Chinaunix首页 | 论坛 | 博客
  • 博客访问: 289101
  • 博文数量: 469
  • 博客积分: 2510
  • 博客等级: 少校
  • 技术积分: 5200
  • 用 户 组: 普通用户
  • 注册时间: 2008-06-03 16:15
文章分类

全部博文(469)

文章存档

2011年(82)

2010年(284)

2009年(69)

2008年(34)

我的朋友

分类:

2010-09-24 09:12:58

考试代号:

认证名称:Microsoft SQL Server 2005 Implementation and Maintenance

版本号:V8.02

考题数量:85

更新日期:2010-8-14

1. You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?

(Each correct answer presents a complete solution. Choose two.)

A. Named Pipes

B. TCP/IP

C. Shared Memory

D. Virtual Interface Adapter (VIA)

E. Multiprotocol

Answer: AB

2. Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?

A. Default

B. SAFE

C. EXTERNAL_ACCESS

D. UNSAFE

Answer: C

3. Your company has two SQL Server 2005 computers named SQL1 and SQL2. A user in your company named Eric writes many ad hoc queries against the company databases. Eric has access to the Customer database on SQL1. He does not have access to the Sales database on SQL2. You need to ensure that Eric can write queries that join information from both servers. What should you do first?

A. Create a linked server on SQL1 to SQL2. Configure the linked server to use impersonation.

B. Create a linked server on SQL1 to SQL2. Configure the linked server to use mapped logins.

C. Instruct Eric to write the queries on SQL2 by using the OPENQUERY statement and specifying SQL1 as the server name.

D. Instruct Eric to specify SQL Server object names by using four-part notation.

Answer: B

4. You configure a new SQL Server 2005 computer to use TCP/IP with all default settings. Your corporate policy requires that each server use a firewall. You find that you can connect to the SQL Server instance from the local computer. However, client computers cannot connect to the SQL Server instance. You need to identify the most likely cause of the connection issues. What should you do first?

A. Ensure that port 1433 is open in your firewall.

B. Ensure that port 443 is open in your firewall.

C. Ensure that client computers connect by using Shared Memory protocol.

D. Ensure that the server is not paused.

Answer: A

5. You are moving a SQL Server 2005 database named Timesheet to a new database server. The Timesheet database is used by the TimeEntry application. You need to minimize the amount of time that the TimeEntry application is unavailable while you move the database. What should you do?

A. Move the database to the new server by using the SQL Management Object method in the Copy Database Wizard.

B. Detach the current database. Copy the data files to the new server. Attach the files.

C. Back up the database. Copy the backup file to the new server. Restore the database.

D. Move the data files. Specify the new location by using ALTER DATABASE.

Answer: B

6. A support engineer reports that inserting new sales transactions in a SQL Server 2005 database results in an error. You investigate the error. You discover that in one of the databases, a developer has accidentally deleted some data in a table that is critical for transaction processing. The database uses the full recovery model. You need to restore the table. You need to achieve this goal without affecting the availability of other data in the database. What should you do?

A. Back up the current transaction log. Restore the database with a different name and stop at the point

just before the data loss. Copy the table back into the original database.

B. Back up the current transaction log. Restore the database to the point just before the data loss.

C. Restore the database from the existing backup files to a time just before the data loss.

D. Restore the database to the point of the last full backup.

Answer: A

 如需下载更多的题库,可登陆

 

阅读(159) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~