You upgrade an instance of Microsoft SQL Server 2000 to SQL Server 2008.
The SQL Server Agent service is configured to use the LocalSystem account. A job uses a CMDExec step to access a file located on a remote network share.
After the upgrade, the job step fails to complete execute.
You need to configure the job step so that it can successfully complete execution.
What should you do?
You configure a SQL Server 2008 instance that contains a database named Customers.
The Customers database experiences deadlock problems.
You need to capture the deadlock information to the SQL Server error log.
What should you do?
You manage a SQL Server 2008 instance.
You need to verify whether or not a database integrity check (DBCC CHECKDB) was run for a particular database.
Which log file should you examine?
A SQL Server login named Mary with the password "Me#43&21" is used by a user to access the database on Instance1. You create the same SQL Server login on Instance2.
The user attempts to access the AdventureWorks database on Instance2 by using the SQL Server login Mary.
However, the user receives an error message which indicates that the access to the AdventureWorks database is denied.
You need to ensure that the user can access the AdventureWorks database.
Which Transact-SQL statements should you execute on Instance2?
You administer a Microsoft SQL Server 2008 R2 database.
You configure the disk drives according to the following table:
You discover that the Windows application log is being filled with entries from a SQL Server Audit process named DatabaseAudit. The volume of these events is causing older events to be removed from the log.
You need to ensure that the following requirements are met:
SQL Server Audit information is stored in the
D:\AuditLogs folder.
No data is currently lost in the Windows application log.
What should you do?
You maintain multiple SQL Server 2008 instances on the same physical computer.
Users can connect to the default instance but are unable to connect to the named instances. You verify that currently all SQL Server instances run.
You need to start the service required to connect to the named instance.
Which Service should you start?
You administer a SQL Server 2008 instance named SQL1. SQL1 contains a database named DB1.
You create a new user named User1 in the DB1 database. No additional permissions have been assigned to
User1 or the public role. User1 will interact with database objects stored in a new schema named Reporting.
The other objects in the DB1 database are owned by the dbo and are contained in a schema named Operations.
You need to grant the minimum necessary permissions to User1 to create tables and stored procedures in the
Reporting schema. You also need to ensure that User1 cannot alter any of the objects in the Operations schema.
Which Transact-SQL statements should you execute?
You administer a SQL Server 2008 instance named DB1. DB1 contains a table named Table1.
The DB1 database includes a stored procedure named Procedure1. Procedure1 uses a sp_executesql
Transact-SQL statement to select data from Table1.
According to business requirements, users are not allowed to access tables directly in any database.
When a user executes Procedure1, the following exception is raised:
"Msg 229, Level 14, State 5, Line 1
The SELECT permission was denied on the object 'Table1', database "DB1', schema 'dbo'."
You need to ensure that the user can successfully execute Procedure1 without violating the business requirements.
What should you do?
You administer a SQL Server 2008 instance. You use an internal application based on SQL Server 2008. The application uses Analysis Services and Reporting Services.
Company security requires that the surface area for all the deployed components of SQL Server 2008 be configured.
You need to implement the security policy and devise a method to evaluate the security policy against other database servers.
What should you do?
You maintain a SQL Server 2008 instance that contains a database named CustomerDB. The CustomerDB database stores customer data for the company. The customers use a Web application to access their profile data.
You need to protect the customer data such that data files, log files, and subsequent backups are as secure as possible even if the backup media is lost. You want to achieve this goal without affecting the Web application.
What should you do?