Review1

Review Windows 2K Professional and MS SQL Server 2K 1

1/ Which of the following service pack is used to upgrade SQL Server 6.5 to SQL Server 2000 on the same computer?

a. Service Pack 3.

b. Service Pack 1.5.

c. Service Pack 2.

d. Service Pack 5. Cau d

2/ You are the database administrator at a commercial bank. The integrity of data is extremely critical for the bank. The management stipulates that you perform backup periodically to prevent data loss. You do not want to take chances with the critical data and need to take the backup so that the data in its entirety is backed up. You also require that the backed up database should be carried forward to the next financial year. Which type of backup will you select?

a. Differential Backup.

b. Full Backup. Cau b

c. Filegroup Backup.

d. Differential Filegroup Backup.

3/ A user reports that all applications on his Windows 2000 Professional computer are running very slow. You notice that the computer has 128 MB of RAM and 200 MB free disk space. What should you do to improve the performance of the computer?

a. Add the user to the Power Users group.

b. Set the total paging file size to 75 percent of physical memory.

c. Perform a disk analysis, and defragment the disk, if recommended. Cau c

d. Ensure that the performance options are optimized for background services.

4/ What does the -f parameter in the BCP command refers to?

a. The maximum number of permissible errors that can occur before the bulk copy program is cancelled.

b. The location of the format file that is created during the bulk copy program.

c. The location of the error file that stores the rows that the bulk copy program was unable to transfer to the specified database.

d. The number of rows per batch of data that is copied.

5/ You have just finished installing a second instance of SQL Server 2000 on a machine. How can you check if SQL Server was installed properly and is running? (Choose the best answer)

a. Run the sqlcli.iss file.

b. Use the Query Analyzer and try to run a query on Pubs database of this new Server instance.b

c. Check the folder \\Microsoft SQL Server.

d. Check the registry.

6/ You are the administrator of several SQL Server 2000 databases. You need to import numeric data from some SQL Server databases, which do not define the precision and scale values of data consistently, to a database that stores financial data. How will you ensure data integrity while importing data?

a. Change data types in source tables by using the ALTER COLUMN clause of the ALTER TABLE statement. This will ensure data types use the lowest precision and scale values of data.

b. Change the data types in destination tables by using the ALTER COLUMN clause of the ALTER TABLE statement. This will reflect the highest precision and scale values.

c. Set a flag on each DTS transformation for an exact match between the source and the destination columns.

d. Set the maximum error count for each DTS transformation task equal to the number of rows of data that you need to import. And, store rows of data generating errors in an exception file.

7/ BlueMun Inc. has a database running on SQL Server 2000 and many users connect to the database through their Windows account. Some employees have been recently transferred to another branch. John, the DBA at BlueMun Inc, needs to remove the login accounts of these employees from SQL Server 2000. What should he do to ensure that only the invalid users are deleted?

a. Execute and filter the sp_who system procedure and remove the login ids using sp_revokelogins.

b. Execute and filter the sp_who system procedure and remove the login ids using sp_revokedbaccess.

c. Execute and filter the sp_validatelogins system procedure and remove the login ids using sp_revokedbaccess.

d. Execute and filter the sp_validatelogins system procedure and remove the login ids using sp_revokelogins.

8/ Tedd, a DBA of Online Sales Inc., regularly checks database and other DBCC checks in order to administer and maintain the SQL Server database. Tedd uses the SQLMaint utility and specifies the CkDB argument with the SQLMaint command. Which of the following did Tedd intend to do with this command?

a. Specify the database name, for which the maintenance tasks need to be performed.

c. Specify the location and name of the file in which the reports would be generated and stored.

b. Execute DBCC NEWALLOC statement on the specified database.

d. Execute DBCC CHECKDB statement on the specified database.d

9/ You are the network administrator of a Windows 2000 Professional network. You encrypt a file on a Windows 2000 Professional computer for security reasons. To enable a particular user access the encrypted file, you create a private key by exporting a certificate in the Microsoft Management Console (MMC) window. To export a certificate, what file format do you need to use with Secure/Multipurpose Internet Mail Extension (S/MIME)?

a. DER Encoded binary X.509.

b. Base64 encoded X.509.b

c. Cryptographic message syntax standard (PKCS #7).

d. Personal Information Exchange.

10/ Global Software Inc. maintains its databases on SQL Server 2000. John, a junior DBA, has the db_ddladmin database role assigned. He requires permissions to add Windows 2003 groups and users, and SQL Server users to a database. Marc, the DBA, wants to grant appropriate role to John's login. Which of the following system stored procedure statements will Marc use to do so?

a. sp_addrolemember 'db_accessadmin', 'John'.

b. sp_addrolemember 'db_securityadmin', 'John'.

c. sp_addrolemember 'db_admin', 'John'.c

d. No change in database role required.

11/ Your computer runs on Windows 2000 Professional and has 64 MB of RAM. An application that you have installed on your computer requires minimum 16 MB of memory. After you install the application, you observe that the performance of the computer has become slow. To monitor the memory, you want to generate an alert each time the memory becomes a bottleneck. Which counter should you choose in the System Monitor for the alert to be generated?

a. Available bytes.a

b. %Free Space.

c. Bytes Total/sec.

d. %Processor Time.

12/ You are the administrator of a SQL Server 2000 computer. The server contains a Data Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package. You want to ensure that connection properties, such as login names and passwords, cannot be read or modified by users. Which of the following actions should you take?

A. Save the DTS package so that it has an owner password.

B. Save the DTS package so that it has a user password.

C. Encrypt the DTS package details in the command line of the dtsrun utility.

D. Store the DTS package in the Meta Data Services repository.

E. Store the DTS package as a Microsoft Visual Basic file.

a. A, D

b. B, C

c. B, E

d. A, Cd

13/ You are the network administrator of a Windows 2000 Professional network. A user, Jack, informs you that it takes a long time for him to log onto his system. He does not face any problems when accessing network resources. You realise that his system seems to be the only one on the network that is experiencing this problem. What can be the cause of this problem?

a. Jack is the member of multiple user groups.

b. Jack's computer has a slower processor than the rest of the computers on the network.

c. Jack has a large user profile, which takes long to download.c

d. Jack connects to the domain controller through a slow router, which is at a different subnet.

14/ You are a SQL Server 2000 database administrator of a bank. The bank has several hundred branches spread all over the United States of America. The database server at the headquarter stores the entire data of all the customers. As per the bank policy, when a customer mobilizes his/her account, the customer's new balance must reflect on the database servers at all the branches as well as at the headquarter. What would you do to minimize latency between the database servers at the headquarter and the branch offices?

a. Implement merge replication. Use the DATETIME conflict resolver. Schedule replication at non-working hours.

b. Implement transactional replication. Allow immediate updating of subscribers. Schedule replication to run continuously.b

c. Create a DTS package on the headquarters database server. Configure the DTS package to import new account data from each of the servers at the branch offices and write it to all other database servers. Schedule the DTS package to run during non-working hours.

d. Configure log shipping between the database server at the headquarters and the branch office servers. Configure the headquarters server as the primary server and the branch office servers as secondary servers. Schedule log backups and log shipping to run every 30 minutes.

15/ Jane has to install Windows 2000 Professional on 50 non-PXE (Pre-boot Executive Environment) compliant computers. She creates and loads the RIS image on the RIS server. When she starts all the 50 computers, she finds that the computers cannot connect to the RIS server. What should Jane do to enable the computers to connect to the RIS server?

a. Create a non-PXE compliant remote boot disk by using the Rbfg.exe command.a

b. Create a non-PXE complaint startup disk by using the winnt32.exe command.

c. Create a non-PXE complaint startup disk by using the sysprep.exe command.

d. Create a new RIS image for non-PXE compliant computers.

16/ One Windows 2000 Professional computer is going to share its Internet connection with three other computers over a LAN. The computer will use a 56Kbps modem and a dial-up phone line account with an ISP to connect to the Internet. What components must you configure on the Windows 2000 Professional computer to enable ICS?

a. On the computer that will be used to dial the Internet connection, right-click My Computer and select Sharing. Select the Enable Internet Connection Sharing For This Connection checkbox from the Sharing tab of the dial-up connection's Properties sheet. Physically connect the modem to the computer. Open the Network And Dial-Up Connections window and double-click Make New Connection to create a dial-up connection to the Internet.

b. Open the Network And Dial-Up Connections window and double-click Make New Connection to create a dial-up connection to the Internet. Open the dial-up connection's Properties sheet. Select the Enable Internet Connection Sharing For This Connection checkbox from the Sharing tab of the dial-up connection's Properties sheet.b

c. Go to Control Panel, double-click Phone And Modem Options. Click Modems, select the modem you want to share, and click Properties. Click the Advanced tab and then click the Share This Device option. Open the Network And Dial-Up Connections window and double-click Make New Connection to create a dial-up connection to the Internet.

d. Open the Network And Dial-Up Connections window and double-click Make New Connection to create a dial-up connection to the Internet. Go to Start/Programs/Administrative Tools and select Routing And Remote Access. Configure the shared Internet connection from the Routing And Remote Access Service (RRAS) MMC snap-in.

17/ You are the network administrator of Technology Solutions Inc. having a network of 100 computers running Windows 2000 Professional. Peter is the finance manager in the company. He saves all his confidential and important documents in a folder called Financial Data. Peter asks you to maximize the security of the folder, Financial Data, so that no other users can access this folder. Peter also wants to be able to access this folder from any other computer on the network. How will you secure the Financial Data folder?

a. Install the signing certificate on the computer that Peter uses.

b. Create a mandatory user profile for Peter and enable file encryption of the Financial Data folder.

c. Create a roaming user profile for Peter and enable file encryption of the Financial Data folder.c

d. Add the cipher /e /s *.* to the start up script of Peter's computer.

18/ Your company has recruited an assistant database administrator to help you to manage SQL 2000 Servers. You have already created an account for him. You want to delegate management of linked servers to the new user. Which of the following roles will you assign to him for the required permissions? (Choose the best answer)

a. Assign him to sysadmin.

b. Assign him to serveradmin.

c. Assign him to processadmin.

d. Assign him to setupadmin.d

19/ You try to create four databases and name them as INSERT, DELETE, BACKUP, and REMOVE, respectively. However, you do not succeed in doing this. Which of the following name can you use to name a database?

a. INSERT

b. DELETE

d. REMOVE remove

c. BACKUP

20/ As an administrator, you need to troubleshoot the SQL Server 2000 events. To do this, you want to search for trace files and templates using wildcards. What file extensions will you specify for the search?

a. *.TRC and *.TDFa

b. *.TRC and *.TMP

c. *.TMP and *.TDF

d. *.TDF and *.DAT

21/ You don't want to view various sites, such as sites related to pornography and violence on your computer. Which Internet options settings enable you to do this?

a. Selecting the Security options present on the Advanced tab.

b. Selecting the Restricted sites option on the Security tab.

c. Moving the Private settings slider for the Internet zone to high.

d. Using the Content tab to enable the Content advisor.d

22/ Your company has a large database with billions of records. Two analysts, who generate reports and do rapid calculations based on this data, are the only users. Which SQL Server 2000 licensing mode will suite your requirements?

a. Per-processor license.

b. Any of the licensing mode.

c. Per-seat license.c

d. Both the licensing modes need to be selected.

23/ You install a new plug-and-play internal modem on your Windows 2000 Professional computer. The Windows 2000 Professional operating system does not detect it. As a result, the driver of the modem is not being installed. How can you install the driver?

a. Use the Add New Hardware utility.

b. Use the Display Properties dialog box.

c. Use the Add/Remove Hardware wizard.c

d. Install only Plug-and-Play hardware on Windows 2000 Professional.

24/ You are the administrator of a company named Firmware Corporation. One of the users shuts down his computer and when he starts it, the computer does not boot up. You suspect that the file system boot sector is corrupted. How can you resolve this problem?

a. Use recovery console to fix the MBR.

b. Reboot the system again, it will automatically correct the problem.

c. Use the F8 option at start up and select Last Known Good Configuration.c

d. Use the Emergency Repair Disk to repair the problem.

25/ A company deploys Windows 2000 Professional for its three departments: logistics, marketing, and finance. Additional processors are added to the workstations of the finance department because of a sudden requirement. However, a certain processor has not been recognized by a workstation. Identify the preferred mode to enable this processor.

a. Enable the second processor through a registry setting.

b. No preferred mode, the processor is already enabled.

c. Reinstall Windows 2000 Professional on the workstation.

d. Update the driver through the System applet in Control Panel.d

26/ You are the network administrator of a small organization having 70 computers on the network. You need to assign IP addresses to all the computers on the network. What IP address class will you use to assign IP addresses to all the client computers on the network?

a. Class A.

b. Class B.

c. Class C.c

d. Class D.

27/ Consider the following statements:

Statement A: RAID-5 is also known as Stripe set with parity because data is striped across an array of three or more hard disks in RAID-5 volumes.

Statement B: RAID-5 is also known as Stripe set with parity because data parity is striped across the disk array in RAID-5 volumes.

Which of the following alternatives is true, with respect to the above statements?

a. Both Statement A and Statement B are false.

b. Both Statement A and Statement B are true.b

c. Satement A is true and Statement B is false.

d. Statement A is false and Statement B is true.

28/ You have attempted installing Windows 2000 Professional on 11 computers in the network successfully. While installing the operating system on the next machine, you encounter installation problems. You have a clear understanding on the installation process. Therefore, you know the actions that are performed during installation process. To troubleshoot installation problem, you want to know why the installation process was not successful. Identify the log file that enables you to do that.

a. setupact.log.

b. setuperr.log.b

c. setuperror.log.

d. setupaction.log.

29/ Identify the file system to which you should configure the boot partition when you need to boot Windows 95 and Windows 2000 on your workstation. In addition, you want all files to be accessible from both operating systems.

a. DOS.

b. FAT.b

c. FAT 32.

d. NTFS.

30/ Tom is the administrator of a SQL Server 2000 database. Tom configures a set of alerts on the server to notify him whenever certain operations fail or encounter errors. The notifications are sent to his Microsoft Windows 2000 Professional computer by using the net send command. He successfully tests the alerts. After several days, however, Tom stops receiving notifications when operations fail or encounter an error. Tom verifies that the service is started. What should Tom do to make sure that he continues to receive alert notifications?

a. Stop and restart the SQLServerAgent service.

b. Clear the application log on the SQL Server computer.b

c. Clear the application log on the Windows 2000 Professional computer.

d. Install the SQL Server 2000 administrative tools on your Windows 2000 Professional computer.

31/ You are the administrator of a Windows 2000 Professional computer. A user Mary has administrative rights on the computer. Some users report that Mary has modified their files on the computer without their permission. You want Mary to be able to install programs, perform backups, and manage printers, but you do not want her to view and modify files, permissions for which have not been granted. What can you do to achieve the above by applying least administrative effort?

a. Let Mary be the local administrator and limit her rights using a local policy.

b. Let Mary be the local administrator and change the NTFS permissions on other files to deny Mary from viewing or modifying them.

c. Remove Mary's administrative rights. Add her to the Power Users group and Backup Operators group.c

d. Remove Mary's administrative rights. Add her to the Power Users group and grant her NTFS permission to the files she will need to back up.

32/ You are working as a network administrator at TSE Inc. Susan Redcliffe, a user complains that one of the applications is not responding on her computer. You decide to check the performance of her computer to solve the problem. How would you do this?

a. Use the System Log option of the Event Viewer utility.

b. Use the Security Log option of the Event Viewer utility.

c. Use the Application Log option of the Event Viewer utility.c

d. Use the System Tool option of the Computer Management window.

33/ You work as a help desk employee in a small firm. One user comes up with a problem that during startup, his Windows 2000 Professional computer proceeds directly to the desktop without first prompting for a username and password. You need to ensure that the system prompts for a username and password before proceeding to the desktop. What should you do?

a. Disable the 'disable CTRL+ALT+DEL' setting in the local security settings.a

b. Add the user to the local Administrator group and restart the computer.

c. In the Control Panel, modify the startup and recovery settings in the System option.

d. In the Control Panel, add the appropriate user accounts to the Users and Passwords setting.

34/ You are the administrator of computers with SQL Server 2000 installed on them. You have configured multi server jobs. Which statement is true for multi-server jobs?

a. One master server can be associated with only one target server.

b. One master server can be associated with one or more target servers.b

c. The target server is responsible for distributing jobs to the master server.

d. The target server defines and manages the schedules for all the jobs on the master server.

35/ You, as a database administrator at Abel Inc., perform a recovery operation on a SQL Server 2000 database. The server returns error 1105. While diagnosing the above problem, you find that a database has been marked suspect. Which of the following system database will store this information?

a. Sysmessages.

b. sysdevices.b

c. sysdatabases.

d. Sysfiles.

36/ Which of the following is true about trusted connection between SQL Server and it's clients?

a. Only Windows authenticated users can have a trusted connection.a

b. All Mixed mode authenticated users have trusted connection.

c. All SQL Server authenticated users have trusted connection.

d. Between SQL Server and client, trusted connection cannot be established.

37/ You are the network administrator of a LAN consisting of a NetWare server and 25 Windows 2000 Professional computers. The NetWare server is configured as the file server. You need to enable Windows 2000 Professional computers to access the resources on the NetWare server. You also need to install a shared network printer on a Windows 2000 Professional computer on your network. What protocol or protocols do you need to install on each of the client computers on the network to connect to the NetWare server and access the print server?

a. Only NWLink.

b. Only TCP/IP.

c. DLC and NWLink.

d. TCP/IP and NWLink.d

38/ Brad is the network administrator for Deias, Inc. He wants to configure the user computers running Windows 2000 Professional on his network to run virus scans daily. At the same time, he also wants that the virus scans should not interrupt or hinder any user's work. How should he accomplish this most effectively?

a. Use Task Scheduler to configure the virus scan task to run daily. Send the task to all users.

b. Use login scripts to specify the task of running virus scan at the time of log off every day on every user's computer.b

c. Set a reminder task in your email with occurrence set to daily so that notifications are sent daily to all he users just before the users leave office.

d. Use Administrative Templates to configure virus scan to run daily and distribute this task to all the users.

39/ You, as a SQL Server 2000 database administrator, are responsible for ensuring data consistency and securing data modification in a multi-user environment. You want to lock 64 KB of data at a time whenever a page lock is implemented. Which granularity level will you use considering that the data is available to many users at any given time?

a. Page.

b. DB.

c. Extent.c

d. Table.

40/ Which of the following DTS tool is used for building DTS packages, and for importing, exporting, and transforming data?

a. DTS Import/Export Wizard.

b. DTS Designer.b

c. DTS Object Transfer.

d. DTS Bulk Insert.

Bạn đang đọc truyện trên: AzTruyen.Top

Tags: #bao