找考题网-背景图
单项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international 
corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 instances at five sites are managed by you.A mission-critical database is shared by the five sites. According to the business requirements, the users at each site should be enabled to access and change data on all sites with minimal latency.In addition, data loss should be minimized if a server fails. A high-availability solution should be designed, and the business requirements should be satisfied.   
Which action should be included in your solution?()

A.Failover clustering should be included. 
B.Asynchronous database mirroring without a witness server should be included.
C.Peer-to-Peer replication should be included. 
D.Log shipping to servers at two of the sites to offer read-only replications of data should be included.

热门试题

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international  corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application, and the application will be deployed to the instance. A table is consisted by the new database, and the table is created by utilizing the following code segment:  Since you are the technical support, you should utilize the maximum secure method to protect the BonusPlan column from the access of unauthorized users.   Which action will you perform to finish the task?()

A.To finish the task, Transparent data encryption should be utilized. 
B.To finish the task, the NTFS file system security should be utilized and the access of the database files should be limited to the SQL Server 2008 Service account. 
C.To finish the task, the Trustworthy option for the database should be utilized. 
D.To finish the task, the Advanced Encryption Standard encryption should be utilized on all columns in the database.

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.    Which action will you perform?()

A.The SAFE code access security should be utilized for the assembly.
B.All public static fields should be replaced with public fields.
C.All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
D.All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A maintenance strategy should be designed for a mission-critical database, and a large table named Orders is contained by the database. Index maintenance operations are contained in the design plan. When you design the strategy, the facts listed below should be taken into consideration. First, the users continuously access to the Orders table in the database. Secondly, a column of the xml data type is contained by Orders table.  Thirdly, the new rows are regularly added to the Orders table. Fourthly, the average fragmentation for the clustered index of the Orders table is no more than 2 percent.    A strategy should be designed to have the performance of the queries on the table optimized.    Which action will you perform?()

A.The clustered index of the Orders table should be dropped.
B.The clustered index of the Orders table offline should be rebuilt once a month.
C.The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.
D.The clustered index of the Orders table should be reorganized by reducing the fill factor.

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log.  Which action should you perform to finish the task?()

A.To finish the task, hourly database snapshots should be utilized. 
B.To finish the task, the full-recovery model along with transaction log backups should be utilized.
C.To finish the task, the full-recovery model along with differential backups should be utilized.
D.To finish the task, the simple-recovery model along with differential backups should be utilized.