You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database.
Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named
ServiceGreatUser.
A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database
user can only perform the two tasks below:
the database user executes all stored procedures that currently exist in the Sales database
executes all stored procedures that will be created in the Sales database.
So what should you do to ensure this?
You administer a SQL Server 2008 instance. You plan to install a SQL Server Analysis Services (SSAS) instance.
The SSAS instance will be accessed by an Internet Information Services application by using anonymous access.
You need to ensure that the application can access the SSAS instance.
What should you do?
You are mastering the company database; there are 15 retail stores in your company.On its own
SQL Server 2008 computer, every retail store keeps transactions of point-of-sale in a database
table called Saling.The Saling table also includes sales information from other stores to enable
customer returns to any of the 15 retail stores. You could refresh the data in the main office to every retail store every hour. You should use trigger called
trg_Coupon to produce sales coupons based on customer sales and buying patterns. Through using the fewest number of steps, you should set replication between
the server in every retail store and a middle server in the mainoffice. in real time. You should not have the Replication. Which is the correct answer?
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.
There is a database named Dworks in the instance. The Dworks database has a table named Bills which contains several indexes and a great amount of rows. An
enterprise Web environment is supported by the database. On the Bills table 28% of the indexes have been fragmented.
You have to defragment the indexes, making sure that you reduce the effect on database availability to the least.
In the ALTER INDEX statement, which option should be included?
You want to modify the server settings without using the Server properties screen from the Management Studio. Which stored procedure allows you to change
server settings?
You are checking the security of a SQL Server 2008 instance which includes database TestDataBase. The following requirements are listed below: There are only
successful and failed
logon attempts in log files.If records could not be written to the log files, the SQL Server instance
is closedIn order to set the SQL Server sample to conform to the requirements .Which is the correct answer?
You are reviewing and configuring the security of a SQL Server 2008 instance that contains database DB1.
The security audit policy specifies the following requirements:
Only successful and failed logon attempts are recorded in log files. The SQL Server instance is shut down if records cannot be written to the log files. You need to
configure the SQL Server instance to comply with the security audit policy.
Which Transact-SQL statements should you run?
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.
There is a database named DB1 in the instance. According to the requirements of the security audit policy, only successful and failed logon attempts are recorded
in log files; if records cannot be written to the log files, the SQL Server instance is shut down.
You have to make the SQL Server instance comply with the security audit policy by performing the configuration.
Which Transact-SQL statements should you run?
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database.
Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. Now you are checking and configuring the security of the
instance.
According to the requirement of the security audit policy, only successful and failed logon attempts are recorded in log files and if records cannot be written to the
log files, the SQL Server instance is shut down.
You must configure the SQL Server instance making it not violate the security audit policy.
In the options below, which Transact-SQL statements should you run?
What is the name given to the process of replacing a table with multiple smaller tables. Each smaller table has the same format as the original table, but with a
subset of the data. Each of these tables has rows allocated to it based on some characteristic of the data, such as specific key ranges.