A: You should implement the Snapshot Replication topology along with a Push Subscription.
B: You should implement the Merge Replication topology along with a Pull Subscription.
C: You should implement the Snapshot Replication topology along with a Pull Subscription.
D: You should implement the Transactional Replication topology along with a Pull Subscription
举一反三
- You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?() A: affinity mask B: affinity I/O mask C: max degree of parallelism D: optimize for ad hoc workload
- You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?() A: affinity mask B: affinity I/O mask C: max degree of parallelism D: optimize for ad hoc workloads
- You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDSserver. You have to start the computer and install the image that is stored on the WDS server. What shouldyou create?() A: You should create a discover image B: You should create an install image C: You should create a capture image D: You should create a CD-ROM that contains PXE drivers
- You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure thatyou minimize the usage of memory space and processor time. Which encryption type should you use?() A: Symmetric key encryption B: Asymmetric key encryption C: Certificate-based encryption D: Transparent data encryption
- You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?() A: DBCC DBREINDEX B: SELECT * FROM sys.dm_db_index_physical_stats C: DBCC INDEXDEFRAG D: SELECT * FROM sys.indexe
内容
- 0
You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?() A: DBCC DBREINDEX B: SELECT * FROM sys.dm_db_index_physical_stats C: DBCC INDEXDEFRAG D: SELECT * FROM sys.indexes
- 1
You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?() A: Distributed File System (DFS) Replication B: File Server Resource Manager (FSRM) active file screens C: shadow copies D: Windows Storage Server 2008
- 2
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have the Web Server (IIS) server role installed on a new server that runsWindows Server 2008. You perform the installation of a Microsoft .NET Framework application on a Web site on the Web server.The application launches a process that presents a real-time graphical report to the Web browser andcreates a text report file on the hard disk drive. According to the requirement of the company securitypolicy, the application must not write to the event log, access Open Database Connectivity (ODBC) datasources or make network or Web service calls. The Web site needs to be configured so that the application can be executed. You must make sure that theapplication meets the outlined security requirements. So what action should you perform to make sure ofthis?() A: In order to make sure of this, the .NET Framework trust level should be set to Medium for the Web site. B: In order to make sure of this, the .NET Framework trust level should be set to Full for the Web site. C: In order to make sure of this, the .NET Framework trust level should be set to Low for the Web site. D: In order to make sure of this, the .NET Framework trust level should be set to High for the Web site.
- 3
You need to recommend a solution for the Web server content that meets the company’s technicalrequirements. What should you include in the recommendation?() A: Distributed File System (DFS) Replication B: folder redirection C: HTTP redirection D: IIS Shared Configuration
- 4
You have a Windows Server 2008 R2 Hyper-V server. You need to ensure that you are prompted to specify a custom snapshot name when you create a snapshot. What should you use to create the snapshot?() A: Hyper-V Manager B: Windows Server Backup C: the Virtual Machine Connection window D: the Backup command-line tool (also known as wbadmin.exe)