtests.com 152


Microsoft 70-450: Practice Exam
B. You should consider using RAID 3.
C. You should consider using the Background Intelligent Transfer Service (BITS).
D. You should consider using dynamic management views.

Answer: D

QUESTION NO: 156

CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com


include administering the SQL Server 2008 infrastructure.

The instance includes a database named CERTKILLER-DB02. CERTKILLER-DB02 is used for


the day-to-day business operations of your company. You receive numerous complaints from
clients stating that the response times are poor when executing reports.

m
You thus decide to implement a performance monitoring strategy plan. This plan will capture and
.co
store the subsequent information:The executed Transact-SQL statements as well as query
activity.Blocking and deadlock data.The counters for memory, disk and CPU.
sts
To ensure productivity you need to use the monitoring process. You need to accomplish this with
the least amount of administrative effort.
lTe

What should you do?

A. You should consider using the Background Intelligent Transfer Service (BITS).
tua

B. You should consider using the data collector.


C. You should consider using the Windows System Resource Manager (WSRM) feature.
D. You should consider using the Event Subscriptions.
Ac

Answer: B

QUESTION NO: 157

CertKiller.com has hired you as a database administrator for their network. The CertKiller.com
network contains four SQL servers that are configured to run SQL Server 2008.

You receive an instruction from the CIO to configure one of the SQL servers named
CERTKILLER-DB01 as a Central Management Server. CERTKILLER-DB01 will administer the
other SQL servers on the company network. You then create a server group on CERTKILLER-
DB01 that will contain the other SQL servers in order to manage them. You require data about the
memory and CPU from members of the server group. You need to determine a way to retrieve this
data.
"Pass Any Exam. Any Time." - www.actualtests.com 153
Microsoft 70-450: Practice Exam

What should you do? (Choose all that apply.)

A. You should consider using the Policy-Based Management policies.


B. You should consider using Rules.
C. You should consider using Dimensions.
D. You should consider using the Transact-SQL statements.

Answer: A,D

Explanation:
Central Management Servers allow you to administer multiple servers simultaneously. The Central
Management Server uses server groups to maintain connection information for one or more
instances of SQL Server. You can use Transact-SQL statements or Policy-Based Management
policies to administer servers in server groups. After you configure a Central Management Server,
you can create a query to display the resource usage, such as CPU and memory, on the servers

m
that are members of the server group.
Incorrect Answers:
.co
B: You cannot use rules or dimensions to administer servers in server groups by using Central
Management Servers. Rules are database objects that are bound to columns or alias data types,
sts
and specify which data values are acceptable in a column.
C: A dimension is a structural attribute of a cube, which is an organized hierarchy of categories
that describe data in the fact table.
lTe

QUESTION NO: 158


tua

You are employed as the database administrator at CertKiller.com. Your duties include managing
a SQL Server 2008 server that host a database named CK_SALES.
Ac

Employees in the sales department make use of CK_SALES to update sales records for online
clients. You need to be able to check the amount of employees who are connected to CK_SALES
at any given time. You decide to make use of System Monitor in conjunction with SQL Server
objects and counters in order to capture the current amount of users for performance
benchmarking. You need to determine a way to accomplish this.

What should you do?

A. This can be accomplished using SQL Server: Workload Group Stats.


B. This can be accomplished using SQL Server: SQL Statistics.
C. This can be accomplished using SQL Server: General Statistics.
D. This can be accomplished using SQL Server: Databases.

"Pass Any Exam. Any Time." - www.actualtests.com 154


Microsoft 70-450: Practice Exam
Answer: C

Explanation:
Using this object, you can capture information on the number of current connections to the SQL
Server. You can also view the number of users who either connect or disconnect with the SQL
Server instance. The connections and disconnections are displayed on per second basis. In this
scenario, you would use the User Connections counter to view the current number of users
connected an instance of SQL Server. Along with this counter, there are other counters available
with this object. These counters are Temp Tables for Destruction, Transactions, Active Temp
Tables, Connection resets/sec, and Logins/sec.
Incorrect Answers:
A: You should not use SQL Server: Workload Group Stats object to view the current number of
users. This object contains counters that monitor the performance of the Resource Governor
workload group. However, this object cannot be used for monitoring the current number of
connected users to an instance of SQL Server.

m
B: You should not use SQL Server: SQL Statistics object to view the current number of users. This
object contains counters used for monitoring compilation and recompilations of user queries sent
.co
to an instance of SQL Server. However, this object cannot be used for monitoring the current
number of connected users to an instance of SQL Server.
D: You should not use SQL Server: Databases object to view the current number of users. This
sts
object contains counters that help you monitor backup/restore throughput, transaction log
activities, and bulk copy operations. However, this object cannot be used for monitoring the
current number of users connected to an instance of SQL Server.
lTe
tua

QUESTION NO: 159

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
Ac

database server named CERTKILLER-DB01.

During routine monitoring you discover that numerous high-priority applications performs poorly
when they are run simultaneously with low-priority resource-intensive applications on
CERTKILLER-DB01. In order to solve the error you decide to make use of the Resource
Governor. You thus need to determine what percentage of the processor is used by a particular
group of applications.

What should you do?

A. You should look at the SQL Server:Workload Group Statistics in System Monitor.
B. You should look at the SQL Server:SQL Statistics in System Monitor.
C. You should look at the SQL Server:General Statistics in System Monitor.

"Pass Any Exam. Any Time." - www.actualtests.com 155


Microsoft 70-450: Practice Exam
D. You should look at the SQL Server:Exec Statistics in System Monitor.

Answer: A

Explanation:
The SQL Server :Workload Group Statistics object allows you to look at various counters such as
CPU usage %. Max request cpu time, Max request memory grant (KB), and Query
optimizations/sec. You can apply these counters to the resource pools that you have defined in the
workload groups.
Incorrect Answers:
B: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL
Server:Exec Statistics objects. None of these objects allows you to apply the counters to an
instance of the resource pools that you have defined in the workload groups.
C: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL
Server:Exec Statistics objects. None of these objects allows you to apply the counters to an

m
instance of the resource pools that you have defined in the workload groups.
D: You should not use the SQL Server:Exec Statistics, SQL Server:General Statistics or SQL
.co
Server:Exec Statistics objects. None of these objects allows you to apply the counters to an
instance of the resource pools that you have defined in the workload groups.
sts

QUESTION NO: 160


lTe

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
tua

CK_SALES.

During routine monitoring you discover that CERTKILLER-DB01 is experiencing performance


Ac

related errors. You decide to trace resource issues that are related to the disk I/O and memory.
You thus need to determine the appropriate System Data collection sets you should use.

What should you identify?

A. Your best choice would be to use the Query Statistics collection set.
B. Your best choice would be to use the Disk Usage collection set.
C. Your best choice would be to use a combination of the Disk Usage and Server Activity
collection sets.
D. Your best choice would be to use the Server Activity collection set.

Answer: D

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com 156


Microsoft 70-450: Practice Exam
This collection set is mainly used for checking the health and resource utilization of the SQL
Server. You can use this collection set to determine the health of system resources and to track
any performance bottleneck with the system resources utilization. This collection set can use
different resources, such as performance counters from the system and SQL Server, sys.
dm_os_schedulers , sys.dm_exec_sessions , sys.dm_exec_requests and
sys.dm_os_waiting_tasks views. You can use these resources to track performance issues such
as deadlocks. The sys.dm_exec_sessions , sys.dm_exec_requests and sys.
dm_os_waiting_tasks can be used together to detect deadlocks and performance bottlenecks.
Incorrect Answers:
A: You should not use Query Statistics collection set because this collection set gathers
information related to queries used in the database, such as query statistics, query plans, and the
text of individual queries. This collection set uses the sys. dm_exec_query_stats view to gather
information along with many different resources. This collection set cannot gather information
related to disk I/O and memory.
B: You should not use the Disk Usage collection set because this collection set gathers

m
information on the databases hosted on the SQL Server 2008 system. The information gathered is
about the disk and the log usage on the SQL Server. You would use this collection set when you
.co
want to know how much a database and its related log files are growing on daily basis. The growth
is tracked in megabytes (MB) per day. There are two types of collection items in this collection set:
sts
Disk Usage - Data Files and Disk Usage - Log File. This collection set cannot gather information
related to disk I/O and memory.
C: You should not use a combination of the Disk Usage and Server Activity collection sets to solve
lTe

the problem stated in the scenario. You would not be able to use two collection sets in
combination. It is recommended that you use a specific collection set to solve a problem related to
one specific area in SQL Server performance. For instance, you can track the database growth
tua

using Disk Usage collection set.


Ac

QUESTION NO: 161

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 that hosts a database named CK_SALES.

The Sales department at CertKiller.com makes use of CK_SALES to accomplish their daily tasks.
You receive notification from the CIO to capture all events taking place on CERTKILLER-DB01 as
well as replaying a step-by-step analysis of the captured events. You thus need to determine the
most appropriate utility that will assist you in this task.

What should you do?

A. You should consider using SQL Server Profiler.

"Pass Any Exam. Any Time." - www.actualtests.com 157


Microsoft 70-450: Practice Exam
B. You should consider using System Monitor.
C. You should consider using Policy-Based Management policy.
D. You should consider using Database Engine Tuning Advisor.

Answer: A

Explanation:
SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of
the SQL Server Database Engine or Analysis Service services. SQL Server Profiler allows you to
capture and save data about each event to a table or a file for analysis. You can also replay the
events captured by SQL Server Profiler to determine what exactly happened. You cannot use
System Monitor, Database Engine Tuning Advisor, or a Policy-Based Management policy for the
purpose stated in the scenario.
Incorrect Answers:
B: System Monitor is primarily used for monitoring resource usage associated with server

m
processes, but it does not allow you to replay captured events. Database Engine Tuning Advisor
allows you to analyze the performance effects of Transact-SQL statements executed against
databases you want to tune. .co
C: Policy-Based Management manages entities, such as databases or other SQL Server objects,
on an instance of SQL Server 2008.
sts
D: Database Engine Tuning Advisor provides recommendations to add, remove, or modify
indexes, indexed views, and partitions.
lTe

QUESTION NO: 162


tua

CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are
the administering SQL Server 2008 server named CERTKILLER-DB06.
Ac

You receive an instruction from the CIO to optimize the performance of CERTKILLER-DB06. You
need to gather data regarding the operating system-related memory usage of CERTKILLER-
DB06. You need to determine the suitable dynamic management views that will assist you to
accomplish the task.

What should you identify? (Choose all that apply.)

A. You should consider using sys.dm_os_sys_info.


B. You should consider using sys.dm_os_process_memory.
C. You should consider using sys.dm_os_sys_memory.
D. You should consider using sys.dm_os_memory_brokers.
E. You should consider using sys.dm_os_memory_nodes.

Answer: A,C

"Pass Any Exam. Any Time." - www.actualtests.com 158


Microsoft 70-450: Practice Exam
Explanation:
Both views are new to SQL Server 2008. The sys.dm_os_sys_info view provides a simple display
of physical and virtual memory that is available with the operating system. This view also provides
the information of the system resources available and consumed by SQL Server. The
sys.dm_os_sys_memoiy view provides a more detailed view of the physical memory and the
memory-resource notification bits, which provide the state of the memory resource. The
sys.dm_os_sys_memory view displays the memory usage in ten columns, including total_phys ,
avail_phys , sys_cache , and sys_hi_signal .
Incorrect Answers:
B: You should not use the sys.dm_os_process_memory view. This view is used to display the
memory allocations for SQL Server process space. For instance, you can use it to track the
number of page fault count incurred by the SQL Server process.
D: You should not use the sys.dm_os_memory_brokers view. This view is used for tracking
memory allocation between the components of SQL Server.
E: You should not use the sys.dm_os_memory_nodes view. This view displays information

m
regarding memory nodes and the amount of physical memory reserved by SQL Server.

.co
QUESTION NO: 163
sts

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a SQL
lTe

server named CERTKILLER-DB01.

You receive an instruction from the CIO to test the SQL Server instance for memory leaks. You
tua

thus need to determine the appropriate dynamic management view you need to use to accomplish
this.

What should you do?


Ac

A. You should consider using sys.dm_os_sys_memory.


B. You should consider using sys.dm_os_process_memory.
C. You should consider using sys.dm_os_memory_objects.
D. You should consider using sys.dm_os_memory_nodes.

Answer: C

Explanation:
It also allows you to track memory objects allocated to the SQL Server 2008 instance. When
managing SQL Server, if there are performance issues related to memory, you can use this view
to locate any possible memory leaks that may be occurring.
Incorrect Answers:

"Pass Any Exam. Any Time." - www.actualtests.com 159


Microsoft 70-450: Practice Exam
A: You should not use the sys.dm_os_sys_memory view. This view provides a detailed view of the
physical memory and memory-resource notification bits, which provide the state of the memory
resource. The sys.dm_os_sys_memory view displays memory usage in ten columns. Some of the
columns are total_phys, avail_phys, sys_cache and sys_hi_signal.
B: You should not use the sys.dm_os_process_memory view. This view is used to display memory
allocations for the SQL Server process space. For instance, you can use it to track the number of
page fault count incurred by the SQL Server process.
D: You should not use the sys.dm_os_memory_nodes view. This view displays information about
the memory nodes and the amount of physical memory reserved by SQL Server.

QUESTION NO: 164

CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for

m
administering a database server named CERTKILLER-DB01.

.co
You have received instruction from the CIO to test the Dedicated Administrator Connection (DAC)
connection with CERTKILLER-DB01. You need to determine the correct port DAC will it use by
default to connect to CERTKILLER-DB01.
sts

What should you identify?


lTe

A. The DAC model will use port 1443 by default.


B. The DAC model will use port 1434 by default.
C. The DAC model will use port 443 by default.
tua

D. The DAC model will use port 80 by default.

Answer: B
Ac

Explanation:
By default, DAC uses the Ioopback address, which is 127.0.0.1, along with port 1434. To initialize
DAC on the SQL Server, you should first use a client on the server itself. If you need to remotely
connect to the SQL Server instance using DAC, then you should run the sp_configure stored
procedure. This will enable DAC for the remote connections.
Incorrect Answers:
A: Port 1433 is the port on which SQL Server listens for client requests. This port is not used for
DAC connections.
C: Port 443 is the default SSL port. This port is not used for DAC connections.
D: Port 80 is the default HTTP port. This port is not used for DAC connections.

"Pass Any Exam. Any Time." - www.actualtests.com 160


Microsoft 70-450: Practice Exam
QUESTION NO: 165

CertKiller.com has hired you as a database administrator for their network. You are responsible for
administering a Microsoft SQL Server 2008 server named CERTKILLER-DB01. CERTKILLER-
DB01 contains numerous databases that are accessed by aCertKiller.com users.

You receive numerous complaints from users regarding the poor performance of CERTKILLER-
DB01. You have a suspicion that the performance error is a result of deadlocks. You receive an
instruction from management to determine which transaction is causing the deadlocks. You decide
to collect the information regarding the deadlocks and save it in a file.

What should you do?

A. You should consider creating a trace flag.


B. You should consider creating a System Monitor counter.

m
C. You should consider creating a SQL Server Profiler trace.
D. You should consider creating a Policy-based Management policy.

Answer: C
.co
Explanation:
sts
SQL Server Profiler is a tool that provides a graphical user interface for monitoring an instance of
the SQL Server Database Engine or Analysis Service services. SQL Server Profiler allows you to
capture and save data about each event to a table or a file for analysis. You can also replay the
lTe

events captured by SQL Server Profiler to determine what exactly happened. To trace deadlock
events, you should add the Deadlock graph event class to a trace. To do this, you should create a
new trace by using SQL Server Profiler.
tua

Incorrect Answers:
A: You cannot create a new trace flag in SQL Server 2008. Trace flags typically diagnose
performance issues or debug stored procedures. Trace flags allow you to set particular
Ac

characteristics of a server on a temporary basis or to turn off specific behavior. SQL Server
contains some existing trace flags that can be used for this purpose. SQL Server 2008 does not
allow you to create new trace flags.
B: You should not create a System Monitor counter. System Monitor is primarily used for
monitoring resource usage associated with server processes. A System Monitor counter would not
allow you to capture information about deadlock events and save it in a table on the SQL server.
D: You should not create a Policy-Based Management policy because it cannot be used to collect
information about deadlock events and save it in a file. Policy-Based Management manages
entities, such as databases or other SQL Server objects, on an instance of SQL Server 2008.

QUESTION NO: 166

"Pass Any Exam. Any Time." - www.actualtests.com 161


Microsoft 70-450: Practice Exam
CertKiller.com has employed you as a database administrator. CertKiller.com currently makes use
of Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB03 that hosts a database named CK_SALES.

CK_SALES is configured as a log shipping database. You have received instruction from the CIO
to create a maintenance plan in order to execute full backups, differential backups as well as
transaction log backups on CK_SALES. During routine monitoring you discover that log shipping
does not function properly on CK_SALES. To maintain productivity you need ensure that log
shipping functions properly.

What should you do?

A. This can be accomplished by ensuring that the database maintenance plan does not create
transaction log backups.
B. This can be accomplished by ensuring that the database maintenance plan does not create full

m
backups
C. This can be accomplished by rescheduling the backup job and alert job for log shipping
.co
D. This can be accomplished by rescheduling the copy job and restore job for log shipping

Answer: A
sts

Explanation:
In this scenario, if the maintenance plan and log shipping both attempt to create transaction log
lTe

backups of the Orders database, log shipping will not function correctly. You should only have the
maintenance plan create full backups and differential backups. You should use your log shipping
backup folder to archive the log backups. You should archive the logs to another media for long-
tua

term storage. You should also set the backup retention period to a longer time period to allow you
to store the log files.
Incorrect Answers:
Ac

B: You do not have to eliminate the full backups from the database maintenance plan. The conflict
is not caused by the full backup, but by the log shipping and maintenance plan trying to create log
backups of the same database.
C: You should not reschedule the any of the jobs for log shipping. When log shipping is
implemented, four jobs are needed: the backup job, copy job, restore job, and alert job. The
backup job performs the backup operation, logs history to the local server and the monitor server,
and removes old backup files and history information. The copy job resides on the secondary
server instance and copies the backup files from the primary server to the secondary server. The
restore job is created on the secondary server and restores the copied backup files to the
secondary databases. The alert job is created on the monitor server instance. This job raises
alerts for the primary and secondary databases when the backup and restore operations have not
completed successfully. Changing the schedule of these jobs will not fix the problem. The problem
is caused because the maintenance plan and log shipping are both attempting to create a
transaction log of the same database.

"Pass Any Exam. Any Time." - www.actualtests.com 162


Microsoft 70-450: Practice Exam
D: You should not reschedule the any of the jobs for log shipping. When log shipping is
implemented, four jobs are needed: the backup job, copy job, restore job, and alert job. The
backup job performs the backup operation, logs history to the local server and the monitor server,
and removes old backup files and history information. The copy job resides on the secondary
server instance and copies the backup files from the primary server to the secondary server. The
restore job is created on the secondary server and restores the copied backup files to the
secondary databases. The alert job is created on the monitor server instance. This job raises
alerts for the primary and secondary databases when the backup and restore operations have not
completed successfully. Changing the schedule of these jobs will not fix the problem. The problem
is caused because the maintenance plan and log shipping are both attempting to create a
transaction log of the same database.

QUESTION NO: 167

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.
.co
You have received instruction from the CIO to use the dbcc traceon 1222 command in order to
sts

enable a global trace. You enter command by omitting the -T parameter. You need to determine
what the result will be.
lTe

What should you identify?

A. The command will have no effect.


tua

B. The command will be applicable for the current session.


C. The command will be automatically used as a global trace flag.
D. The command will vary as applied using the dbcc traceon command.
Ac

Answer: B

Explanation:
A trace flag can be either a session trace flag or a global trace flag. A session trace flag is active
for the current session only. A global trace flag is visible to every connection on the server. The -T
parameter applies only to a global trace flag. The trace flag will apply to the current session, but
not to any other sessions on the server.
To enable it globally, you should use the -T parameter at startup. You can also write a startup
script to apply the global trace flag. A trace flag can either be specific to a session or it can be a
global trace flag. A trace flag can be switched on or off by using the DBCC TRACEON and DBCC
TRACEOFF commands.
Incorrect Answers:

"Pass Any Exam. Any Time." - www.actualtests.com 163


Microsoft 70-450: Practice Exam
A: The remaining options are incorrect. A global trace flag is applicable globally and is not specific
to a session. The global trace flag is never used automatically as a global trace flag; you must use
the -T parameter to mark it a global trace flag. The behavior of the trace flag does not vary except
that you need to use the -T parameter.
C: The remaining options are incorrect. A global trace flag is applicable globally and is not specific
to a session. The global trace flag is never used automatically as a global trace flag; you must use
the -T parameter to mark it a global trace flag. The behavior of the trace flag does not vary except
that you need to use the -T parameter.
D: The remaining options are incorrect. A global trace flag is applicable globally and is not specific
to a session. The global trace flag is never used automatically as a global trace flag; you must use
the -T parameter to mark it a global trace flag. The behavior of the trace flag does not vary except
that you need to use the -T parameter.

QUESTION NO: 168

m
CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
.co
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for
administering a database server named CERTKILLER-DB01.
sts

You are in the process of monitoring the threads on CERTKILLER-DB01. You accomplish this
using the sys.dm_os_wait_stats view. You discover that there is a wait on the data packets. The
lTe

thread is also waiting for the query to end. You need to determine the type of wait that will illustrate
this.
tua

What should you identify?

A. The CHECKPOINT_QUEUE wait will illustrate this.


B. The CXPACKET wait will illustrate this.
Ac

C. The CHKPT wait will illustrate this.


D. The EXCHANGE wait will illustrate this.

Answer: B

Explanation:
The CXPACKET wait occurs when there is a wait on the data packets and the thread is waiting for
the query to finish. This type of wait can be viewed using sys.dm_os_wait_stats view. To reduce
wait, you can either reduce the degree of parallelism, or use the MAXDOP query hint to limit the
number of processors used for the query.
Incorrect Answers:
A: The CHECKPOINT_QUEUE option is incorrect. This wait occurs when a checkpoint task is
made to wait for the next checkpoint request. The CHECKPOINT_QUEUE wait does not occur
when there is a wait on the data packets and the thread is waiting for the query to finish.

"Pass Any Exam. Any Time." - www.actualtests.com 164


Microsoft 70-450: Practice Exam
C: The CHKPT option is incorrect. The CHKPT wait occurs when SQL Server is starting up.
CHKPT informs the checkpoint thread to start during a SQL Server start. The CHKPT wait does
not occur when there is a wait on the data packets and the thread is waiting for the query to finish.
D: The EXCHANGE option is incorrect. This type of wait occurs in the query processor exchange
iterator when the synchronization phase of parallel queries is in process. The EXCHANGE wait
does not occur when there is a wait on the data packets and the thread is waiting for the query to
finish.

QUESTION NO: 169

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to view the

m
deadlocks that have occurred on CERTKILLER-DB01 whilst extracting the information to a
deadlock XML file.
.co
What should you do?
sts
A. You should consider making use of Dynamic management views.
B. You should consider making use of Database Engine Tuning Advisor.
C. You should consider making use of Performance Monitor.
lTe

D. You should consider making use of SQL Server Profiler.

Answer: D
tua

Explanation:
You should use the SQL Server Profiler to view deadlocks that have occurred on the server and to
extract the information to a deadlock XML file. You can use SQL Server Profiler to trace specific
Ac

events that take place in the database. To be able to capture a deadlock event, you need to add
the Deadlock graph event class to the trace that you use for tracking deadlock events. When you
add the Deadlock graph event, the information regarding the processes and objects in the
deadlock is added to the Text Data column. You can extract the XML document as a deadlock
XML document, which is . xdl file. You can then open the . xdl file in the SQL Server Management
Studio.
Incorrect Answers:
A: You should not use dynamic management views to view the deadlocks that have occurred on
the server. Dynamic management views are used for monitoring the health of a SQL Server and
its resources. You can also use dynamic management views to diagnose a variety of
performance-related issues that may arise while running the server.
B: You should not use Database Engine Tuning Advisor to view the deadlocks that have occurred
on the server. Database Engine Tuning Advisor is not meant to capture information on deadlocks.

"Pass Any Exam. Any Time." - www.actualtests.com 165


Microsoft 70-450: Practice Exam
Database Engine Tuning Advisor can work with different types of indexes, such as clustered or
nonclustered. You can also use Database Engine Tuning Advisor to resolve unused or potential
index issues.
C: You should not use Performance Monitor to view the deadlocks that have occurred on the
server. Performance Monitor is not meant to capture information on deadlocks. However,
Performance Monitor can capture performance-related information on the services running on the
operating system and using operating system resources, such as RAM and the processor.

QUESTION NO: 170

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com recently discovered that CERTKILLER-DB01 is no longer accessible

m
to its clients due to an error. You have later created a Dedicated Administrator Connection with the
server and attempt to connect to CERTKILLER-DB01 from the SQL Server Management Studio
.co
Query Editor, but receive an error 17810. CertKiller.com wants you to resolve the error.

What should you do?


sts

A. You should consider making use of the sqlcmd command-prompt utility to use DAC.
B. You should consider using port 80 as the default port.
lTe

C. You should consider disconnecting before you attempt to connect.


D. You should consider making use of the DAC to connect with the default database instead of the
master database.
tua

Answer: C

Explanation:
Ac

There can only be one DAC connection to the SQL Server instance. Error 17810 occurs if you
attempt another connection when an existing connection is alive. You must disconnect the first
connection to be able to connect using DAC. With a single connection, this error does not occur.
You can connect either remotely or through the client on the server itself. If you want to connect
remotely, you must run the sp_configure procedure on the server to enable remote connections.
Also, anyone trying to establish a DAC connection must have the sqladmin permission on the SQL
Server.
Incorrect Answers:
A: You can use either the sqlcmd command-prompt utility or the SQL Server Management Studio
Query Editor to connect. It is not mandatory to connect using the sqlcmd command-prompt utility.
The error in this scenario does not relate to the command.
B: You should not use port 80 as the default port to resolve this problem. By default, DAC uses the
loopback address, which is 127.0.0.1, along with port 1434. To initialize DAC on the SQL Server,

"Pass Any Exam. Any Time." - www.actualtests.com 166


Microsoft 70-450: Practice Exam
you should first use a client on the server itself. If you need to remotely connect to the SQL Server
instance using DAC, you should run the sp_configure stored procedure. This will enable DAC for
remote connections. The error stated in the scenario does not relate to the port being used.
D: You should not try to make a connection to the default database. The error in this scenario
does not relate to which database you are trying to connect. By default, connections are made to
the default database. After connecting to the default database, you can connect with the master
database. However, there is a provision to override the connection to the default database and
directly connect to the master database. You can do this by issuing the sqlcmd A d master
command.

QUESTION NO: 171

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a

m
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to lower the
.co
degree of parallelism after discovering a wait problem in the sys.dm_os_wait_stats view.
CertKiller.com wants you to identify which problem will be corrected taking the actions above?
sts
A. The CXPACKET problem will be corrected.
B. The CHECKPOINT_QUEUE problem will be corrected.
C. The CHKPT problem will be corrected.
lTe

D. The EXCHANGE problem will be corrected.

Answer: A
tua

Explanation:
Lowering the degree of parallelism will affect the CXPACKET wait. This type of wait occurs when
there is a wait on the data packets and the thread is waiting for the query to finish. To be able to
Ac

reduce wait, you can either reduce the degree of parallelism or use the MAXDOP query hint to
limit the number of processors used for the query.
Incorrect Answers:
B: The option CHECKPOINT_QUEUE is incorrect. This wait occurs when the checkpoint task is
made to wait for the next checkpoint request. Lowering the degree of parallelism does not affect
this wait.
C: The CHKPT option is incorrect. CHKPT wait occurs when a SQL Server is starting up. CHKPT
informs the checkpoint thread to start during a SQL Server start. Lowering the degree of
parallelism does not affect this wait.
D: The EXCHANGE option is incorrect. This type of wait occurs in the query processor exchange
iterator when the synchronization phase of parallel queries is in process. Lowering the degree of
parallelism does not affect this wait.

"Pass Any Exam. Any Time." - www.actualtests.com 167


Microsoft 70-450: Practice Exam

QUESTION NO: 172

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to make use
of SQL Server Profiler to trace specific event on the database which took place. CertKiller.com
additionally wants you to create a template which will be used in another server named
CERTKILLER-DB02. CertKiller.com wants to know the advantages of using a trace template.

A. The advantage of using a trace template is that you will be allowed to capture the same event
data each time.
B. The advantage of using a trace template is that you will be allowed to share the traces in a file.

m
C. The advantage of using a trace template is that you will be allowed to create a workload.
D. The advantage of using a trace template is that you will be allowed to capture events and
replay them later. .co
Answer: A
sts

Explanation:
The benefit of creating a trace template is that you will be able to capture the same event data
lTe

each time you use the template. When you define a trace template, you define trace definitions to
monitor for a specific event. With a template, you do not need to configure the trace definitions
repeatedly. The same template can be exported from one server and imported onto the other
tua

server for reuse.


The other alternatives are benefits of saving traces in a file, not benefits of creating a trace
template. Saving traces in a file has the following benefits:
Allows you to create a workload
Ac

Allows you to capture events and replay them later


Allows you to share traces in a file

In SQL Server Profiler, you can have either a trace file or a trace template. The trace file contains
the captured trace data and the trace template contains consistent trace definitions that can be
used each time you run the template. SQL Server Profiler is typically used to trace specific events.
For instance, you can use SQL Server Profiler to view deadlocks that have occurred on the server
and extract the information to a deadlock XML file (. xdl ). You can use SQL Server Profiler to
trace specific events on the database that take place in the database.

QUESTION NO: 173

"Pass Any Exam. Any Time." - www.actualtests.com 168


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to generate
performance recommendations for indexes available in the CK_SALES database on
CERTKILLER-DB01 then generate a script to apply the recommendations.

What should you do?

A. You should consider making use of Dynamic management views.


B. You should consider making use of Database Engine Tuning Advisor.
C. You should consider making use of SQL Server Profiler.
D. You should consider making use of SQL Query Analyzer.

Answer: B

m
Explanation:
You should generate a script to apply the recommendations, which can be done easily by
.co
exporting the script with the . sql extension. The same script can then be run on a database in
Query Editor. If you have a performance-related concern, you can use the Database Engine
sts
Tuning Advisor to recommend indexes for a single or multiple databases. The Database Engine
Tuning Advisor can work with different types of indexes, such as clustered or nonclustered . You
can also use the Database Engine Tuning Advisor to resolve unused or potential index issues.
lTe

Incorrect Answers:
A: You should not use dynamic management views. A number of dynamic management views or
functions are available to provide index status in a database. However, these views or functions
tua

do not provide recommendations and generate a script for applying the recommendations.
C: You should not use SQL Server Profiler because it does not provide recommendations on the
indexes in your database. It will also not be able to generate a script for the recommendations.
Ac

SQL Server Profiler is used for tracing certain events that take place within a database. An
example of such an event is login failures that may occur when connecting to a database.
D: You should not use SQL Query Analyzer because it no longer exists in SQL Server 2008. This
was part of the SQL Server 2000 or prior versions. From SQL Server 2005 onwards, it has been
replaced with SQL Server Management Studio.

QUESTION NO: 174

You work as a database administrator at CertKiller.com. You are responsible for administering a
SQL Server 2008 instance.

The instance is located on a four-processor, quad-core server named CERTKILLER-DB04.


CERTKILLER-DB04 often experiences CPU pressure. The instance includes an enormous

"Pass Any Exam. Any Time." - www.actualtests.com 169


Microsoft 70-450: Practice Exam
mission-critical database that is constantly being used. You receive an instruction from
management to make sure that the online index rebuilds does not use all the available CPU
cycles. You thus need to determine the configuration option that will ensure this.

What should you do?

A. You should use the affinity I/O mask option.


B. You should use optimize for ad hoc workloads option.
C. You should use the affinity mask option.
D. You should use the max degree of parallelism option.

Answer: D

QUESTION NO: 175

m
CertKiller.com has employed you as a database administrator. You are responsible for
.co
administering the SQL Server 2008 infrastructure of the organization.

You receive an instruction from management to implement a maintenance strategy plan for a
sts
critical database that includes a table named CK_SALES. The maintenance strategy plan should
also include the index maintenance operations.
lTe

You consider the facts below prior to designing the strategy:The standard fragmentation for the
clustered index of the CK_SALES is less than 3 percent.New rows are added to CK_SALES
continuously.CK_SALES includes a column of the xml data type.CK_SALES is accessed
tua

continuously.

To ensure productivity you need to use strategy to make sure that the performance of the queries
Ac

on CK_SALES is at its best.

What should you do?

A. You should consider having CK_SALES reorganizing by configuring the NTFS quotas.
B. You should consider stopping the clustered index of CK_SALES from reorganizing, scheduled
or rebuilding operations.
C. You should consider using the File Server Resource Manager (FSRM) on CK_SALES.
D. You should consider having the Storage Manager rebuilding montly.

Answer: B

QUESTION NO: 176

"Pass Any Exam. Any Time." - www.actualtests.com 170


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for managing a database
server named CERTKILLER-DB01 that hosts a database named CK_PRODUCTS.

CK_ PRODUCTS contains over three million rows and six columns with information for the year.
You receive an instruction from the CIO to replicate the information to numerous subscribers. You
decide to divide the table into multiple partitioned tables. You make use of transformable
subscriptions that exclude certain rows on a per subscriber basis to accomplish this. You need to
make sure that every table hold data for a specific quarter is included in a table.

What should you do?

A. You should consider using vertical partitioning.


B. You should consider using horizontal partitioning.
C. You should consider using Row-Splitting partitioning.

m
D. You should consider using Normalization partitioning.

Answer: B .co
Explanation:
sts
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
able to split the table into fewer rows with the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
lTe

the same. You gain a performance benefit because you will have fewer rows to work with.
Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.
As an example, you can split the table into four different tables where each table represents data
tua

for a specific quarter for the year. However, in this type of partitioning, the number of columns
always remains the same across multiple tables.
Incorrect Answers:
Ac

A: In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
partitioning, the columns are divided among multiple tables with the same number of rows. Vertical
partitioning can be of two types:
C: In row splitting, fewer columns are retained, which means that each row contains a portion of
the logical row in the partitioned table. When you join the rows from the partitioned tables based
on a UNIQUE KEY column, it becomes the original row with the complete data.
D: In normalization, redundant columns are removed from the primary table and moved into
secondary tables. The redundant columns are then linked with the primary table using the primary
or foreign key.

QUESTION NO: 177

"Pass Any Exam. Any Time." - www.actualtests.com 171


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for managing a database
server named CERTKILLER-DB01 that hosts a database named CK_RESEARCH.

CK_RESEARCH contains over four million rows and eight columns with information for one
annum. You receive an instruction from the CIO to replicate the information to numerous
subscribers. You decide to divide the table into multiple partitioned tables. You make use of
transformable subscriptions that exclude certain rows on a per subscriber basis to accomplish this.
You need to make sure that every table hold data for a specific quarter is included in a table.

What should you do?

A. You should consider using vertical partitioning.


B. You should consider using Row-Splitting partitioning.
C. You should consider using Normalization partitioning.

m
D. You should consider using horizontal partitioning.

Answer: D .co
Explanation:
sts
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
able to split the table into fewer rows with the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
lTe

the same. You gain a performance benefit because you will have fewer rows to work with.
Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.
As an example, you can split the table into four different tables where each table represents data
tua

for a specific quarter for the year. However, in this type of partitioning, the number of columns
always remains the same across multiple tables.
Incorrect Answers:
Ac

A: In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
partitioning, the columns are divided among multiple tables with the same number of rows. Vertical
partitioning can be of two types:
B: In row splitting, fewer columns are retained, which means that each row contains a portion of
the logical row in the partitioned table. When you join the rows from the partitioned tables based
on a UNIQUE KEY column, it becomes the original row with the complete data.
C: In normalization, redundant columns are removed from the primary table and moved into
secondary tables. The redundant columns are then linked with the primary table using the primary
or foreign key.

QUESTION NO: 178

"Pass Any Exam. Any Time." - www.actualtests.com 172


Microsoft 70-450: Practice Exam
CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are
the administering a Microsoft SQL Server 2008 that contains a database with a huge amount of
data.

A table in the database contains more than 6 million rows and 6 columns. You receive an
instruction from the CIO to replicate the data to a number of subscribers. You decide to partition
the information in a horizontal manner for a transformable subscription. You need to determine
how the subscribers will receive the subscription during the replication process.

What should you identify?

A. It will result in the table having fewer rows and same amount of columns.
B. It will result in the table having same amount of columns and same amount of rows.
C. It will result in the table having same amount of rows but less columns.
D. It will result in the table having fewer columns and fewer rows.

m
Answer: A

Explanation:
.co
When you apply horizontal partitioning on a table that contains a large number of rows, you will be
sts
able to split the table into fewer rows and the same number of columns. With horizontal
partitioning, the number of rows is split across multiple tables but the number of columns remains
the same. You gain a performance benefit because you will have fewer rows to work with.
lTe

Horizontal partitioning allows you to split the rows across multiple tables depending on your needs.
As an example, you can split the table into four different tables where each table represents data
for a specific quarter for the year. However, in this type of partitioning, the number of columns
tua

always remains the same across multiple tables.

In vertical partitioning, you will have the same number of rows but fewer columns. In vertical
Ac

partitioning, the columns are divided amongst multiple tables with the same number of rows.
Vertical partitioning can be of two types: normalization and row splitting. In normalization,
redundant columns are removed from the primary table and moved into secondary tables. The
redundant columns are then linked with the primary table using primary or foreign key. In row
splitting, fewer columns are retained, which means that each row contains a portion of the logical
row in the partitioned table. When you join the rows from the partitioned tables based on a
UNIQUE KEY column, it becomes the original row with the complete data. The remaining two
options are incorrect. They cannot be achieved by applying horizontal partitioning.

QUESTION NO: 179

CertKiller.com has hired you as a database administrator for their network.. CertKiller.com
currently makes use of Microsoft SQL Server 2008 Enterprise Edition for hosting databases. You

"Pass Any Exam. Any Time." - www.actualtests.com 173


Microsoft 70-450: Practice Exam
are responsible for administering a database server named CERTKILLER-DB01 that hosts a
database named CK_ACCOUNTS.

You are in the process of creating a partition for a column named ItemID in the Items table that is
located in CK_ACCOUNTS. You decide to configure page partition on the partition. During routine
monitoring you discover that the performance of CERTKILLER-DB01 has degraded after page
compression was configured. You need to determine the dynamic management function you
should use in order to monitor the page compression statistics for the partition.

What should you do?

A. You should consider using sys.dm_db_index_operational_stats.


B. You should consider using sys.dm_db_partition_stats.
C. You should consider using sys.dm_db_index_usage_stats.
D. You should consider using sys.dm_db_index_physical_stats.

m
Answer: A

Explanation:
.co
SQL Server 2008 Enterprise and Developer editions allow you to configure compression for tables
sts
and indexes. The two types of data compression are row and page compression. When you have
configured partitions on a table or index, you can configure different types of compression for each
partition. You can use the data_compression parameter of the create table, create index , alter
lTe

table, and alter index Transact-SQL statements to configure data compression. The possible
values for this parameter are:
DATA_ COMPRESSION = { NONE | ROW | PAGE }
tua

Configuring row and page compression can affect the performance of your sever. When you
configure row and page compression, CPU utilization is increased, while I/O utilization and
memory utilization is decreased. You can query the sys.
Ac

dm_db_index_operational_stats dynamic management function to obtain page compression


statistics.
Incorrect Answers:
B: You should not query the sys.dm_db_partition_stats dynamic management function because
this function does not provide page compression statistics for a partition. The
sys.dm_db_partition_stats function provides information about page and row-count for every
partition in the current database.
C: You should not query the sys.dm_db_index_usage_stats dynamic management function
because this function does not provide page compression statistics for a partition. The
sys.dm_db_index_usage_stats function provides information about the number of different types
of index operations along with the time each type of operation was last performed.
D: You should not query the sys.dm_db_index_physical_stats dynamic management function
because this function does not provide page compression statistics for a partition. The
sys.dm_db_index_physical_stats function contains information about the size and fragmentation

"Pass Any Exam. Any Time." - www.actualtests.com 174


Microsoft 70-450: Practice Exam
for the data and indexes of the specified table or view.

QUESTION NO: 180

CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com


include administering the SQL Server 2008 servers.

You receive an instruction from the CIO to create a partitioned data warehouse fact table. Due to
the size of the table you need to store the information over a number of disks. CertKiller.com has
partitioning functions that split the tables horizontally based on the value in a particular column.
You need to make sure that the partitions are all compressed.

What should you do?

m
A. You should make use of ALTER TABLE and REBUILD PARTITION = 0.
B. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = 0.
.co
C. You should make use of ALTER PARTITION FUNCTION and REBUILD PARTITION = ALL.
D. You should make use of ALTER TABLE and REBUILD PARTITION = ALL.
sts
Answer: D

Explanation:
lTe

The alter table statement rebuilds one or all partitions. You can specify a single partition to rebuild,
or you can specify multiple partitions. If you specify rebuild partition = all, you can rebuild the table
on all partitions. The following code rebuilds all partitions for the Orders table on partitions.
tua

Partitions 1, 2 and 3 are rebuilt with page-level compression. Partitions 4, 5, and 6 are rebuilt with
row-level compression.
ALTER TABLE Orders REBUILD PARTITION = ALL WITH (DATA_COMPRESSION = PAGE
ON PARTITIONS (1 TO 3), DATA_COMPRESSION = ROW ON PARTITIONS (4 TO 6) )
Ac

In correct Answers:
A: You should not use the alter table statement and the rebuild partition = 0 option. The rebuild
partition option specifies the number of the partition to be rebuilt. The number of the partition
cannot be zero.
B, C: You should not use any option with the alter partition function statement. You can only
rebuild a partition for a table with the alter table statement, not the alter partition function
statement. Splits and merges are handled through the alter partition function statement.

Part 2: Design a solution to govern resources (2 Questions)

"Pass Any Exam. Any Time." - www.actualtests.com 175


Microsoft 70-450: Practice Exam

QUESTION NO: 181

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
TESTDATA.

During routine monitoring you discover that TESTDATA is experiencing high volumes of queries
and transactions that affect the performance of the processor. You send a proposal to
management outlining your plans to implement an incremental backup strategy for TESTDATA as
well as using backup compression. It is important that you make sure that the backup jobs have a
little effect on the performance of CERTKILLER-DB01.

What should you do?

m
A. This can be accomplished by using a resource-allocation policy.
.co
B. This can be accomplished by configure Background Intelligent Transfer Service (BITS) server
extensions.
C. This can be accomplished by configure the Distributed File System (DFS).
sts
D. This can be accomplished by ensuring that the Resource Governor is used.

Answer: D
lTe

QUESTION NO: 182


tua

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
Ac

database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you discovered that the high-priority application used
with the database performs poorly when run at the same time with lower-priority resource intensive
applications on CERTKILLER-DB01. CertKiller.com wants you to configure the Resource
Governor.

What should you do? (Choose all that apply)

A. You should consider creating a trace log


B. You should consider creating a counter log
C. You should consider creating a workload file.
D. You should consider creating a workload group.
E. You should consider creating a classifier function.
F. You should consider creating a resource pool.

"Pass Any Exam. Any Time." - www.actualtests.com 176


Microsoft 70-450: Practice Exam
Answer: D,E,F

Explanation:
You should perform the following steps in this order:
Create a resource pool.
Create a workload group.
Define a classifier function.

To control resources effectively, applications can be grouped by priority into resource pools using
the Resource Governor. Resource Governor must first be enabled. After the Resource Governor
has been enabled, you can create a resource pool to set limits on resource usage. You can then
limit the resource usage by application pool to prevent the lower-priority applications from taking
resources from high-priority applications.
You should create a workload group for the resource pool to specify limits and policies. After
creating the workload group, you should then create a classifier function. The classifier function

m
groups applications into workload groups so that limits can be applied to the workload groups for
their resource usage.
Incorrect Answers: .co
A: You should not create a trace log or a counter log. Trace logs and counter logs are not
configured in the Resource Governor.
sts
B: You should not create a trace log or a counter log. Trace logs and counter logs are not
configured in the Resource Governor.
C: You should not create a workload file. A workload file can be used by the database engine
lTe

tuning advisor to determine the usefulness of indexes. You do not need a workload file to
configure the Resource Governor. Part 3: Design policies by using Policy-Based Management (10
Questions)
tua

QUESTION NO: 183


Ac

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2003 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.

You have received instruction from the CIO to add the Policy-Based Management policies below
on CERTKILLER-DB01:All the tables in the user databases must have an index.All the stored
procedures in the user databases must begin with DS_Disabling Database Mail on CERTKILLER-
DB01.Only encrypted views must be created on the user databases.

It has come to your attention that transactional replication fails between CERTKILLER-DB01 and
several other SQL servers after the policies were implemented. You need to determine a way to
solve the problem.

"Pass Any Exam. Any Time." - www.actualtests.com 177


Microsoft 70-450: Practice Exam
What should you do?

A. You should consider disabling the policy that disables Database Mail on CERTKILLER-DB01.
B. You should consider disabling the policy that only permits encrypted views on the user
databases.
C. You should consider disabling the policy that indicates that the stored procedures in user
databases must begin with DS_.
D. You should consider disabling the policy that indicates that all tables in the user databases
must have an index.

Answer: D

Explanation:
When Policy-Based Management is applied on a SQL Server instance, the policies can affect the
functionality of the server. In this scenario, the policy that forces every table to have an index will
cause a problem with transactional replication. Transactional replication uses the systtanschemas

m
table. This table does not have an index. The policy that forces all tables to have an index will
conflict with the systranschemas table and cause transactional replication to fail. No other policies
will cause problems with transactional replication.
.co
Incorrect Answers:
sts
A: Disabling Database Mail will not cause transaction replication to fail. Transactional replication
relies on the publication database, distribution database, subscription database, and the log
reader agent. Database Mail is not a part of transactional replication.
lTe

B: Specifying that encrypted views must only be created in a database or specifying a stored
procedure must be named a certain way will not conflict with transactional replication. You can
replicate both views and stored procedures in transactional replication.
tua

C: Specifying that encrypted views must only be created in a database or specifying a stored
procedure must be named a certain way will not conflict with transactional replication. You can
replicate both views and stored procedures in transactional replication.
Ac

QUESTION NO: 184

You work as a database administrator at CertKiller.com. CertKiller.com has headquarters in


London and branch offices in Paris, Berlin, Milan, Madrid, Stockholm, Warsaw, and Athens. You
are responsible for administering a SQL Server 2008 infrastructure.

The branch offices of CertKiller.com store information regarding their clients in SQL Server 2008
databases. A CertKiller.com security policy states that client information stored across numerous
database instances should be security compliant. You make use of the Policy Based Management
feature to design a strategy for the custom policies that are in XML format.

You have to make sure that the strategy allows custom policies to be distributed to all instances

"Pass Any Exam. Any Time." - www.actualtests.com 178


Microsoft 70-450: Practice Exam
and that the policies are implemented on all the instances. You need to accomplish this with the
minimum of administrative effort.

What should you do?

A. Your best option would be to make use of IPsec domain isolation.


B. Your best option would be to make use of a configuration server.
C. Your best option would be to make use of multiple downstream servers.
D. Your best option would be to make use of cluster quorum drive.

Answer: B

QUESTION NO: 185

You work as a database administrator at CertKiller.com. Your duties include administering the

m
SQL Server 2008 infrastructure.
.co
You receive an instruction from management to enforce naming standards for the database
objects. You thus decide to implement a way to enforce naming standards. Due to the lack of staff
sts
you need to accomplish this with the least amount of programming and administrative efforts.

What should you do?


lTe

A. Your best option would be to execute the DBCC CHECKDB command on the SSMS.
B. Your best option would be to use the varbinary(MAX) data type with FILESTREAM storage of
tua

the DDL triggers.


C. Your best option would be to make use of Event Viewer tasks.
D. Your best option would be to create Policy-Based Management policies.
Thereafter you should use the configuration server and distribute the policies.
Ac

Answer: D

QUESTION NO: 186

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01.

Due to company growth CertKiller.com acquired another company named Courseware Publishers.
Prior to acquiring the company you created a Policy-Based Management policy on CERTKILLER-
DB01. You receive an instruction from the CIO to apply the policy to the SQL 2008 servers in the
courseware.com domain.

"Pass Any Exam. Any Time." - www.actualtests.com 179


Microsoft 70-450: Practice Exam

What should you do? (Choose all that apply.)

A. This can be accomplished by evaluating the policy against all the instances of SQL Server in
the server group.
B. This can be accomplished by importing the policy to the courseware.com domain using the
Group Policy Management console.
C. This can be accomplished by creating a two-way trust between the courseware.com domain
and CertKiller.com domain.
D. This can be accomplished by creating a Central Management Server group that will include the
instances of the SQL Servers in the CertKiller.com domain as well as the courseware.com
domain.
E. This can be accomplished by forcing replication between the domains.
F. This can be accomplished by exporting the Policy-Based Management policy from
CERTKILLER-DB01 to an XML file.

m
G. This can be accomplished by creating a Central Management Server group that will hold the
instances of the SQL Servers in the courseware.com domain.

Answer: A,D,F
.co
Incorrect Answers:
sts
B: You should not use the Group Policy Management console to import the policy to the
courseware.com domain. A Policy-Based Management policy is not active directory based like a
group policy object (GPO). You should use the SQL Server Management Studio to import the
lTe

policy, not the Group Policy Management console.


C: Policy-Based Management policy is not based on active directory thus you do not need a trust
between the domains.
tua

E: You do not have to create a two-way trust between the courseware.com domain and the
CertKiller.com domain and you do not have to force replication between the domains.
G: You should not create a Central Management Server group that contains only instances of the
Ac

SQL servers in the courseware.com domain. The Central Management Server group can contain
server instances from different domains or workgroups. You should have servers in both domains
in the Central Management Server group.

QUESTION NO: 187

CertKiller.com has hired you as a database administrator for their network. CertKiller.com currently
makes use of Microsoft SQL Server 2008. You are responsible for administering a database
server named CERTKILLER-DB01.

You receive an instruction from the CIO to create a policy that requires all databases on
CERTKILLER-DB01 have the full recovery model and the Trustworthy property set. You decide to
create a condition for the Policy-Based Management policy.

"Pass Any Exam. Any Time." - www.actualtests.com 180


Microsoft 70-450: Practice Exam

What should you do?

What facet must you use to?


.

A. You should consider using the Surface Area Configuration facet.


B. You should consider using the Schema facet.
C. You should consider using Database Maintenance facet.
D. You should consider using Database Options facet.

Answer: D

Explanation:
The Database Options facet specifies options that can be set with the sp_dboptions stored
procedure as well as by configuring the Trustworthy property on the database and the recovery

m
model of the database.
Incorrect Answers:
.co
A: You should not use the Surface Area Configuration. This facet allows you to enable support for
the OPENROWSET and OPENDATASOURCE functions, CLR integration, Database Mail or SQL
sts
Mail, and the xp_cmdshell. The facet does not contain properties for the recovery model of the
database or the Trustworthy property of the database.
B: You should not use the Schema facet. This facet contains property for the name, ID, and owner
lTe

of the schema. The facet does not contain properties for the recovery model of the database or the
Trustworthy property of the database.
C: You should not use the Database Maintenance facet. This facet includes the property for the
tua

recovery model but does not allow you to set the Trustworthy property on the database.
Ac

QUESTION NO: 188

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to institute a
naming convention which requires all stored procedures in the CK_SALES database to start with
the letters KING. You have decided to have a user named Rory Allen create and test the policy.
CertKiller.com wants to know which membership role would be required to create the policy.

What would your reply be?

A. Rory Allen should have the dc_admin role in the master database.
B. Rory Allen should have the dc_admin role in the msdb database.

"Pass Any Exam. Any Time." - www.actualtests.com 181


Microsoft 70-450: Practice Exam
C. Rory Allen should have the PolicyAdministratorRole role in the master database.
D. Rory Allen should have the PolicyAdministratorRole role in the msdb database.

Answer: D

Explanation:
Members of this role can create and test a policy for Policy-Based Management, as well as
perform all configuration and maintenance activities on Policy-Based Management policies and
the conditions associated with the polices.
Incorrect Answers:
A: You cannot add the user to the dc_admin role in the master database. The dc_admin role only
exists in the msdb database.
B: You should not add the user to the dc_admin role in the msdb database. Members of this role
can use, maintain, and administer the data collector for the SQL Server 2008 server instance. This
role cannot be used to manage policies in Policy-Based Management.

m
C: You cannot add the user to the PolicyAdministratorRole role in the master database. The
PolicyAdministratorRole role only exists in the msdb database, where policies are stored.
.co
QUESTION NO: 189
sts

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
lTe

database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to enforce a
naming convention policy which has all tables beginning with the name CK and all views beginning
tua

with the name CKing.

You later made use of the Policy-Based Management for creating and testing a policy on
Ac

CERTKILLER-DB01. After testing the policy you decided to have the policy applied to
CERTKILLER-DB01 and new servers CERTKILLER-DB02, CERTKILLER-DB03 and
CERTKILLER-DB04. CertKiller.com wants you to ensure that the naming convention policy from
CERTKILLER-DB01 applies to all the database servers by taking the action below:
You have set CERTKILLER-DB01 as the Central Management Server.You have added
CERTKILLER-DB02, CERTKILLER-DB03 and CERTKILLER-DB03 as part of the Central
Management Server group.

CertKiller.com additionally wants you to ensure that the policy applies to all SQL Servers.

What should you do?

A. You should consider having the policy exported from CERTKILLER-DB01 and use DFS to
replicate the policy file to every server in the group.

"Pass Any Exam. Any Time." - www.actualtests.com 182


Microsoft 70-450: Practice Exam
B. You should consider having the policy exported from CERTKILLER-DB01.
You should then have a GPO created that will apply all the naming convention policy to all the
servers in the group.
C. You should consider having the Back up the msdb database from CERTKILLER-DB01 backed
up and restore the database on all the other SQL servers.
D. You should consider having the Export the policy exported from CERTKILLER-DB01.
You should then select the exported policy and then evaluate the policy against all servers in the
group on the server group.

Answer: D

QUESTION NO: 190

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of

m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_SALES. CertKiller.com hires a new assistant administrator named Rory Allen to assist you.
You want to allow Rory Allen to be able to disable any Policy-Based Management policies that he
thinks should not be applied.
sts

What should you do?


lTe

A. You should consider having Rory Allen added to the db_owner role in the master database.
B. You should consider having Rory Allen added to the db_securityadmin role in the master
database.
tua

C. You should consider having Rory Allen added to the PolicyAdministratorRole in the msdb
database.
D. You should consider having Rory Allen added to the sysadmin role in the model database.
Ac

Answer: C

Explanation:
A member of the PolicyAdministratorRole role can create, enable, and disable Policy-Based
Management policies on the SQL server.
Incorrect Answers:
A: The db_owner role specifies the owner of the database. Making a user a member of the
db_owner role will not give a user the ability to add, create, enable, or disable Policy-Based
Management policies. The user needs to be a member of the PolicyAdministratorRole to perform
this function.
B: Members of the db_securityadmin role can modify database role memberships and manage
permissions. This role does not give a user the ability to add, create, enable, or disable Policy-
Based Management policies.
D: Members of the sysadmin role have full access to all system and user databases. This role is a
"Pass Any Exam. Any Time." - www.actualtests.com 183
Microsoft 70-450: Practice Exam
server role and not a database role. Also, there is not a sysadmin role in the model database. This
role is only on the server.

QUESTION NO: 191

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to have a
policy to prohibit the enabling of Database Mail on CERTKILLER-DB01.

What should you do? (Choose all that apply)

A. You should consider having a facet created that uses the Surface Area Configuration condition.

m
B. You should consider having the expression as @DatabaseMailEnabled=False set in the facet.
C. You should consider having a policy named DBMail created to include the RestrictDBmail facet.
.co
D. You should consider having the expression as @DatabaseMailEnabled=True set in the
condition.
E. You should consider having a policy named DBMail created to include the RestrictDBmail
sts
condition.
F. You should consider having a condition created that uses the Surface Area Configuration facet.
lTe

Answer: D,E,F

Explanation:
tua

You should create and configure the policy in this manner:


Create a condition that uses the Surface Area Configuration facet. In this scenario, the condition is
called RestrictDBmail . In the condition, set the expression as @ DatabaseMailEnabled =True.
Create a policy named DBMail to include the RestrictDBmail condition.
Ac

You should use the Surface Area Configuration facet to configure whether database mail is
enabled. You should specify the condition to use the Surface Area Configuration facet. In the
following example, the RestrictDBmail condition uses the Surface Area Configuration facet and
forces Database Mail to be disabled on a server.

Once the RestrictDBmail condition has been created, you can create a policy to use the condition.
The following screenshot shows a policy named DBMail using the condition of RestrictDBmail .
There is no server restriction set on the policy.
Incorrect Answers:
A: You should not create a facet that uses the Surface Area Configuration condition. You create
conditions from facets. You do not create a facet from a condition.
B: You should not set the expression as @DatabaseMailEnabled=False in the facet. In the

"Pass Any Exam. Any Time." - www.actualtests.com 184


Microsoft 70-450: Practice Exam
condition, you should pick the property of the facet and set the expression. You should not do this
in the facet. In this scenario, you should pick the DatabaseMailEnabled property of the Surface
Area Condition facet. You should set the expression as @DatabaseMailEnabled=False in the
condition.
C: You should not create a policy named DBMail to include the RestrictDBmail facet. Policies do
not include facets. Policies include conditions, and conditions are derived from facets.

QUESTION NO: 192

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_DATA. During the course of the day you receive instruction from CertKiller.com to create a
policy that will require all tables in the CK_DATA database to use the prefix CK_. The policy must

m
be implemented and should take effect immediately. You decide to complete the tasks listed
below:
.co
You have decided to create a condition called CK_Table which includes the facet of Multipart
Name with the expression of @Name like 'CK_'.You additionally decided to create a condition
called CK_DATA Database which includes the facet of Database with the expression of
sts

@Name='CK_DATA'.
lTe

You have created the policy named CK_DATA names which included both of the conditions.
CertKiller.com wants you to decide which execution mode should be set.
tua

What should you do?

A. You should consider making use of the Now execution mode.


B. You should consider making use of the On Change -Prevent execution mode.
Ac

C. You should consider making use of the On Demand execution mode.


D. You should consider making use of the On Schedule execution mode.

Answer: B

Explanation:
You can specify the execution mode of a policy as follows:
On Demand: When you choose this execution mode, the policy will be evaluated when the user
manually runs the policy. Except for this policy execution mode, all other policy execution modes
are automated.
On Schedule: Choosing this execution mode allows you to define a schedule when the policy will
be evaluated automatically. The automatic evaluation of the policy is carried out by a SQL Server
Agent job. This mode is an automated mode and logs any violations of the policy in the Windows
Event log.

"Pass Any Exam. Any Time." - www.actualtests.com 185


Microsoft 70-450: Practice Exam
On Change -Log Only: With this mode, the policy is evaluated only when a relevant change
occurs. This mode is also automated and logs any violations of the policy.
On Change -Prevent: With this mode, the policy is evaluated when a relevant change occurs in the
associated target entity. This mode also prevents policy violations by using DDL triggers. This
mode is also an automated mode.

In this scenario, the evaluation mode of On Change -Prevent will create a database trigger on the
CK_DATA database to prevent a table from being named anything that does not begin with 'CK_'.
Incorrect Answers:
A: You cannot specify the evaluation mode Now. This is not a valid evaluation mode.
C: The On Demand evaluation mode will result in an error stating "Exception of
type'Microsoft.SqlServer.Management.Dmf.ConflictingPropertyValuesException' was thrown.
Execution Mode 'On Demand' does not support Enabled 'True'".
D: The On Schedule evaluation mode requires that a schedule should be defined. In this scenario,
you wanted the policy to be applied immediately and not on a schedule. Part 4: Design a data

m
compression (6 Questions)

.co
QUESTION NO: 193
sts

You are the newly appointed database administrator at CertKiller.com. Your job function includes
administering a SQL Server 2008 instance.
lTe

You deploy a new database named CK_RESEARCH that will be used to administer large
documents. These documents will be revised from time to time. You receive an instruction from
tua

the CIO to implement a table structure that will enable fast read access. It is important that you
reduce the storage space requirement.

What should you do? (Choose all that apply.)


Ac

A. This can be accomplished by utilizing the resource-allocation policy for process-based


management.
B. This can be accomplished by utilizing the varbinary(MAX) data type with FILESTREAM storage.
C. This can be accomplished by utilizing the NTFS file system compression on the volume.
D. This can be accomplished by utilizing caching on the shared folder.

Answer: B,C

QUESTION NO: 194

CertKiller.com has employed you as a database administrator. Your duties at CertKiller.com are
the administrating a SQL Server 2008 infrastructure.

"Pass Any Exam. Any Time." - www.actualtests.com 186


Microsoft 70-450: Practice Exam

An instance on the infrastructure contains a database. The database in turn includes a table
named KINGDATA which has a column named CK_SALES. Microsoft Office Word 2003
documents is stored in CK_SALES. Management wants you to decrease the space taken by
CK_SALES. However, average performance is needed sot be kept when the CertKiller.com users
retrieve the data in the column.

What should you do?

A. This can be accomplished by using the vardecimal() data type.


B. This can be accomplished by ensuring that CK_SALES is stored using filestream storage.
Thereafter the NTFS file system compression should be used.
C. This can be accomplished by using folder redirection.
D. This can be accomplished using the Job Activity Monitor tool for KINGDATA.

m
Answer: B

QUESTION NO: 195


.co
sts
CertKiller.com has hired you as a database administrator for their network. Your duties include
administrating the SQL Server 2008 infrastructure. You are in the process of partitioning the
biggest table in a database.
lTe

You partition this table into four equal parts. During routine monitoring you discover that:The first
partition is hardly ever queried.The second partition is hardly ever queried.The third partition is
tua

often queried by several reports.The fourth partition is heavily queried and repeatedly modified

You have received instruction from the CIO to minimize the disk space of the table. You have to
Ac

make sure that this action does not have a great impact on the query performance.

What should you do? (Choose all that apply.)

A. Your best option would be to use the Database Engine Tuning Advisor tool.
B. Your best option would be to use the Windows System Monitoring tool.
C. Your best option would be to enable individual node.
D. Your best option would be for the first two partitions to enable PAGE compression.
E. Your best option would be for the third partition to enable ROW compression.

Answer: D,E

QUESTION NO: 196

"Pass Any Exam. Any Time." - www.actualtests.com 187


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a
new database named CK_PRODUCTS which will occasionally require having large documents
revised. CertKiller.com wants you to design a table structure allowing for fast read access whilst
minimizing the storage requirements.

What should you do? (Choose two)

A. You should consider making use of row-level compression on the document table.
B. You should consider making use of the varbinary(MAX) data type with FILESTREAM storage.
C. You should consider making use of row-level compression on all columns that use the
vardecimal() data type.
D. You should consider making use of the NTFS file system compression on the volume.

m
Answer: B,D
.co
QUESTION NO: 197
sts

You work as a database administrator at CertKiller.com. Your duties include administrating the
SQL Server 2008 infrastructure of the organization.
lTe

You are assigned a database server named CERTKILLER-DB06 with an instance that hosts a
database named CK_SALES. CK_SALES includes a table named Stock. At present DML
tua

statements on the last two months data is executed by the application queries. Administrative
audits on data older than two months are conducted on a monthly basis.
Ac

During routine monitoring you detect the subsequent performance errors on


CK_SALES:Performance of the application queries is poor against Stock.Maintenance tasks
against the database take a very long.Index defragmentation takes very long.

You receive an instruction from the CIO to ensure performance without affecting the performance
of CERTKILLER-DB06.

What should you do?

A. Your best option would be to use the sys.dm_exec_sessions dynamic management view.
Thereafter another table named StockHistory should be created for data older than two months.
B. Your best option would be to use the sys.dm_exec_requests dynamic management view
another table older than two months and shift the information.

"Pass Any Exam. Any Time." - www.actualtests.com 188


Microsoft 70-450: Practice Exam
C. Your best option would be to use the sys.dm_exec_query_stats dynamic management view to
shift the information older than two months to the StockHistory.
D. Your best option would be to create another table named StockHistory for information that is
older than two months.
You should also use the OrderDate column and partitioned Stock and StockHistory in two parts.
Thereafter a SQL Server Agent job should be created that runs monthly and uses the ALTER
TABLE...SWITCH Transact-SQL statement to shift the information older than two months to the
StockHistory.

Answer: D

QUESTION NO: 198

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of

m
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
.co
CK_SALES. During the course of the day you receive instruction from CertKiller.com to implement
either row compression or page compression depending which method yields the most free space
recovered.
sts

What should you do?


lTe

A. You should consider making use of the stored procedure:


sys.sp_estimate_data_compression_savings.
B. You should consider making use of the stored procedure:
tua

sys.sp_clean_db_free_space.
C. You should consider making use of the stored procedure:
sys.sp_autostats.
Ac

D. You should consider making use of the stored procedure:


sys.sp_clean_db_file_free_space.

Answer: A

Explanation:
This stored procedure can determine which level of compression will give you the most space
before actually implementing compression. You can also use the Data Compression Wizard in the
SQL Server Management studio.
Row compression does not take any disk space for zero or null values. It takes into account
variable data type structures in a row. Page compression looks at redundant data in one or many
rows on a given page. Page compression occurs when the page is full.
Incorrect Answers:
B: You should not use sys.sp_clean_db_free_space. This stored procedure removes residual
information left on database pages on a database when a data modification has been completed.
"Pass Any Exam. Any Time." - www.actualtests.com 189
Microsoft 70-450: Practice Exam
This stored procedure is similar to sys.sp_clean_db_file_free_space, but it removes residual
information left on database pages for the entire database, not just a particular database file.
C: You should not use sys.sp_autostats. This stored procedure displays or changes the UPDATE
STATISTICS setting for an index or all indexes on a table.
D: You should not use sys.sp_clean_db_file_free_space. This stored procedure removes residual
information left on database pages on a database file when a data modification has been
completed. Part 5: Design a management automation strategy (4 Questions)

QUESTION NO: 199

You work as a database administrator at CertKiller.com. Your duties include administrating a SQL
Server 2008 instance named CERTKILLER-DB01.

CERTKILLER-DB01 will be used to host the new database application. You are in the process of

m
implementing the security applications for the new database application. The CertKiller.com users
all have their own unique login to CERTKILLER-DB01. The database application will hold the
.co
stored procedures required to perform stored procedures in the MSDB database.

SQL Agent jobs will be scheduled by the stored procedures in the MSDB database. You have to
sts

make sure that the stored procedures is performed using the security context of the application
user.
lTe

What should you do?

A. This can be achieved by using the TRUSTWORTHY option on the new database.
tua

Thereafter the CertKiller.com users should be added to the MSDB database.


B. This can be achieved by configuring the resource database and add the users to the MSDB
database.
Ac

C. This can be achieved by setting the appropriate trace flags as a startup parameter in the MSDB
database.
D. This can be achieved by using varbinary(MAX) data type in the MSDB database.

Answer: A

QUESTION NO: 200

You work as a database administrator at CertKiller.com. Your duties at CertKiller.com include


administering a SQL Server 2880 instance.

You receive numerous complaints from CertKiller.com users regarding server's slow performance
after a process was implemented on the instance. You check whether there are any long running

"Pass Any Exam. Any Time." - www.actualtests.com 190


Microsoft 70-450: Practice Exam
queries. You do this using the Dynamic Management Views to confirm that no long queries are
running. You decide to compare the performance data of the OS with the query execution trace.
You need to do this with the least amount of administrative effort.

What should you do?

A. Your best option would be to make use of the Transaction Logs.


B. Your best option would be to make use of SQL Server Profiler as well as System Monitor.
C. Your best option would be to make use the VIEWDELETE log.
D. Your best option would be to make use of the ServerManagerCMD utility.

Answer: B

QUESTION NO: 201

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for managing a 32-bit
edition of SQL Server 2008
sts
You are in the process of executing a 32-bit package. To achieve this you make use of the
Execute Package Utility (dtexecui.exe). You need to use the same package on a 64-bit edition of
SQL Server 2008.
lTe

What should you do?


tua

A. You should consider using the dtexec utility or the SQL Server Agent in order to run the
package.
B. You should consider upgrading the package to 64-bit thereafter you can run it using the
Execute Package Utility.
Ac

C. You should consider using the SQL Server Agent in order to run the package.
D. You should consider using the Execute Package Utility in order to run the package.

Answer: A

Explanation:
To execute the package on a 64-bit version of SQL Server 2008, you can use either the dtexec
utility or the SQL Server Agent. The SQL Server Agent is available in 64-bit editions of SQL Server
2008, but you must install Integration Services to have a 64-bit version of the dtexec utility.
Incorrect Answers:
B: You do not have to upgrade the package to 64-bit and run it using the Execute Package Utility.
This utility can run packages only in 32-bit mode. On a 64-bit version of SQL Server 2008, you can
run the package using either the dtexec utility or the SQL Server Agent.
C: You do not have to run the package using the SQL Server Agent only. You can also use the

"Pass Any Exam. Any Time." - www.actualtests.com 191


Microsoft 70-450: Practice Exam
dtexec utility to run this package.
D: You cannot run this package in 64-bit mode using the Execute Package Utility (dtexecui.exe).
This utility can run packages only in 32-bit mode.

QUESTION NO: 202

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to have the
network user Rory Allen e-mailed when another user has created or deleted a view in the
CK_SALES database whilst ensuring the mechanism is processed in the local server and can be
rolled back.

m
What should you do?

.co
A. You should consider making use of Event Nitifications.
B. You should consider making use of sys.sp_cdc_enable_db stored procedure.
C. You should consider making use of DML triggers.
sts
D. You should consider making use of DDL triggers.

Answer: D
lTe

QUESTION NO: 203


tua

You are the newly appointed database administrator at CertKiller.com. CertKiller.com currently
makes use of Microsoft SQL Server 2008 for hosting databases. You are responsible for
Ac

administering a SQL Server 2008 instance.

A CertKiller.com employee named Rory Allen works as an application developer. Rory Allen
creates the SQL Server 2008 Integration Services (SSIS) packages on the test server residing in
the Test Lab. The SQL Server 2008 Integration Services (SSIS) packages are in a shared project.
However, you need to use a fixed cache file on one of the packages. The packages will be
deployed to the production server as soon as the development is completed. You need to make
sure that Rory Allen is able to install the project to the production server.

What should you do?

A. Your best option would be to use the Hyper-V feature on the server and install the project.
B. Your best option would be to use the Windows Deployment Services (WDS) for all packages.
C. Your best option would be to use the Microsoft Multipath I/O to save the packages.

"Pass Any Exam. Any Time." - www.actualtests.com 192


Microsoft 70-450: Practice Exam
D. Your best option would be to ensure that an installation utility is set up for the SSIS project.

Answer: D

QUESTION NO: 204

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to automate
the execution of an SQL Server Integration Services (SSIS) package by making use of SQL
Server Agent. CertKiller.com wants you to run the package in 32-bit mode.

What should you do? (Choose two)

m
A. You should consider making use of the 32-bit version of the dtexec utility on CERTKILLER-
DB01. .co
B. You should consider having the package converted to 64-bit.
C. You should consider making use of the 32-bit runtime on the Execution options tab of the New
sts
Job Setup dialog box.
D. You should consider making use of the 32-bit Execution Package Utility.
lTe

Answer: A,C

Explanation:
To meet the required goal in the scenario, you can select Use 32 bit runtime on the Execution
tua

options tab of the New Job Step dialog box. Without enabling this option, you will not be able to
run the 32-bit package on a 64-bit edition of SQL Server 2008.
You also can use 32-bit version of the dtexec utility installed on CERTKILLER-DB01. For 32-bit
Ac

packages, you will need to install it using Client Tools or Business Intelligence Development
Studio when you are setting up SQL Server.
Incorrect Answers:
B: You do not have to convert the package to a 64-bit version. On a 64-bit version of SQL Server
2008, you can simply run the package in 32-bit mode by selecting the Use 32 bit runtime option on
the Execution options tab of the New Job Step dialog box.
D: You cannot select the 32-bit Execute Package Utility because it is available only in the 32-bit
version of SQL Server 2008. This utility would not be available on CERTKILLER-DB01 because it
is running the SQL Server 2008 64-bit edition. You could use the 32-bit Execute Package Utility
from a SQL Server instance that is using the 32-bit edition of SQL Server 2008.

QUESTION NO: 205

"Pass Any Exam. Any Time." - www.actualtests.com 193


Microsoft 70-450: Practice Exam
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you receive instruction from CertKiller.com to deploy a
new SQL Server Integration Services (SSIS) package which should make use of an event handler
when the package fails to execute.

What should you do?

A. You should consider making use of the OnError event handler.


B. You should consider making use of the Onlnformation event handler.
C. You should consider making use of the OnPreExecute event handler.
D. You should consider making use of the OnTaskFailed event handler.

Answer: A

m
Explanation:
When you attempt to execute a package and an error occurs, the OnError event handler will be
.co
triggered. An event handler is comprised of tasks and containers that form a sequence of
execution. If a specific event handler is defined for an event, such as OnError event handler for
sts
failure of execution of a package, a series of tasks are performed. You can use the OnError event
handler for logging the error condition that caused the package execution to fail. You can execute
OnError to detail the problems related to the package execution.
lTe

Incorrect Answers:
B: The Onlnformation event handler is an incorrect option. This type of event handler is executed
in the validation and execution stages of the package. This event handler is meant only to report
tua

information regarding the validation and execution.


C: The OnPreExecute event handler is an incorrect option. This type of event handler is executed
before the package is executed.
Ac

D: The OnTaskFailed event handler is an incorrect option. This type of event handler is executed
when a task is failed. Part 2: Design a strategy to use linked servers (3 Questions)

QUESTION NO: 206

CertKiller.com has hired you as a database administrator for their network. Your duties include
administering the SQL Server 2008 infrastructure as well as two instances named CK_PRODUCT
and CK_FINANCE.

CK_PRODUCT contains the Exams database and CK_FINANCE the Sales database. A
procedure in the Exams database starts a transaction. CertKiller.com is using a linked server to
update Exams.dbo.Order table as well as the Sales.dbo.OrderHistory table. You receive an
instruction from the CIO to make sure that a two-phase commit in used in the transaction.

"Pass Any Exam. Any Time." - www.actualtests.com 194


Microsoft 70-450: Practice Exam

What should you do?

A. This can be achieved by using the Windows System Resource Manager (WSRM) for
delegation.
B. This can be achieved by having a linked server configured in order to make use of distributed
transactions.
C. This can be achieved by using the VPN solution.
D. This can be achieved by using the Delegation of Control Wizard to enable the correct
transaction control.

Answer: B

QUESTION NO: 207

m
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
.co
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day you issue a begin distributed transaction statement on
sts
CERTKILLER-DB01. The session which is initiated connects with stored procedures located on
CERTKILLER-DB02 and CERTKILLER-DB03. CertKiller.com is aware that the stored procedure
on CERTKILLER-DB02 triggers a distributed query for CERTKILLER-DB04 and the stored
lTe

procedure on CERTKILLER-SR03 triggers a distributed query on CERTKILLER-DB05.

CertKiller.com wants to know which server is acting as the transaction originator in this scenario?
tua

A. CERTKILLER-DB04
B. CERTKILLER-DB03
C. CERTKILLER-DB05
Ac

D. CERTKILLER-DB02
E. CERTKILLER-DB01

Answer: E

Explanation:
In a distributed transaction scenario, any server that executes the query containing the begin
distributed transaction statement will be the transaction originator. The server issuing the begin
distributed transaction statement is always in command of the entire transaction. Upon the
completion of the transaction, which can be either a commit transaction or a rollback transaction,
the transaction originator uses Microsoft Distributed Transaction Coordinator (MS DTC) to
complete the transaction on all the servers that are involved in the transaction. A series of steps
are performed in the distributed transaction process. These steps are as follows:
In the initial stage, a Transact-SQL script or an application connect uses a statement, which is a

"Pass Any Exam. Any Time." - www.actualtests.com 195


Microsoft 70-450: Practice Exam
Transact-SQL statement, to initiate a distributed transaction.
The SQL Server Database Engine that executes the statement becomes the controlling server or
the transaction originator. This is the second step of the distributed transaction. In this step, the
server that is executing the statements is considered the controlling server in the distributed
transaction.
The distributed query is executed against linked server. This is the third step, in which either
distributed queries or the remote stored procedures are executed. Distributed queries are
executed against the linked servers and remote procedures are executed against the remote
servers.
The controlling server calls MS DTC. Depending on distributed queries and remote procedures
execution, MS DTC is called by the controlling server. In this step, the remote and linked servers
are listed.
The controlling instance uses MS DTC to perform a two-phase commit. In this step, a commit or
rollback statement is issued using the script. MS DTC is used to complete the two-phase commit
process or rollback transactions.

m
QUESTION NO: 208 CORRECT TEXT
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
sts

Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
lTe

CK_SALES. During the course of the day you receive instruction from CertKiller.com to setup
multiple linked SQL Servers. CertKiller.com additionally requested that you initiate distributed
transactions making use of the linked servers.
tua

What should you do? (Click and drag the required steps from the left column in the correct order
on the column to the left)
Ac

"Pass Any Exam. Any Time." - www.actualtests.com 196


Microsoft 70-450: Practice Exam
Answer:

QUESTION NO: 209

CertKiller.com has employed you as a database administrator. You are responsible for
administering a SQL Server 2008 database server named CERTKILLER-DB01.

CERTKILLER-DB01 is in a peer-to-peer transactional replication topology with three other servers.


The publication contains a table named CK_SALES. In turn CK_SALES encompasses of 200 GB
of information across several partitions. From time to time a batch process bulk loads 10 GB of
information to CK_SALES. You receive an instruction from the CIO to implement a replication
strategy in order to reduce latency.

What should you do?

m
A. This can be accomplished by using the BULK INSERT command in multiple staging tables.
.co
Thereafter the partitions should be changed into CK_SALES.
B. This can be accomplished by create an ADMX file that should be used in CK_SALES and the
publication reinitialized.
sts
C. This can be accomplished by configuring the File Server Resource Manager (FSRM).
D. This can be accomplished by configuring the resource-allocation policy for process-based
management.
lTe

Answer: A
tua

QUESTION NO: 210


Ac

You work as a database administrator at CertKiller.com. CertKiller.com has its headquarters in


London and branch offices in Paris and Athens. You are responsible for administering the SQL
Server 2008 infrastructure. You are located at the London office and are assigned a SQL Server
2008 instance named CK_MARKETING.

The Tele-marketing team makes use of notebook computers to update customer orders in a local
database. You need to make sure that the local database is able to synchronize with
CK_MARKETING when the notebook computers connect to the London office. You decide to set
up the creation of a replication model that will be used to copy the local database to
CK_MARKETING.

You need to make sure that the replication model has the following criteria:The Tele-marketing
team must be able to synchronize data at scheduled times as well as on demand.The Tele-
marketing team must not be able to update confidential information.The model must be able to

"Pass Any Exam. Any Time." - www.actualtests.com 197


Microsoft 70-450: Practice Exam
handle data conflicts when quite a few users update the same data.

You thus need to use the best type to replicate the information. This needs to be accomplished
with the least amount of development efforts.

What should you do?

A. You should consider using the LUN Management settings with the SSIS packages.
B. You should consider setting up the notebook computers as a subscriber and use merge
replication.
C. You should consider setting up caching on the shared folder.
D. You should consider using folder redirection with the notebook computers.

Answer: B

m
QUESTION NO: 211
.co
You work as a database administrator at CertKiller.com. You are responsible for administering
multiple SQL Server 2008 servers that hosts a multiple databases. These databases contain the
sts
networks critical information.

You receive the subsequent instructions from the CIO to:Configure replication whereby you are
lTe

able to send different updates to different subscribers at different locations.Replicate a certain set
of information to one subscriber as well as another set to another subscriber.Ensure that
subscribers are able to work offline and later synchronize the modifications with the publisher.
tua

You thus need to determine the appropriate replication type that will meet the requirements.
Ac

What should you do?

A. You should consider using Transactional replication.


B. You should consider using Snapshot replication.
C. You should consider using Peer-to-peer replication.
D. You should consider using Merge replication.

Answer: D

Explanation:
In this scenario, merge replication would be able to meet the required goal. You use merge
replication typically when you need to meet the following requirements:
Allow subscribers to modify information in an offline state and then replicate it back to the
publisher. A subscriber can also replicate information to other subscribers.
Provide data filtering. In data filtering, you can filter different updates to different subscribers at

"Pass Any Exam. Any Time." - www.actualtests.com 198


Microsoft 70-450: Practice Exam
different locations.
Allow information to be replicated to users who are mobile and are not always connected to the
SQL Server.
Provide the ability to resolve conflicts that occur during replication.
Incorrect Answers:
A: You should not use transactional replication. You would typically use this type of replication to
propagate incremental changes to from one server to another server immediately. As soon as a
change occurs in a database, the data is replicated immediately to its partners. For instance, if
there is a row value that changes multiple times, every change will be replicated to its partner. In
this type of replication, there are typically fewer subscribers keeping the read-only copy of
replicated data. This type of replication does not have the ability to allow subscribers to work
offline and then replicate changes when they are back online. This replication also does not have
the flexibility to filter data during replication.
B: You should not use snapshot replication. This type of replication is used when you need to
replicate a large volume of information. This type of replication does not have the ability to allow

m
subscribers to work offline and then replicate changes when they are back online. This replication
also does not have the flexibility to filter data during replication.
.co
C: You should not use peer-to-peer replication. This type of replication is typically used when you
need high availability and scalability. This type of replication does not have the ability to allow
sts
subscribers to work offline and then replicate changes when they are back online. This replication
also does not have the flexibility to filter data during replication.
lTe

QUESTION NO: 212


tua

CertKiller.com has hired you as a database administrator for their network. CertKiller.com has its
headquarters in Paris and branch offices in London, Berlin and Milan. All the servers in the
environment are configured to run Microsoft SQL Server 2008.
Ac

You have received instruction from the CIO to configure data replication. You need to make sure
that the data replication offers the network high availability and scalability with the minimum of
latency. You should thus determine the type of transactional replication that will accomplish this.

What should you do?

A. You should make use of Peer-to-peer transactional replication.


B. You should make use of Standard transactional publication transactional replication.
C. You should make use of Merge transactional replication.
D. You should make use of Snapshot transactional replication.

Answer: A

"Pass Any Exam. Any Time." - www.actualtests.com 199


Microsoft 70-450: Practice Exam
Explanation:
This type of replication is based on transaction publication, and typically is used when you need
high availability and scalability. Peer-to-peer replication provides redundancy because data is
maintained across multiple nodes. Queries and other reads from Web applications can be spread
across the multiple nodes. If a node failure occurs, the request is redirected by the application
layer to another node. Peer- topeer replication does not have the ability to resolve conflicts during
replication updates, but it can detect replication conflicts. You typically require minimal latency for
peer-to-peer replication.
Incorrect Answers:
B: You should not use standard transactional publication. In this type of replication, fewer
Subscribers keep the read-only copy of the replicated data. This type of replication is not used for
high availability and scalability, as the Subscribers keep read-only data. Therefore, you should not
use this replication in this scenario.
C: You should not use merge replication in this scenario. Merge replication is not a type of
transactional replication. Merge replication has the ability to resolve conflicts that may occur during

m
the replication. You use merge replication typically when you need information to be replicated to
users who are mobile and are not always connected to the SQL Server. You can also use this
.co
replication when there is a requirement of data filtering. In data filtering, you can filter different
updates to different Subscribers at different locations. In merge replication, data is replicated more
sts
frequently to the Subscriber and therefore requires high latency. Therefore, in this scenario, this
type of replication will not be useful.
D: You should not use snapshot replication. Snapshot replication is not a type of transactional
lTe

replication. This type of replication is used when you need to replicate large volume of information.
This type of replication will not be useful in this scenario because you need high availability and
scalability with minimal latency. Snapshot replication is very infrequent, which will not provide high
tua

availability and scalability because the changes are replicated rarely, and the replicated data may
be outdated. Therefore, this replication will not be suitable in this scenario.
Ac

QUESTION NO: 213

You work as a database administrator at CertKiller.com. You are responsible for administering
numerous Microsoft SQL Server 2008 servers that hosts multiple databases.

The databases hold the companies critical information. You have received instruction from the CIO
to configure a replication solution for these servers in order to replicate database information to
each other. The replication solution should be configured so that the slightest change will trigger
instant replication to the replicated copy.

What should you do? Which replication strategy should you use in this situation?

A. You should consider using Peer-to-Peer Replication.

"Pass Any Exam. Any Time." - www.actualtests.com 200


Microsoft 70-450: Practice Exam
B. You should consider using Merge Replication.
C. You should consider using Snapshot Replication.
D. You should consider using Transactional Replication.

Answer: D

Explanation:
You would typically use this type of replication when you need to propagate incremental changes
to from one server to another server immediately. As soon as a change occurs in a database, the
data is replicated to its partners. For instance, if there is a row value that changes multiple times,
every change will be replicated to its partner. In this type of replication, there are typically fewer
subscribers keeping the read-only copy of replicated data. This type of replication does not have
the ability to resolve conflicts during replication updates.
Incorrect Answers:
A: You should not use peer-to-peer replication. This type of replication is typically used when you

m
need high availability and scalability. This type of replication does not have the ability to replicate
all updates to its partners.
.co
B: You should not use merge replication. In this type of replication, only the last updated value will
be replicated to the partners. In merge replication, subscribers make changes to the data and later
synchronize the changes with the publisher. For instance, if there are ten value changes to a field
sts
in a row at the subscriber before synchronizing with the publisher, only the tenth value will be
replicated, not all ten values. Merge replication has the ability to resolve conflicts that may occur
during the replication. You use merge replication typically when you need information to be
lTe

replicated to users who are mobile and are not always connected to the SQL Server. You should
also use this replication when you need the ability to resolve conflicts that occur during replication.
C: You should not use snapshot replication. This type of replication is used when you need to
tua

replicate a large volume of information. This type of replication does not have the ability to
replicate all updates to its partners.
Ac

QUESTION NO: 214

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. During the course of the day CertKiller.com implemented an additional server named
CERTKILLER-DB02 in a peer-to-peer transactional replication topology. CertKiller.com
additionally wants you to add a new node to the peer-to-peer transactional replication whilst
ensuring all relevant transactions are replicated to the new node.

What should you do?

"Pass Any Exam. Any Time." - www.actualtests.com 201


Microsoft 70-450: Practice Exam
A. You should consider configuring the value below for the @sync_type parameter of the
sp_addsubscription stored procedure:
automatic.
B. You should consider configuring the value below for the @sync_type parameter of the
sp_addsubscription stored procedure:
replication support only.
C. You should consider configuring the value below for the @sync_type parameter of the
sp_addsubscription stored procedure:
initialize with backup.
D. You should consider configuring the value below for the @sync_type parameter of the
sp_addsubscription stored procedure:
initialize from Isn.

Answer: D

m
QUESTION NO: 215
.co
You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of
Microsoft SQL Server 2008 for hosting databases. You are responsible for administering multiple
sts
database servers hosting multiple databases containing company sensitive data. During the
course of the day you receive instruction from CertKiller.com to configure a replication solution for
the databases to replicate with each other. CertKiller.com wants to have the information replicated
lTe

so the smallest change will trigger immediate replication to the replicated copy.

What should you do?


tua

A. You should consider making use of merge replication.


B. You should consider making use of transactional replication.
Ac

C. You should consider making use of peer-to-peer replication.


D. You should consider making use of snapshot replication.

Answer: D

QUESTION NO: 216

You work as a database administrator at CertKiller.com. CertKiller.com currently makes use of


Microsoft SQL Server 2008 for hosting databases. You are responsible for administering a
database server named CERTKILLER-DB01 with an instance that hosts a database named
CK_SALES. CertKiller.com recently deployed an additional three servers to the network named
CERTKILLER-DB02, CERTKILLER-DB03 and CERTKILLER-DB04. CertKiller.com wants you to
configure peer-to-peer replication between the servers whilst having conflict detection enabled on
the servers.
"Pass Any Exam. Any Time." - www.actualtests.com 202
Microsoft 70-450: Practice Exam

What should you do?

A. You should make use of the sp_help_peerconflictdetection stored procedure.


B. You should make use of the sp_addpublication stored procedure.
C. You should make use of the sp_addsubscriber stored procedure.
D. You should make use of the sp_configure_peerconflictdetection stored procedure.

Answer: B,D

Explanation:
Peer-to-peer transactional replication allows you insert, update, or delete data at any node in a
topology and have data changes propagated to the other nodes. Because you can change data at
any node, data changes at different nodes could conflict with each other. In SQL Server 2008,
peer-to-peer replication introduces the option to enable conflict detection across a peer-to-peer
topology. This option helps you prevent the issues that are caused by undetected conflicts. When

m
you enable conflict detection, a conflicting change is considered a critical error that causes the
Distribution Agent to fail. In the event of a conflict, the topology remains in an inconsistent state
.co
until the conflict is resolved and the data is made consistent across the topology. To use conflict
detection, all nodes must be running SQL Server 2008 or a later version, and detection must be
sts
enabled for all nodes. You can enable and disable detection in Management Studio either by using
the Subscription Options page of the Publication Properties dialog box or the Configure Topology
page of the Configure Peer-to-Peer Topology Wizard. You can also enable and disable conflict
lTe

detection by using the sp_addpublication or sp_configure_peerconflictdetection stored procedures.


tua

Incorrect Answer:
A: The sp_help_peerconflictdetection stored procedure returns information about the conflict
detection settings for a publication that is involved in a peer-to-peer transactional replication
Ac

topology.
C: You cannot use the sp_addsubscriber stored procedure or the sp_help_peerconflictdetection
stored procedure because these stored procedures cannot be used to enable conflict detection.
The sp_addsubscriber stored procedure is used to add a new subscriber to a publisher, enabling it
to receive publications.

"Pass Any Exam. Any Time." - www.actualtests.com 203

S-ar putea să vă placă și