一起答

微软认证70-228模拟试卷4

  • 卷面总分:0分
  • 浏览次数:0
  • 测试费用:免费
  • 答案解析:是
  • 练习次数:16次
  • 作答时间:30分钟
试卷简介

  • 1.单选题
  • 2.多选题
部分试题预览
  1. You are the administrator of several SQL Server 2000 computers. You configure these servers to send e-mail messages to SQL Server operators whenever a SQL server agent job fails or encounters an error.

    Your company's software developers create a set of stored procedures that send query results in email messages about stored procedures that have not been successful.

    By using a MAPI profile named MS Exchange Settings, you verify that SQLAgentMail is correctly configured and working properly. You need to configure the servers so that the stored procedures function correctly. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)

    A. Set the security permissions on your e-mail server to permit multiple connections to the SQL Server mailbox.

    B. Set the security permissions on your e-mail server to permit connections from the MSSQLServer service account.

    C. Configure the MSSQLServer service to use the same service account as the SQLServerAgent service.

    D. Configure the SQLServerAgent service to use the same service account as the MSSQLServer service.

    E. Configure SQL Mail to use the MS Exchange Settings MAPI profile.

    F. Configure SQL Mail to use the Default Settings MAPI profile.

  2. You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.

    You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.

    Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.

    You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)

    • A.Configure the IIS virtual directory to allow URL queries.
    • B.Configure the IIS virtual directory to allow template queries.
    • C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.
    • D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.
    • E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.
  3. You are the administrator of a SQL Server 2000 database. You import a table of geographic information from a Microsoft access database into a SQL Server 2000 database. The table has 12,000 rows. Each row averages 5,000 bytes. The table contains lockup data that does not change.

    You want to minimize the size of the data file and the time required to back up the data. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)

    A. Create a 60-MB data file named geography.ndf

    B. Create a 95-MB data file named geography.ndf

    C. Create a 60-MB data file named geography.mdf

    D. Create a 95-MB data file named geography.mdf

    E. Place the table in the PRIMARY filegroup.

    F. Place the table in a new filegroup named LOCATION.

  4. You are the administrator of a SQL Server 2000 computer. The server contains a database named Sales. The database will store sales transactions. Retail locations must be able to add transactions to the database 24 hours a day every day. The server is configured as shown in the exhibit.

    You need to configure the data files and transaction log for the Sales database. What should you do?

    • A.Place the transaction log on physical disk 0 and the data file on the RAID-5 disk array.
    • B.Place the transaction log on the RAID-5 disk array and the data file on physical disk 0.
    • C.Place the transaction log and the data file on physical disk 0.
    • D.Place the transaction log and the data file on the RAID-5 disk array.
  5. You are the administrator of a SQL Server 2000 computer. You are creating a data transformation services package. As the first step in this process, you need to load data from text files into a database table. These text files contain data on new stores that join your franchise. The text files list the data columns in the following format StoreID, StoreName, Address, City, State, PostalCode, ManagerID, StoreTypeID, FacilityID.

    The destination table is configured as shown in the exhibit.

    You want to load the data into the table as quickly as possible. What should you do?

    • A.Use a Bulk Insert Task to read the data into a temporary table. Use an Execute SQL task to import the appropriate data into the destination table.
    • B.Create and edit a format file to select the columns you want to import. Use a Bulk Insert Task, and then specify the format file to import the appropriate data into the destination table.
    • C.Use a transform. data task to import the data. Use Microsoft ActiveX transformation scripts to write the appropriate data to the appropriate columns in the destination table.
    • D.Create and edit a format file to select the columns you want to import. Use a transform. data task, and then specify the format file to import the appropriate data into the destination table.
  6. You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.

    Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.

    What should you do?

    • A.Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.
    • B.Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.
    • C.Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.
    • D.Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.
  7. You are the administrator of a SQL Server 2000 computer. The server contains a database named MedicalRecords. You have recently added a hard disk to the server and configured the database.

    The data files are configured as shown in the Database Properties exhibit.

    The database is configured as shown in the Database Schema exhibit.

    Each primary key is clustered. All foreign keys contain nonclustered indexes. You want to use the space on the new hard disk to make the database respond more quickly to queries.

    What should you do?

    • A.Re-create the Notes table on the SECONDARY filegroup.
    • B.Re-create the nonclustered indexes on the SECONDARY filegroup.
    • C.Re-create the Patients and Doctors tables and their indexes on the SECONDARY filegroup.
    • D.Re-create the Cases and Notes tables and their indexes on the SECONDARY filegroup.
  8. You are the administrator of a SQL Server 2000 computer. The server contains a database named inventory. The database has a Parts table that has a field named InStock. When parts are shipped, a table named PartsShipped is updated. When Parts are received, a table names PartsReceived is updated. The relationship of these tables is shown in the exhibit.

    You want the database to update the InStock field automatically. What should you do?

    • A.Add triggers to the PartsShipped and the PartsReceived tables that update the InStock field in the Parts table.
    • B.Create a user-defined function those calculations that calculates current inventory by running aggregate queries on the PartsShipped and PartsReceived tables.
    • C.Use a view that creates an InStock as a part of an aggregate query.
    • D.Create stored procedures for modifying the PartsReceived and the PartsShipped tables that also modify the InStock fielding the parts table. Use these procedures exclusively when modifying data in the PartsReceived and the PartsShipped tables.
  9. You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.

    You want to minimize changes to your security model and to your database applications. How should you modify the database?

    • A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.
    • B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.
    • C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.
    • D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.