找考题网-背景图
多项选择题

A.To finish the task, Log shipping should be utilized. ……

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 servers on a single site are managed by you. Two SQL Server 2008 instances are contained by the site. One is an Enterprise Edition server, and it is on a server that has a redundant array of ndependent disks (RAID) 10 disk system. The other is a Standard Edition server, and it is on a server that has a RAID 5 disk system. A single application is hosted by each instance. A high-availability solution should be recommended for the site to satisfy the business requirements listed below. First, the solution can be implemented on the current systems. Secondly, the database is available with least downtime. Thirdly, Data loss should be cut to the least. Fourthly, the existing system should be with least impact.   
Which solutions should be utilized to finish the task?()



A.To finish the task, Log shipping should be utilized. 
B.To finish the task, Failover clustering should be utilized.
C.To finish the task, Replication should be utilized. 
D.To finish the task, Database snapshot should be utilized.

热门试题

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A new database should be deployed, and the capacity requirements listed below should be satisfied. There should be 275 GB for the database data file, while there should be 50 GB for the transaction log file. There are six 100-GB disk drives which are accessible for the database in the storage array. The six disks are attached to a redundant array of independent disks (RAID) controller, and the controller supports RAID levels 0, 1, 5, and 10. Since you are the technical support, you are required to maximize the write performance of the transaction log. In addition, you should protect the database and transaction log files, when a drive fails. The storage system should be designed.   From the following four storage configuration, which one should you utilize?()

A.A single RAID 5 volume should be utilized. 
B.A RAID 1 volume and a RAID 5 volume should be utilized.
C.A single RAID 10 volume should be utilized. 
D.A RAID 0 volume and a RAID 5 volume should be utilized.

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international  corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application, and the application will be deployed to the instance. A table is consisted by the new database, and the table is created by utilizing the following code segment:  Since you are the technical support, you should utilize the maximum secure method to protect the BonusPlan column from the access of unauthorized users.   Which action will you perform to finish the task?()

A.To finish the task, Transparent data encryption should be utilized. 
B.To finish the task, the NTFS file system security should be utilized and the access of the database files should be limited to the SQL Server 2008 Service account. 
C.To finish the task, the Trustworthy option for the database should be utilized. 
D.To finish the task, the Advanced Encryption Standard encryption should be utilized on all columns in the database.

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.    Which action will you perform?()

A.The SAFE code access security should be utilized for the assembly.
B.All public static fields should be replaced with public fields.
C.All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
D.All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.