1.
You are the administrator of your company network. There's a SQL Server 2008 instance which hosts a new database application in your company. Now you want to develop the security requirements for the application. Each application user has his own login to the SQL Server 2008 server. The application database executes stored procedures in the MSDB database in which the stored procedures schedule SQLAgent jobs. You must make sure that the the stored procedures in the MSDB database are executed by using the security context of the application user. So what should you do?
2.
You are the administrator of your company network. You are in charge of a SQL Server 2008 instance which contains a database named Funds. And the Funds database is being used in single-user mode. The backup strategy for the Finance database meets the following two requirements: 1. At 09:00 every day, full database backup to a file called funds.bak is performed. 2. Since 09:15 every day, a transaction log backup to a file named funds_HHMM.trn is performed every 15 minutes. A user came to report that a query deleted some important data by accident. The query was executed at 09:24. You are asked to recover the database to its original state. So which Transact-SQL statement(s) should you use to achieve this?
3.
You are the administrator of your company network. And you're in charge of SQL Server 2008 instance. You intend to deploy a new database to the instance. The data will have lots of schemas and will be subject to frequent inserts and updates. One schema will contain plenty of reference data. In order to optimize backup performance, you have to design the physical database structure. So what should you do?
4.
You are the administrator of your company network. And you're in charge of SQL Server 2008 instance. Now you intend to deploy a new database which asks for capacity requirements. It requires 280 GB for the database data file and 50 GB for the transaction log file. The storage array has six disk drives available for the database. The capacity of the six disk drives are all 100 GB and are attached to a redundant array of independent disks (RAID) controller which supports RAID levels 0,1, 5, and 10. You have to optimize the write performance of the transactional log. And you also have to protect the database and transaction log files if a drive failure occurs. You have to design the storage system. So which storage configuration should you use?
5.
You are the administrator of your company network. And you're in charge of a SQL Server 2008 infrastructure. You check and find that the performance of the instance is degrading. And this may because of deadlocks, excessive CPU usage or server processes paging. You have to work out a solution to monitor and identify performanceproblems. Your solution should Lead your way to certificates! provide information, including detailed deadlock information. You have to do this with as little administrative effort as possible. So which tool should you use?
6.
You are the administrator of your company network. And you're in charge of a SQL Server 2008 instance which contains a large mission-critical database. And the database experiences a high volume of DML activity. Now you find that the applications which link to the database make response very slowly. In order to collect information about index fragmentation, new potential indexes and unused or sparingly used indexes, you have to develop a monitoring process to do this. So what should you use?
7.
You are the administrator of your company network. And you're in charge of a SQL Server 2008 infrastructure. The instance contains a database named RCC. Uses report that when executing reports, it makes response quite slowly. So you want to develop a monitoring strategy to monitor the performance. The strategy captures and stores the data such as Counters for disk, CPU, and memory, blocking and deadlock information, and executed Transact-SQL statements and query activity. When running the monitoring process, you must use as little administrative effort as possible. So what should you do?
8.
You are the administrator of your company network. And you're in charge of a SQL Server Lead your way to certificates! 2008 infrastructure. Now you want to obtain hardware configurations, such as the processor type of all SQL Server 2008 computers. So you have to develop a solution to achieve this. The solution you develop must be hosted on the central computer and can verify hardware configurations for multiple servers. You have to choose a technology that satisfy the two requirements above, while using as little development effort as possible. So what should you do?
9.
You are the administrator of your company network. And you're in charge of a SQL Server 2008 infrastructure. Now you are assigned a task to enforce naming standards for the database objects, so you have to design a solution to achieve this while using as little programming and administrative efforts as possible. So what should you do?
10.
You are the administrator of your company network. And you're in charge of a SQL Server 2008 infrastructure. The instance contains a database names PPR. Database PPR has a large table named PBT. The application queries only execute DML statements on the last two months data. Administrative audits are conducted monthly on data older than two months. In the database, you find some performance issues, such as the performance of the application queries against the PBT table is poor, the maintenance tasks against the database, including index defragmentation, run quite slowly. So what should you do to solve these problems while not having effect on sever performance. Lead your way to certificates!