Microsoft 70-432 Real Exam Questions
Candidates should have one to two years of experience using SQL Server 2008 or two to three years of experience using a previous version of SQL Server. Candidates for this exam are IT professionals who have jobs in which database administration is their main area of responsibility, or they work in environments in which databases are central to their job roles.
1: You administer three SQL Server 2008 instances named Instance1, Instance2, and Instance3. Each of the three instances runs on a separate server. A mission-critical database is mirrored between Instance1 and Instance2. Instance3 acts as the witness. Instance1 currently acts as the Principal.
You plan to apply a patch to both servers. The patch requires a restart of the server.
You need to find out the sequence of steps necessary to ensure that the following requirements are met:
The patching process is completed in the shortest possible time.
The database is online on the partner that currently does not apply the patch.
The database does not failover to the other partner during this time.
What should you do?
A.Apply the patch to the server that runs Instance2.Apply the patch to the server that runs Instance1.
B.Apply the patch to the server that runs Instance2.Manually failover the mirroring session.Apply the patch to the server that runs Instance1.
C.Remove the mirroring session.Apply the patch to the server that runs Instance2.Apply the patch to the server that runs Instance1.Re-establish the mirroring session.
D.Suspend the mirroring session.Apply the patch to the server that runs Instance2.Resume the mirroring session.Manually failover the mirroring session.Apply the patch to the server that runs Instance1.
Correct Answers: D
2: You administer a SQL Server 2008 instance named CorpPub that contains a database named SalesSupport. The SalesSupport database contains the Products table.
You plan to create a Replication topology to replicate the Products table to the SQL Server instances installed in portable computers. When the portable computers reconnect to the corporate network, the Products table is updated from CorpPub.
The Products table on the CorpPub instance is frequently updated between reconnections.
You need to successfully implement the Replication topology along with the Subscription type by ensuring that bandwidth usage is minimized.
What should you do?
A.Implement the Merge Replication topology along with a Pull Subscription.
B.Implement the Snapshot Replication topology along with a Pull Subscription.
C.Implement the Snapshot Replication topology along with a Push Subscription.
D.Implement the Transactional Replication topology along with a Pull Subscription.
Correct Answers: A
3: You administer a SQL Server 2008 instance that contains the AdventureWorks database. The AdventureWorks database uses the bulk-logged recovery mode. You log ship the AdventureWorks database across a WAN link. There is a scheduled job that rebuilds the indexes of the AdventureWorks database. You discover that the job increases the size of the log backups for log shipping. You need to minimize the size of the log backups used by log shipping. What should you do?
A.Compress the log file backups.
B.Change the job to drop the indexes, and then recreate the indexes.
C.Alter the AdventureWorks database to use the Full recovery mode.
D.Alter the AdventureWorks database to use the Simple recovery mode.
Correct Answers: A
4: You administer a SQL Server 2008 cluster. You plan to test the failover response of the cluster. You need to implement a manual failover on the cluster. Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.)
A.Restore a backup to the active node.
B.Remove the shared array from the active node.
C.Unplug the network cable(s) from the active node.
D.Use Encrypting File System (EFS) to encrypt the contents of a shared folder on the active node.
Correct Answers: B C
5: You administer a SQL Server 2008 instance. The instance contains a database named DB1. You plan to allow all the application developers to use SQL Server Profiler to capture traces to troubleshoot the application that uses the database DB1. You need to grant the minimum necessary permission to the application developers. What should you do?
A.Grant the appropriate database-level permissions to all database users of the application developers.
B.Grant the appropriate server-level permissions to all SQL Server logins of the application developers.
C.Add all the database users of the application developers to a fixed database role.
D.Add all the SQL Server logins of the application developers to a fixed server role.
Correct Answers: B
6: You maintain a SQL Server 2008 instance that contains a database named CustomerDB. The CustomerDB database stores customer data for the company. The customers use a Web application to access their profile data. You need to protect the customer data such that data files, log files, and subsequent backups are as secure as possible even if the backup media is lost. You want to achieve this goal without affecting the Web application. What should you do?
A.Encrypt the sensitive data at the cell level by using the built-in encryption functions.
B.Make the CustomerDB database accessible only through stored procedures and functions.
C.Enable Transparent Database Encryption for the CustomerDB database and back up the transaction log.
D.Enable Transparent Database Encryption for both the CustomerDB database and the master database.
Correct Answers: C
7: You administer two SQL Server 2008 instances named Instance1 and Instance2.
A database named AdventureWorks resides on Instance1. You move the AdventureWorks database from Instance1 to Instance2.
A SQL Server login named Mary with the password "Re#99$45" is used by a user to access the database on Instance1. You create the same SQL Server login on Instance2. The user attempts to access the AdventureWorks database on Instance2 by using the SQL Server login Mary. However, the user receives an error message which indicates that the access to the AdventureWorks database is denied.
You need to ensure that the user can access the AdventureWorks database.
Which Transact-SQL statements should you execute on Instance2?
A.USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary;
B.USE AdventureWorks;ALTER LOGIN Mary ENABLE;
C.USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = ‘Re#99$45’ UNLOCK;
D.USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;
Correct Answers: A
8: You administer a SQL Server 2008 instance that contains a database named DB1. A table named Sales.Table1 exists in the Sales schema. You need to move the Sales.Table1 table to a new schema named Billing. Which Transact-SQL statement should you execute?
A.ALTER SCHEMA Billing TRANSFER Sales.Table1;
B.ALTER USER Sales WITH DEFAULT_SCHEMA = Billing;
C.ALTER AUTHORIZATION ON Sales.Table1 TO Billing;
D.ALTER TABLE Sales.Table1 SWITCH TO Billing.Table1;
Correct Answers: A
9: You administer a SQL Server 2008 instance.You need to allow users on the SQL Server instance to query remote data sources by using the OPENROWSET() function. Which sp_configure configuration option should you configure?
A.Agent XPs
B.remote access
C.remote proc trans
D.Ad Hoc Distributed Queries
Correct Answers: D
10: You administer a SQL Server 2008 instance that runs on a Windows Server 2003 computer. The instance uses mixed authentication mode. You need to ensure that the SQL Server 2008 authenticated logins follow the same password complexity rules that are enforced by Windows Server 2003. You also need to ensure that the password complexity rules continue to be enforced. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Use the ALTER LOGIN … HASHED statement to modify all logins.
B.Use the ALTER LOGIN … CHECK_POLICY = ON statement to modify all logins.
C.Use the ALTER LOGIN … CHECK_EXPIRATION = ON statement to modify all logins.
D.Use Policy-Based Management to create a policy that prevents any violation of these rules.
E.Create an SQL Server Agent job that runs periodically to raise an alert if a rule violation is detected.
Correct Answers: B D
Download | Password: ciscobibles.com