Microsoft 70-444 Real Exam Questions
PRO: Optimizing and Maintaining a Database Administration Solution by Using Microsoft SQL Server 2005
1: You are the administrator of a Microsoft Windows Server 2003 computer named Server1. SQL Server 2005 is installed on Server1 to host a database named MedDB. The MedDB database serves as the backend database for a new client/server application named MedDATA. Installation of the MedDATA application creates the database schema, application roles, and administrative accounts. It also sets all of the default permissions. You need to establish a permissions baseline for all objects in the MedDB database. What should you do?
A.Use the SQL Server 2005 Management Studio to review the permissions of the default database objects.
B.Query the sys.server_permissions table on Server1.
C.Execute the sp_helplogins system stored procedure for each of the default users that the MedDATA application creates.
D.Query the sys.database_permissions and sys.database_principals tables in the MedDB database.
Correct Answers: D
2: You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?
A.Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.
B.Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.
C.Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.
D.Run the SQL Server Profiler and use a standard default template.
Correct Answers: C
3: You are the administrator of a SQL Server 2005 computer named SQL1. You create a security template that disables unnecessary services. The template is appropriate only for SQL1. You need to ensure that the security template is applied to SQL1. Your solution must ensure that the template automatically overrides any manual configuration changes made by other administrators within an hour. What should you do?
A.Use the SQL Server Surface Area Configuration tool to import the security template.
B.Use the Local Security Policy editor to import the security template into the Local Security Policy object.
C.Configure Task Scheduler to import the security template by using Secedit.exe. Configure the task to run every half hour.
D.Configure Task Scheduler to run the Microsoft Baseline Security Analyzer tool every half hour.
Correct Answers: C
4: You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name\password for first account: pentest\P@ssw0rdUser name\password for second account: hacktest\password You need to provide the information security team with the requested access to SQL1. Which Transact-SQL script should you use?
A.CREATE LOGIN pentestWITH PASSWORD = ‘P@ssw0rd’ CREATE LOGIN hacktestWITH PASSWORD = ‘password’
B.CREATE LOGIN pentestWITH PASSWORD = ‘P@ssw0rd’ CREATE LOGIN hacktestWITH PASSWORD = ‘password’,CHECK_POLICY = OFF
C.CREATE LOGIN pentestWITH PASSWORD = ‘P@ssw0rd’ CREATE LOGIN hacktestWITH PASSWORD = ‘password'[HASHED]
D.CREATE LOGIN [CONTOSO\pentest]FROM WINDOWS CREATE LOGIN [CONTOSO\hacktest]FROM WINDOWS
Correct Answers: B
5: You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy. What should you do?
A.Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.
B.Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.
C.Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.
D.Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.
E.Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
Correct Answers: C
6: You are a database administrator for your company. The company runs a popular database-driven Web site against a SQL Server 2005 computer named SQL2. You need to ensure a quick response time and appropriate audit trail in the event that SQL2 experiences excessive traffic due to denial-of-service (DoS) attacks. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.Create a new performance alert to monitor the Current Bandwidth counter.
B.Create a new performance alert to monitor the Bytes Total/sec counter.
C.Configure the new performance alert to start a SQL Server Profiler trace.
D.Configure the new performance alert to start a Network Monitor capture.
Correct Answers: B D
7: You are a database administrator for your company. You are configuring a new SQL Server 2005 computer named SQL1. SQL1 will run Reporting Services. It will also be configured to automatically perform database backups and other maintenance tasks. There are no other SQL Server computers in the network environment. All access to SQL1 will be made by using SQL1s DNS name. You need to disable any unnecessary services on SQL1. Which service or services should you disable? (Choose all that apply.)
A.Internet Information Services
B.SQL Server Browser
C.SQL Server Agent
D.Microsoft Distributed Transaction Coordinator
Correct Answers: B D
8: You are a database administrator for your company. You are responsible for a SQL Server 2005 database that has several indexes. You need to write a stored procedure that checks the indexes for fragmentation. Which Transact-SQL statement should you use?
A.DBCC DBREINDEX
B.SELECT * FROM sys.dm_db_index_physical_stats
C.DBCC INDEXDEFRAG
D.SELECT * FROM sys.indexes
Correct Answers: B
9: You are a database administrator for your company. The company uses a SQL Server 2005 database. A full backup of the database is made each night. Transaction log backups are made each morning and each afternoon. You notice that the database transaction log file grows very large throughout the day. You need to minimize the size of the transaction log file. You also need to minimize data loss in the event of a failure. What should you do?
A.Decrease the amount of time between transaction log backups.
B.Configure the database to use the simple recovery model.
C.Configure the RECOVERY INTERVAL option to be a smaller value.
D.Run DBCC SHRINKFILE on the transaction log file.
Correct Answers: A
10: You are a database administrator of two SQL Server 2005 computers named SQL1 and SQL2. You have a Microsoft .NET application that has been modified so that it now accesses a database on SQL2 in addition to SQL1. You do not want the user application to connect directly to SQL2. You need to enable the data retrieval from SQL2 while maintaining the ability to assign different permissions to different users who use the .NET application. What should you do?
A.Change the .NET application to define a new server connection to SQL2.
B.Configure a linked server on SQL1 to point to SQL2.
C.Configure a linked server on SQL2 to point to SQL1.
D.Change the stored procedures called by the .NET application to include the OPENXML command.
Correct Answers: B
Download | Password: certificatexam.com