网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.

You want to minimize changes to your security model and to your database applications. How should you modify the database?

A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.

B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.

C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.

D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.


参考答案

更多 “ You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables. ” 相关考题
考题 You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000 database at the corporate headquarters.A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a key value to each transformed sales record.After loading this month's sales data, you discover that a portion of the data contains errors. You stop loading data, identify the problem records, and delete those records from the database.You want to reuse the key values that were assigned to the records that you deleted. You want to assign the deleted key values to the next sales records you load. You also want to disrupt users' work as little as possible.What should you do?A.Export all records from the Sales table to a temporary table. Truncate the Sales table, and then reload the records from the temporary table.B.Export all records from the Sales table to a text file. Drop the Sales table, and then reload the records from the text file.C.Use the DBCC CHECKIDENT statement to reseed the Sales table's IDENTITY property.D.Set the Sales table's IDENTITY_INSERT property to ON. Add new sales records that have the desired key values.

考题 You are the network administrator for your company. The network contains a Windows Server 2003 computernamed Server1.Server1 contains two NTFS volumes named Data and Userfiles. The volumes are located on separate hard disks.The Data volume is allocated the drive letter D. The Data volume is shared as \\Server1\Data. The Userfiles volume is mounted on the Data volume as a volume mount point. The Userfiles volume is displayed as the D:\Userfiles folder when you view the local disk drives by using Windows Explorer on Server1. The D:\Userfiles folder is shared as \\Server1\Userfiles.The files on the Userfiles volume change every day. Users frequently ask you to provide them with previous versions of files. You enable and configure Shadow Copies on the Data volume. You schedule shadow copies to be created once a day. Users report that they cannot recover previous versions of files in the \\Server1\Userfiles shared folder.You need to enable users to recover previous versions of files on the Userfiles volume.What should you do? ()

考题 Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:\Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()A. Enable access-based enumeration (ABE) on the share.B. Assign the Read NTFS permission to the Domain Users group.C. From the Network and Sharing Center, enable public folder sharing.D. From the File Sharing Wizard, configure the Read permission level for the Domain Users group.

考题 You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of Ezonexam.com's client computers are connected to this server.A shared folder named Data on the server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.Type of permission Account PermissionShare Users ChangeNTFS Users Full ControlYou discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.What two actions should you take? (Choose Two)A.Modify the NTFS permissions for the 10 files.B.Modify the NTFS permissions for the Data folder.C.Modify the shared permissions for the Data folder.D.Log off the users from the network.E.Disconnect the users from the Data folder.

考题 You are the administrator of a SQL Server 2000 computer in your company's personnel department. Employee data is stored in a SQL Server 2000 database. A portion of the database schema is shown in the exhibit.You want to create a text file that lists these data columns in the following format title, FirstName, LastName, WorkPhone, PositionName, DepartmentName.You want to create the text file as quickly as possible. You do not expect to re-create this file, and you want to avoid creating new database objects if possible.What should you do?A.Use the bcp utility to export data from each table to a separate text file. Use format files to select the appropriate columns. Merge the data from each text file into a single text file.B.Create a view that joins data from all three tables include only the columns you want to appear in the text file. Use the bcp utility to export data from the view.C.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a local temporary table. Use the bcp utility to export data from the local temporary table to a text file.D.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a global temporary table. Use the bcp utility to export data from the global temporary table to a text file.

考题 You are the administrator of a SQL Server 2000 computer. The server contains database named Sales. Users report that they cannot add new data to the database. You examine the properties of the database. The database is configured as shown in the Sales Properties exhibit.You examine drive E. The hard disk is configured as shown in the Local Disk Properties exhibit.You want the users to be able to add data, and you want to minimize administrative overhead. What should you do?A.Increase the maximum file size of Sales_Data to 1,500MB.B.Use the DBCC SHRINKDATABASE statement.C.Set automatic file growth to 10 percent.D.Create another data file named Sales_Data2 in a new SECONDARY filegroup.

考题 You are the administrator of a SQL Server computer. Users report that the database times out when they attempt to modify data. You use the Current Activity window to examine locks held in the database as shown in the following screenshot.You need to discover why users cannot modify data in the database, but you do not want to disrupt normal database activities. What should you do?A.Use the spid 52 icon in the Current Activity window to discover which SQL statement is being executedB.Use the sp_who stored procedure to discover who is logged in as spid 52C.Use SQL Profiler to capture the activity of the user who is logged in as spid 52D.Use System Monitor to log the locks that are granted in the database

考题 You are the administrator of a SQL Server 2000 computer. The server contains a database that stores financial data. You want to use Data Transformation Services packages to import numeric data from other SQL server computers. The precision and scale values of this data are not defined consistently on the other servers.You want to prevent any loss of data during the import operations. What should you do?A.Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the source tables. Change the data types so that they will use the lowest precision and scale values of the data that will be transferred.B.Use the ALTER COLUMN clause of the ALTER TABLE statement to change data types in the destination tables. Change the data types to reflect the highest precision and scale values involved in data transfer.C.Set a flag on each DTS transformation to require an exact match between source and destination columns.D.Set the maximum error count for each DTS transformation task equal to the number of rows of data you are importing. Use an exception file to store any rows of data that generate errors.E.Write Microsoft ActiveX script. for each DTS transformation. Use the script. to recast data types to the destinations precision and scale values.

考题 You are the administrator of a SQL Server 2000 computer. The server is configured as shown in the Database Server Configuration exhibit.You need to create a new database named Inventory. Employees in your company will use the Inventory database to track inventory data. Users will require immediate responses to queries that help them locate where parts are stored. The tables in the database will be configured as shown in the Database Schema exhibit.The database will consume 14 GB of disk space. You must configure the data files and transaction log to accelerate query response time.Which two courses of action should you take? (Each correct answer represents part of the solution. Choose two.)A. On drive C, create a transaction log.On drive D, create a data file in the PRIMARY filegroup.On drive E, create a data file in the SECONDARY filegroup.B. On each drive, create a transaction log.On each drive, create a data file in the PRIMARY filegroup.C. On drive D, create a transaction log.On drive E, create a data file in the PRIMARY filegroup.D. On the PRIMARY filegroup, create all tables and all indexes.E. On the PRIMARY filegroup, create all tables. On the SECONDARY filegroup, create all indexes.F. On the PRIMARY filegroup, create the Parts table and its indexes.On the SECONDARY filegroup, create all other tables and their indexes.

考题 You are the network administrator for The network contains a Windows Server 2003 computer named TestKing7.TestKing7 contains two NTFS volumes named Data and TestKingFiles. Thevolumes are located on separate hard disks. The Data volume is allocated the driveletter D. The Data volume is shared as \\TestKing7\Data. The TestKingfiles volumeis mounted on the Data volume as volume mount point. The TestKingFiles volume isdisplayed as the D:\TestKingFiles folder when you view the local disk drives byusing Windows Explorer on TestKing7. The D:\TestKingfiles folders is shared as\\TestKing7\TestKingfilesThe files on the TestKingFiles volume change every day. Users frequently ask you toprovide them with previous versions of files. You enable and configure ShadowCopies of the Data volume. You schedule shadow copies to be created once a day.Users report that they cannot recover previous versions of the files on theTestKingFiles volume.What should you do?()

考题 You work in Dublin at the main office of TestKing.com. You are responsible for managing a SQL Server 2005 database. The sales department wants a report that compares customer activity in the previous quarter between the main office in Dublin and the branch office in Buenos Aires. They want the data sorted by surname and first name.You restore a recent backup of the Buenos Aires database onto your server. You write queries to build the report, ordering the data by the Surname and FirstName columns. You review the data and notice that the customer list from the Buenos Aires database is sorted differently. The sales department needs the revised data within 15 minutes for a presentation.  You need to implement the fastest possible solution that ensures that the data from both databases is sorted identically. What should you do?()A、Use the Copy Database Wizard to copy the data in the Buenos Aires database to a new database with the same collation as the Dublin database.B、Use the SQL Server Import and Export Wizard to copy the data from the Buenos Airesdatabase into new tables, specifying the same collation as the Dublin database.C、Modify the format file to specify the same collation as the Dublin database. Import the table again.D、Modify the query on the Buenos Aires database to use the COLLATE setting in the ORDER BY clause. In the query, specify the same collation as the Dublin database.

考题 You have an Exchange Server 2010 organization.You need to prevent internal users from sending messages that contains the phrase °Company Confidentia?± to external use.What should you create?()A、a Transport ruleB、a managed folder mailbox policyC、a message classificationD、a Send connector

考题 Your database is running In ARCIIIVELOG mode. One of the data files, USBRDATAOI. DBF, in the users tablespace is damaged and you need to recover the file until the point of failure. The backup for the data file is available.  Which three files would be used in the user-managed recovery process performed by the database administrator (DBA)?() A、 redo logsB、 control fileC、 temporary files of temporary tablespaceD、 the latest backup of only the damaged data fileE、 the latest backup of all the data files In the USERS tablespace

考题 In which case would you use a FULL OUTER JOIN?()A、Both tables have NULL values.B、You want all unmatched data from one table.C、You want all matched data from both tables.D、You want all unmatched data from both tables.E、One of the tables has more data than the other.F、You want all matched and unmatched data from only one table.

考题 You have a database with the following tablespaces: SYSTEM, SYSAUX, UNDO, USERS, TEMP. You want to"roll back" the data in the USERS tablespace to the way it looked yesterday.  Which tablespaces do you need to perform a point-in-time restore operation on in order to complete this task?() A、 SYSTEMB、 SYSAUXC、 UNDOD、 USERSE、 TEMPF、 This restore is not possible

考题 You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()A、use the external table populationB、use the Oracle Data Pump export and import utilityC、use the conventional path data load of SQL*Loader utilityD、use the direct path data load of Oracle export and import utility

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. Now you get a report from users saying that DB1 meets deadlock problems. As the technical support, you have to capture the deadlock information to the SQL Server error log. What should you do?()  A、For the AdventureWorks database, enable Server Auditing B、First you should set the appropriate trace flags as a startup parameter, and then restart the SQL Server instance C、You should configure the data collector and make it capture the deadlock graphsD、You should configure a SQL Profiler trace, and make it capture the deadlock graphs

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008.  You plan to create a SQL Server 2008 Reporting Services (SSRS) solution that contains five sales dashboard reports.  Users must be able to manipulate the reports’ parameters to analyze data. You need to ensure that the following requirements are met: Users can manipulate the parameters for data analysis in a single trip to the data source.  Reports are automatically rendered as soon as they are accessed for the first time. Which two tasks should you perform?()A、 Filter data by using expressions.B、 Specify the default values for each parameter.C、 Create an available values list for each parameter.D、 Create report parameters by using query parameters to filter data at the data source.

考题 You are the network administrator for your company. The network contains a Windows Server 2003 computernamed Server1.Server1 contains two NTFS volumes named Data and Userfiles. The volumes are located on separate hard disks.The Data volume is allocated the drive letter D. The Data volume is shared as //Server1/Data. The Userfiles volume is mounted on the Data volume as a volume mount point. The Userfiles volume is displayed as the D:/Userfiles folder when you view the local disk drives by using Windows Explorer on Server1. The D:/Userfiles folder is shared as //Server1/Userfiles.The files on the Userfiles volume change every day. Users frequently ask you to provide them with previous versions of files. You enable and configure Shadow Copies on the Data volume. You schedule shadow copies to be created once a day. Users report that they cannot recover previous versions of files in the //Server1/Userfiles shared folder.You need to enable users to recover previous versions of files on the Userfiles volume.What should you do? ()A、Assign drive E to Userfiles. Enable Shadow Copies on the Userfiles volume.B、Convert the disk that contains the Data volume to a dynamic disk.C、Convert the disk that contains the Userfiles volume to a dynamic disk.D、Instruct users to connect to //Server1/Data when they attempt to access previous versions of files in the D:/Userfiles folder.E、Instruct users to connect to //Server1/D$ when they attempt to access previous versions of files on the Data volume.

考题 Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()A、Remove all generic credentials from Windows Vault.B、Remove all Windows credentials from Windows Vault.C、Modify the Windows Internet Explorer certificates settings.D、Modify the Windows Internet Explorer AutoComplete settings.

考题 You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. The application uses Session objects. You are modifying the application to run on a Web farm. You need to ensure that the application can access the Session objects from all the servers in the Web farm. You also need to ensure that when any server in the Web farm restarts or stops responding, the Session objects are not lost.  What should you do?()A、Use the InProc Session Management mode to store session data in the ASP.NET worker process. B、Use the SQLServer Session Management mode to store session data in a common Microsoft SQL Server 2005 database. C、Use the SQLServer Session Management mode to store session data in an individual database for each Web server in the Web farm. D、Use the StateServer Session Management mode to store session data in a common State Server process on a Web server in the Web farm. 

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to create a SQL Server 2008 Reporting Services (SSRS) solution. Developers generate random reports against a data source that contains 200 tables. Power users generate random reports against four of the 200 tables. You need to design a strategy for the SSRS solution to meet the following requirements: ·Uses minimum amount of development effort. ·Provides two sets of tables in SSRS to the developers group and the power users group. Which strategy should you use?()A、 Create two Report Builder models.Include the four frequently used tables in the first model and all the tables in the second model.B、 Create a Report Builder model by using all the tables.Create a perspective within the model to use only the four frequently used tables.C、 Create a Report Builder model by using all the tables. Create two folders.Place the four frequently used tables in the first folder and the remaining tables in the second folder.D、 Create two Data Source Views.Include all the tables in one Data Source View and the four frequently used tables in the other Data Source View.Create two Report Builder models so that each model uses one of the Data Source Views.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?()  A、You should configure the database for Read Committed Snapshot isolation. B、You should modify the stored procedure to use the Snapshot isolation level C、You should configure the database for Auto Update Statistics asynchronously D、You should modify the stored procedure to use the Repeatable Read isolation level

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is called SQL1. There are two databases on the SQL1, and the two databases are respectively named Production and DW. A new database named Staging is created. When the data are moving from the Production database into the DW database, the Staging database is utilized temporarily to store and manipulate data. Since you are the database administrator, you are required to make sure the points listed below. First, the tables should not be removed from the Staging database. Second, any attempts to have tables migrated should be logged. Third, your solution should not impact on other databases.  Which action should be performed to achieve the goal?()A、To achieve the goal, a DML trigger on each table should be created to prevent deletion of data.B、To achieve the goal, a DDL trigger should be created, and that the ON DATABASE parameter is utilized by DDL trigger for the Staging database.C、To achieve the goal, an event notification should be created to fire when the TRUNCATE TABLE Transact-SQL statement is submitted to the Staging database.D、To achieve the goal, a DDL trigger should be created, and the ON ALL SERVER parameter is utilized by the DDL trigger.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a n On-Line Analytical Processing (OLAP) database named in the instance. The database contains a dimension table named Clients. Ever hour backup of data of the Clients table is performed. But the Clinets table contains redundant data. You must keep the disk space used to store the Clients table.  In the options below, which compression technology should you use?()A、You should use row compression B、You should use page compression C、You should use backup compression D、You should use windows NTFS file system compression

考题 You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A、Use Windows Explorer to receive the offline filesB、Using the Windows Explorer, disable the cache for the reports on the network shareC、Use the Windows NT explorer to grant the special access for the reports on the network  shareD、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?()A You should configure the database for Read Committed Snapshot isolation. B You should modify the stored procedure to use the Snapshot isolation level C You should configure the database for Auto Update Statistics asynchronously D You should modify the stored procedure to use the Repeatable Read isolation level