• 2022-05-31
    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which is named Instance01. Instance01 contains a database which is named SellingHelp. There isthe Products table in the SellingHelp database. Now according to the company requirement, the Products table has to be replicated to the SQL Server instances installed in laptopscomputers. You have to create a Replication topology to perform this. The Products table is updated from Instance01 when the laptops reconnect to the corporate network. The Products table on Instance01 is frequently updated between reconnections. You must make sure that you can implement the Replication topology along with the Subscription type successfully and meanwhile reduce the bandwidth usage to the least.  So what action should you perform to achieve this goal?()
    A: You should implement the Snapshot Replication topology along with a Push Subscription. 
    B: You should implement the Merge Replication topology along with a Pull Subscription. 
    C: You should implement the Snapshot Replication topology along with a Pull Subscription. 
    D: You should implement the Transactional Replication topology along with a Pull Subscription
  • B

    举一反三

    内容

    • 0

      You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?() A: DBCC DBREINDEX B: SELECT * FROM sys.dm_db_index_physical_stats C: DBCC INDEXDEFRAG D: SELECT * FROM sys.indexes

    • 1

      You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?() A: Distributed File System (DFS) Replication B: File Server Resource Manager (FSRM) active file screens C: shadow copies D: Windows Storage Server 2008

    • 2

      You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You have the Web Server (IIS) server role installed on a new server that runsWindows Server 2008. You perform the installation of a Microsoft .NET Framework application on a Web site on the Web server.The application launches a process that presents a real-time graphical report to the Web browser andcreates a text report file on the hard disk drive. According to the requirement of the company securitypolicy, the application must not write to the event log, access Open Database Connectivity (ODBC) datasources or make network or Web service calls. The Web site needs to be configured so that the application can be executed. You must make sure that theapplication meets the outlined security requirements. So what action should you perform to make sure ofthis?() A: In order to make sure of this, the .NET Framework trust level should be set to Medium for the Web site. B: In order to make sure of this, the .NET Framework trust level should be set to Full for the Web site. C: In order to make sure of this, the .NET Framework trust level should be set to Low for the Web site. D: In order to make sure of this, the .NET Framework trust level should be set to High for the Web site.

    • 3

      You need to recommend a solution for the Web server content that meets the company’s technicalrequirements.   What should you include in the recommendation?() A: Distributed File System (DFS) Replication B: folder redirection C: HTTP redirection D: IIS Shared Configuration

    • 4

      You have a Windows Server 2008 R2 Hyper-V server. You need to ensure that you are prompted to specify a custom snapshot name when you create a snapshot. What should you use to create the snapshot?() A: Hyper-V Manager B: Windows Server Backup C: the Virtual Machine Connection window D: the Backup command-line tool (also known as wbadmin.exe)