



  
 
name = Eds 1000 - The ultimate dump
exam = 70-028

That's my MCSE ! This exam was so easy ! 1000/1000 for me ! This dump is what I used so you can see how good it is. It's a collection of all the other braindumps - Navlig, Consolidated, Tony, Zahoor, etc. - and I've corrected it where necessary and formatted it for Trandumper. Respect to the guys who did the very original dumps, where they get the questions from is amazing !

Onto 70-029 for my MCDBA !


1. You need to provide access to the Sales database for Internet users who 
do not have Windows NT accounts. How can you provide access? (Choose all 
that apply.) 

A. Add a guest user account to the Sales database, and grant the guest 
user account the appropriate permissions in the Sales database. 
B. Create a SQL Server login for Internet guest access. 
C. Add the Windows NT Domain Users account to the SQL Server public role 
in the Sales database.
D. Grant the Windows NT Guest account access to SQL Server. 

Answer: A, B 

ZAHOOR SAYS Application developers and database users may prefer SQL 
Server Authentication because they are familiar with the login and 
password functionality. SQL Server Authentication is also required for 
connections with internet and clients other than Windows NT clients. The 
assumption is that anyone connecting via the Internet is "NOT" via NT 
Authentication. They could, but in most cases, this is not the case. The 
easiest and best way is to use SQL Logins. Usually, someone coming in via 
the Internet is going to be using the "Anonymous" Internet Account, which 
is basically the IIS guest account. 


2. The trace you currently use is saved. You want to use similar traces 
frequently. How must you edit the saved trace you currently use to include 
additional events? 

A. Import the trace in SQL Server Profiler, and edit the event classes. 
B. Open the trace file, and edit the event classes. 
C. Open the trace definition, and edit the event classes. 
D. Edit the saved registry settings for the trace. 

Answer: C 

To add or remove events from a trace: On the File menu, click 
Open, and then click Trace Definition. In Trace Name on the General tab, 
select a trace. In the Trace Properties dialog box, click the Events tab. 
In the Available events list, expand an event group and click an 
individual event, or click the entire event group. Click Add to add the 
selected event or event group to the events that will be traced. 


3. The size of your database has increased significantly, and you want to 
examine performance statistics on specific database objects. The original 
SQL Server trace file was saved in a table. How should you replay the 
trace one step at a time? 

A. Query the trace table for the event classes, and create a trace 
definition file that uses those events. 
B. In SQL Server Profiler, open the trace table, save it to a file, and 
replay the trace one step at a time. 
C. In SQL Server Profiler, open the trace table, and replay the trace one 
step at a time. 
D. In SQL Server Profiler, import the trace definition, and replay the 
trace one step at a time. 

Answer: C 


4. Maria is a member of the Windows NT HumanResource group. You need to 
deny database access to the HumanResource group, but you need to ensure 
that Maria has more than guest access. You deny database access to the 
HumanResource group by adding the group to the db_denydatareader and 
db_denydatawriter roles. What must you do to give Maria the access she had 
before the HumanResource group was denied access? 

A. Ensure that you add Maria's database access after you deny access to 
the HumanResource group. 
B. Add Maria as a user with a SQL Server login under Mixed Mode. 
C. Remove Maria from the HumanResource group, and add her as a user. 
D. Maria already has database access as a member of the guest user account 
and the public role. 

Answer: C 


5. As the database owner, you grant Franz permissions to create views and 
create stored procedures in the Finance database. Franz creates a stored 
procedure that does an update on the dbo.Prices table. He creates a view 
that selects price information for a report. He grants Suzanne SELECT 
permissions on the view and EXECUTE permissions on the stored procedure. 
What must be done so that Suzanne can obtain the results by using the view 
and stored procedure? 

A. You must grant Suzanne SELECT permissions on the view and the stored 
procedure. 
B. Franz must grant Suzanne SELECT permissions on the Prices table. 
C. You must grant Suzanne SELECT and UPDATE permissions on the Prices 
table. 
D. Franz must grant Suzanne EXECUTE permissions on the stored procedure 
and SELECT permissions on the Prices table. 

Answer: C 


ZAHOOR SAYS This is because the ownership chain was broken. When the 
chain is broken, then object permissions are checked for each item in the 
view where the ownership chain broke. This is a case of broken ownership 
chains. SQL security whitepages : "A broken ownership chain is when an 
object does not have the same owner as its underlying objects. Franz has 
already given her permission to use his view, but DBO must still give her 
permission to use his/her table. 'A' is incorrect as the DBO can not give 
permissions to another persons view. 


6. Maria preceded you as administrator for Microsoft Windows NT Server and 
SQL Server. Maria created SQL Server logins and passwords matching users' 
Windows NT accounts. When users log in to the Windows NT Server domain, 
they obtain access to SQL Server. Which permissions do users receive when 
they access SQL Server by using a trusted connection? 

A. only the same permissions as those that are granted to their SQL Server 
login 
B. only the same permissions as those that are granted to their Windows NT 
account 
C. the cumulative permissions that are granted to their SQL Server login 
and their Windows NT account 
D. only the permissions that are granted in common to their SQL Server 
login and their Windows NT account 

Answer: B 


7. To increase security, your company decides to prohibit Windows NT 
administrators from accessing SQL Server administrative functions. What 
should you do to prohibit access? 

A. Deny access to the Windows NT Administrators group. 
B. Rename the current Windows NT Administrators group, and create an empty 
Windows NT Administrators group. 
C. Remove the Windows NT Administrators group from the sysadmin role in 
SQL Server. 
D. Install SQL Server on a member server instead of on a domain 
controller. 

Answer: C 



8. You need to set up secure database access for two applications. The 
applications are named Payroll and Sales. There are two types of users in 
the Payroll application, those who can modify data and those who can only 
query on existing data. There is only one type of user in the Sales 
application, those who can both modify and query on existing data. What 
should you do to set up the security access to the database? 

A. Create a single application role. Grant permissions on the role for 
each type of access for the Payroll application. Grant permissions on the 
role for the single type of access for the Sales application. 
B. Create one application role for each application. Grant permissions on 
each role with different passwords. 
C. Create two application roles for the Payroll application, and grant 
permissions on each role for each type of access. Create one application 
role for the Sales application, and grant permissions on the role for the 
single type of access. 
D. Create two application roles for the Payroll application, and grant 
permissions on each role for each type of access. Create one application 
role for the Sales application, and grant all users of the Sales 
application the same permissions. 

Answer: C 



9. You plan to give users in the Windows NT Sales group limited access to 
the Sales and Inventory databases. All access for data modifications and 
reporting will be through a Microsoft Excel application. How should you 
set up access for the Sales group in both databases? 

A. Create a single application role. Grant the Sales group permissions on 
that role in each database. 
B. Create an application role for each database. Grant the Sales group 
permissions in each database. 
C. Create an application role for each database, and grant permissions on 
each role. 
D. Create a single application role, and grant it permissions in each 
database. 

Answer: C 


10. Your insurance company is purchased by Duluth Mutual Life. The new 
management wants a copy of your 120-GB Policy database. Your current 
procedure is to back up the Policy database nightly to a media set of two 
device families, named PolicyBackup1 and PolicyBackup2. Each device family 
contains three tapes. The server at Duluth Mutual Life is named Server1. 
There is adequate disk space on Server1 to store the database, but there 
is only one local tape drive. What should you do to restore the Policy 
backup to Server1 with minimal administrative workload? 

A. Make a separate backup device, specifying only one of your tape drives. 

B. Restore the tapes from the PolicyBackup1 and PolicyBackup2 media 
families by using the single tape drive on Server1. Load the tapes in 
order of sequence number. 
C. Detach the Policy database from your server, and attach the database to 
Server1 
D. Restore the tapes from the PolicyBackup1 and PolicyBackup2 media 
families to Server1 by executing the RESTORE VERIFYONLY statement with the 
UNLOAD option. 

Answer: B 


11. You are reviewing a new snapshot replication environment for five 
large tables. In order to free up disk space, you want to delete the data 
objects that are generated by snapshot replication. Where can you find 
these objects? 

A. in the msrepl_commands table in the Distribution database 
B. in the sysarticles table in the database that is being published 
C. in the Mssql7\Repldata directory on the Distributor 
D. in the Mssql7\Repldata directory on the Subscriber 
E. in the msdb database 

Answer: C 


12. To support a new transaction, you create an index on the largest table 
in the Sales database. It takes you two hours to create the index. You 
want to ensure the fastest possible reconstruction of the index in the 
event of a database failure. What should you do immediately after creating 
the index? 

A. Perform a transaction log backup of the Sales database. 
B. Perform a full database backup of the Sales database. 
C. Perform a differential database backup of the Sales database. 
D. Perform a full database backup of the master database. 

Answer: B 


13. You implement 10 scheduled jobs on your development server, and you 
verify that they function correctly. You now want to transfer the jobs to 
your production server. How should you transfer the jobs with the fewest 
administrative steps? 

A. Script the jobs, and execute the resulting script on the production 
server. 
B. Back up the msdb database and restore it onto the production server. 
C. Make the test server a master server, and make the production server a 
target server. Configure the jobs to run on the target server. 
D. Manually re-create the jobs on the production server. 

Answer: A 


14. You are estimating disk space requirements for a new database. The 
main table has approximately 100,000 rows, and each row contains an 
average of 5,000 bytes. How much disk space will the data portion of this 
table require? 

A. 5 GB 
B. 100MB 
C. 500 MB 
D. 800 MB 

Answer: D 

8096 (bytes per page) / 5000 (bytes per row) = 1.6192 = 1 
(rows per page - you must round DOWN to the nearest whole number) 100,000 
(total rows) /1 (rows per page) = 100,000 (Total Number of pages) 100,000 
(Total Number of pages) *8K (bytes per page) = 800,000K = 800mb (size of 
db) because one row cannot expand across pages 


15. You install transactional replication on the Manufacturing server and 
make several publications available. The Accounting department subscribes 
to one of the publications, but Accounting users need data from only the 
WorkSchedule article. What is the easiest way to provide only this data 
for them? 

A. Create a subscription directly to the WorkSchedule article on the 
Accounting server. 
B. Create a filter on the publication so that only the WorkSchedule 
article can be subscribed to. Implement a push subscription to the 
Accounting server. 
C. Create a filter on the publication so that only the WorkSchedule 
article can be subscribed to. Implement a pull subscription on the 
Accounting server. 
D. Create a new publication containing only the WorkSchedule table. 

Answer: D 


16. You plan to add 100,000 rows of new data to your main database table 
over the next few weeks. The table currently contains 50,000 rows. It 
contains three columns of int data type and one column of the nchar(20) 
data type, and no columns allow null values. A maximum of 144 rows can fit 
on a data page. You want the data update processes to run as fast as 
possible. You decide to re-create the indexes on the table and to use a 
different fill factor. To what value should you set the fill factor? 

A. default value 
B. 30 percent 
C. 70 percent 
D. 100 percent 

Answer: B 


17. Your database is replicated among four servers. You want to schedule 
database consistency checks and full database backups of all four copies 
of the database. You also want to minimize your administrative Workload. 
Server configurations are shown in the following table. 

Server name - Operating system - SQL Server version 
SQL7NT1 Windows NT Server 7.0 
SQL7NT2 Windows NT Server 7.0 
SOL65NT1 Windows NT Server 6.5 
SQL65NT2 Windows NT Server 6.5 
How should you implement scheduled checks and backups of all four copies 
of the database so that administrative workload will be minimized? 

A. Separately implement scheduled database checks and backups on each of 
the four servers. 
B. Create a job on SQL7NT1 to check and back up the database. Script the 
job on SQL7NT1. Execute the script on the other servers to install the 
scheduled checks and backups. 
C. Make SQL7NT1 a master server. Enlist SQL7NT2 as a target server. Create 
a job on the master server to check and back up the database on both SQL 
Server 7.0 servers. Script the job on SQL7NT1. Execute the script on the 
version 6.5 servers to install the scheduled checks and backups. 
D. Make SQL7NT1 a master server. Enlist SQL7NT2 as a target server. Create 
a job on the master server to check and back up the database on both SQL 
Server 7.0 servers. Separately implement scheduled database checks and 
backups on the other two servers. 

Answer: D 


18. You administer a 30-GB database that experiences moderate update 
activity. Full database backups occur every Sunday at 1 A.M., and 
differential database backups occur at 1 A.M, every day except Sunday. In 
addition, transaction log backups occur hourly at 45 minutes past the 
hour. Your database fails on a Saturday afternoon. Which set of steps must 
you take to restore your data? 

A. Restore the full database backup from Sunday. Restore the differential 
database backup from Saturday. Restore the transaction logs from 12:45 
A.M. Saturday to the time of failure. 
B. Restore the differential database backup from Saturday. Restore the 
transaction logs from 1:45 A.M. Saturday to the time of failure. 
C. Restore the full database backup from Sunday. Restore the differential 
database backup from Saturday. Restore the transaction logs from 1:45 A.M. 
Saturday to the time of failure. 
D. Restore the full database backup from Sunday. Restore the differential 
database backups from Monday through Saturday. Restore the transaction 
logs from 1:45 A.M. Saturday to the time of failure. 

Answer: C 


19. You want to examine the master database file settings in SQL Server 
Enterprise Manager, but the master 
database is not listed in the Databases folder. You want to set the option 
to make the master database visible. Where can you set this option? 

A. in the master database 
B. in the server configuration 
C. in the registry 
D. in the Enterprise Manager registration 

Answer: D 


20. Your server is running SQL Server 4.21 on Microsoft Windows NT Server 
3.51. You plan to upgrade this server to SQL Server 7.0. Which two steps 
must you take prior to the upgrade? (Choose two.) 

A. Install the most recent SQL Server 4.21 service pack. 
B. Upgrade SQL Server to version 6.5. 
C. Install the most recent Windows NT Server 3.51 service pack. 
D. Upgrade Windows NT Server to version 4.0. 
E. Back up your databases in SQL Server 4.21. 
F. Export the data from your SQL Server 4.21 database tables, and script 
your database objects. 

Answer: B, D 


21. You implement full-text indexing on 10 tables in your production 
database. You want to maintain the accuracy and performance of the 
full-text indexes, and you want to minimize overhead associated with their 
maintenance. What should you do? 

A. Expand the database to accommodate future growth of the full-text 
indexes. 
B. Back up the full-text indexes. 
C. Schedule regular repopulations of the full-text indexes. 
D. Schedule regular rebuilds of the full-text indexes. 
E. Create triggers to automatically repopulate the corresponding full-text 
indexes whenever data modifications occur. 

Answer: C 

Tables that can be updated should have their full-text indexes 
repopulated at appropriate intervals. This repopulation can be 
time-consuming and resource intensive; therefore, it is an asynchronous 
process that is usually run in the background during periods of low 
database activity. Tables with the same update characteristics (such as 
small number of changes versus large number of changes; or tables that 
change frequently during a particular time of day) should be grouped 
together and assigned to the same full-text catalog. This allows full-text 
catalog population schedules to be set up in a manner that will allow the 
full-text indexes to stay synchronous with the tables without adversely 
affecting the resource usage of the database server during periods of high 
database activity. 


22. You are relocating a computer running SQL Server to a different 
region, and you want to change the Unicode collation. What must you do? 

A. Run the SQL Server Setup program. 
B. Back up your databases. Run the rebuildm.exe utility. Restore your 
databases. 
C. Script your database objects, and export your data to files. Run 
regrebld.exe. Re-create your database objects, and reload the data. 
D. Script your database objects, and export your data to files. Run 
rebuildm.exe. Re-create your database objects, and reload the data. 

Answer: D 


23. You define full-text indexing on the ProductName column in the 
Products table. You then execute a full-text query on the column. You 
specify a word that you know is present in the column, but the result set 
is empty. What is the most likely cause? 
A. The catalog is not populated. 
B. You did not create a unique SQL Server index on the ProductName column. 

C. The Microsoft Search service is not running. 
D. The SQLServerAgent service is not running. 

Answer: A 


24. A departmental server has full-text search implemented on its SQL 
Server database. Currently, both the full-text catalogs and the database 
data files reside on the same logical drive. You do not want the full-text 
indexing to use more than 25 percent of the available drive space, because 
you want to allow space for dynamic expansion of the data files. You want 
to be able to remotely monitor the amount of space being used by the 
catalogs. How should you remotely monitor the space usage with a minimum 
number of additional administrative steps? 

A. Use Windows NT Performance Monitor to connect to the server and to 
monitor the size of the Microsoft Search catalog. 
B. Create a scheduled job to regularly monitor the size of the full-text 
indexes and send the results to your e-mail address. C. Create a batch 
file to monitor the size of the full-text indexes and send the results to 
you via a network message. Use the Windows NT Schedule service to schedule 
the batch file to run regularly. 
D. Create a batch file to monitor the size of the full-text indexes and 
send the results to you via a network message. Create a scheduled job to 
run the batch file regularly. 

Answer: A 


25. The default options were used when Microsoft Windows NT Server was 
installed onto 10 computers. You are planning unattended installations of 
SQL Server onto these 10 servers, and you want to avoid unnecessary 
modifications to the servers. 
The SQL Server databases will be accessed by Microsoft Windows 95 client 
computers and by NetWare client computers. What must you first install on 
the 10 Windows NT Server computers? (Choose all that apply.) 

A. Windows NT 4.0 Service Pack 4 or later 
B. Windows NT Option Pack 
C. NWLink IPX/SPX 
D. Gateway Services for NetWare 
E. Microsoft Internet Explorer 4.01 with Service Pack 1 or later 
F. TCP/IP 

Answer: A, C, E 


26. You place the distribution database on the Publisher for replication. 
You then decide to use the distribution database that is located on a 
remote server. What must you do to enable your publications to use the 
distribution database that is on the remote server? 

A. Using SQL Server Enterprise Manager, drag the publications to the 
distribution database on the remote server. 
B. Disable the current Publisher, and enable a new Publisher to use the 
distribution database on the remote server. Re-create all publications and 
subscriptions. 
C. Configure the current Publisher to use the distribution database on the 
remote server 
D. Back up the current distribution database, and restore the backup to 
the distribution database on the remote server. 

Answer: B 

You perform several operations at the Distributor:  Disable 
the Publisher. This automatically deletes all publications, articles, and 
subscriptions that are dependent on the Publisher.  Remove the Publisher 
from the distribution database.  Enable the publishing server as a new 
Publisher with a different distribution database. These operations must be 
performed at the Publisher:  Create the publications and articles to be 
published on the publishing server.  Enable the Subscribers that can 
receive data from the Publisher You place the distribution database on the 
publication for replication.To change a distrib database or to change from 
a publication, the publication must first be removed and a new publication 
must be made. 


27. Your domain has two SQL Server computers named SQL1 and SQL2. Two 
related databases are on SQL1 and SQL2. You have standard logins on both 
servers. You are able to connect to both databases on both servers, and 
you are able to execute queries on both databases on both servers. You are 
attempting to execute a distributed query that joins data on SQL2 to data 
on SQL1. On SQL1, you add SQL2 as a linked server. However, when you try 
to execute the distributed query on SQL1, you receive a message that your 
login failed. What is the most likely cause of the problem? 

A. You did not execute the query on SQL2. 
B. You did not map your login on SQL1 to your login on SQL2. 
C. You did not use a Windows NT login for the distributed query. 
D. You did not establish a direct connection to SQL2, so you are not 
authenticated for the distributed query. 

Answer: B 


28. You are responsible for backups on the Sales database, The Order and 
Customer tables are in the Sales database. The following events occur 

-8:00 P.M. Full database backup of the Sales database starts 
-8:10 P.M. User begins a transaction. User inserts Order 53 for Customer 
10 into the Order table. The name for Customer 10 is Laura Jennings 
-8:11 P M. Backup of the Sales database is completed 
-8:12 P.M. User updates the name for Customer 10 in the Customer table to 
Amy Jones. User commits transaction 
-8:30 P.M. Sales database becomes corrupted due to media failure 
-8:40 P.M. The backup of the Sales database from HO P.M. is restored to 
the Sales database You query the Customer and Order tables in the restored 
Sales database. 

What is the state of the data? 

A. Order 53 exists in the Order table. The name for Customer 10 in the 
Customer table is Laura Jennings. 
B. Order 53 exists in the Order table. The name for Customer 10 in the 
Customer table is Amy Jones. 
C. Order 53 does not exist in the Order table. The name for Customer 10 in 
the Customer table is Laura Jennings. 
D. Order 53 does not exist in the Order table. The name for Customer 10 in 
the Customer table is Amy Jones. 

Answer: C


29. A user who has a SQL Server login forgot his password. How should you 
restore his ability to connect to SQL Server? 

A. Drop and re-create both his Windows NT account and his SQL Server login 
with a new password. 
B. Drop and re-create only his SQL Server login with a new password. 
C. Change his account password in Windows NT User Manager. 
D. Change the password in the SQL Server Login properties dialog box in the Enterprise Manager. 

Answer: D 


30. You are attempting to use the bcp utility to copy data from the 
#tmpcust temporary table to the tmpcust.txt file. The name of the server 
is Svr and the password is Pss0 . You type the following instruction at 
the command line: 

bcp tempdb. . #tmpcust out tmpcust. txt -n - SSvr -Usa Pss0 

Your command fails. What is the most likely cause of the failure? 

A. Temporary tables must be global in order to be copied by using the bcp 
utility. 
B. Temporary tables cannot be copied by using the bcp utility. 
C. The tmpcust.txt file has not been created. 
D. You used native format instead of character format. 

Answer: A 


31. You create a scheduled job to back up a SQL Server database to disk 
and to copy the resulting file to a network server. Your SQL Server login 
is a member of the serveradmin role, and the job is owned by your login. 
The backups are being executed successfully, but the file copy operations 
are not. When you log on to the server running SQL Server, you can easily 
copy the files to the network server and back up directly to the network 
server. What is the most likely cause of the problem? 

A. The SQL Server account does not have access to the network server. 
B. The SOLServerAgent service account does not have access to the network 
server. 
C. The SOLAgentCmdExec account does not have access to the network server. 

D. The network server does not support the Net-Library that is used by the 
server running SQL Server. 

Answer: C 


32. In SQL Server Enterprise Manager, you modified the server properties 
so that SQL Server starts with the -f startup option. Now, when SQL Server 
starts, no users can connect, and you cannot use Enterprise Manager to 
reset the startup option because Enterprise Manager cannot connect. What 
should you do? 

A. Reinstall SQL Server. 
B. Reset the server by running regrebld.exe. 
C. Reset the server by running rebuildm.exe. 
D. Manually delete the appropriate MSSQLServer key value in the registry. 

Answer: D 

Zahoor says B -f is minimal configuration, and would be used to start 
msSQLserver from the command prompt. If you can't get it up as minimal, 
then restore registry, and if that fails, then last resort would be a 
reinstall. Not mentioned as a solution, but be aware that the 
SQLServerAgent could be causing the problem, as seen in another question. 



33. You are unable to establish a trusted connection to SQL Server, which 
is running on a Microsoft Windows 98 computer. What is the most likely 
cause of the problem? 

A. You are using a Net-Library that does not support trusted connections. 
B. You did not provide a login ID. 
C. Your Windows NT domain user account does not have server access. 
D. Windows 98 does not support trusted connections. 

Answer: D 


34. The transaction log in a published database is full. You attempt to 
truncate the log, but you notice that the log remains full. What is the 
most likely cause? 

A. The MSrepl_commands table in the distribution database is full. 
B. The Distribution Agent has stopped. 
C. The Log Reader Agent has stopped. 
D. A subscribing database has become unavailable. 

Answer: C 


35. The Microsoft Windows NT Server operating system running SQL Server 
fails with a blue screen error after a new tape drive adapter is 
installed. You suspect a hardware resource conflict. and you reinstall 
Windows NT Server. Now SQL Server will not start. You want to restore SQL 
Server functionality as quickly as possible, and you want to minimize the 
possibility of data loss. What should you do? 

A. Reinstall SQL Server, and restore your databases from the most recent 
backups. 
B. Run regrebld.exe. 
C. Restore the most recent registry backup. 
D. Run setupsql.exe and use parameters that will rebuild the registry 
settings for SQL Server. 

Answer: B 

If you run the regrebld utility without any parameters, it 
restores the registry entries, as with the -Restore option, and re-creates 
the SQL Server services. SQL Server Setup runs regrebld -Backup at the end 
of the installation process to create an initial backup. 



36. Your company's server running SQL Server is on the same BDC as the 
server running Microsoft Exchange Server. Exchange Server is performing 
poorly. The SQL Server set working set size option is at the settings you 
configured for the min server memory and max server memory options. What 
should you do to improve the performance of the server running Exchange 
Server while not adversely affecting SQL Server? 

A. Increase the memory allocated to the procedure cache option. 
B. Set the set working set size option to 1. 
C. Decrease the min server memory setting. 
D. Increase the min server memory setting. 

Answer: C 

2 Someone else says C

Zahoor says D

Simple memory tuning is required for SQL Server 7.0 in order 
to address a known memory issue. You must increase the minimum dynamic 
memory setting for SQL Server 7.0 from the default of zero to the value of 
32 megabytes due to the interaction between the memory models used by 
Exchange Server and SQL Server when installed on the same system. You can 
do this easily using the SQL Server Enterprise Manager. 


37. The server's response time has recently slowed as the result of a 
small number of very long-running queries. These are ad hoc queries that 
are poorly written. You need to prevent the queries from running for long 
periods of time. What must you do?

A. Set SQL Server Profiler to filter on query time. 
B. Set the query governor to stop long-running queries. 
C. Use Windows NT Performance Monitor to send an alert that will run a job 
to kill the process. 
D. Decrease the query wait setting. 

Answer: B 


38. Some of your front-end applications are receiving error 1205. The 
programmers invoked error handling to 
trap for this error, but the queries are very slow, and sometimes the 
application appears to stop responding. You want to find out which objects 
are causing the 1205 error message and whether the objects are degrading 
user response time. What should you monitor? 

A. In Windows NT Performance Monitor, log the SQLServer:Locks counter. 
B. In Windows NT Performance Monitor, log the SQLServer: Lock Requests/sec 
counter. 
C. In SQL Server Profiler, monitor the Lock:Acquired, Lock:Released, and 
Lock:Cancel events. 
D. In SQL Server Profiler, monitor the Lock:DeadLock, Lock:Deadlock Chain, 
and Lock:Timeout events. 

Answer: D 


39. You load a large amount of data to the Parts table in the Inventory 
database in four hours. What is the quickest way to ensure that statistics 
reflect these changes? 

A. Run the sp_updatestats stored procedure on the Inventory database. 
B. Run the sp_updatestats stored procedure on the Parts table. 
C. Run the UPDATE STATISTICS statement on the Parts table. 
D. Run the UPDATE STATISTICS statement on each index in the Parts table. 

Answer: C 


40. You suspect that most performance problems are caused by a small 
number of processor-intensive queries. To reduce the overhead caused by 
these queries, you first need to identify the specific queries that are 
causing the problem. What should you do to identify these queries? 

A. Use Transact-SQL extended stored procedures in the queries to record 
trace information on each query. 
B. Use Windows NT Performance Monitor to log the SQL Server:Access Methods 
object. 
C. Filter in SQL Server Profiler on the maximum milliseconds of CPU time 
to capture the appropriate queries. 
D. Filter in SQL Server Profiler on the minimum milliseconds of CPU time 
to capture the appropriate queries. 

Answer: D 


41. You are developing a security strategy for a new installation of SQL 
Server. You want to minimize the administration required for login 
accounts for SQL Server. What should you do? 

A. Use Windows NT Authentication. Add Windows NT accounts as SQL Server 
logins. 
B. Use Windows NT Authentication. Add Windows NT groups as SQL Server 
logins.
C. Use SQL Server Authentication. Add SQL Server logins for authorized 
users. 
D. Use SQL Server Authentication. Add Windows NT accounts as SQL Server 
logins. 

Answer: B 


42. Your company has five regional offices. Each office maintains their 
own accounting data. Corporate headquarters requires a centralized view of 
the data every two weeks for reporting purposes. You need to develop a 
replication scenario to support this requirement. Which SQL Server 
replication should you choose? 
A. transactional replication 
B. snapshot replication 
C. merge replication 
D. Immediate-updating Subscribers 

Answer: B 


43. A franchise operation that has many stores in the same city wants 
every store to have access to customer profiles from all the other stores. 
A store can update only its own customer profiles. The central office will 
occasionally update the customer profiles. The customer profile table 
needs to be local to the application for performance reasons. Which SQL 
Server replication scenario should you implement? 

A. a model that uses transactional replication and consists of a central 
Publisher with multiple Subscribers 
B. a model that uses snapshot replication and consists of a central 
Publisher with multiple Subscribers 
C. a model that uses transactional replication and consists of multiple 
Publishers with multiple Subscribers 
D. a model that uses merge replication and consists of multiple Publishers 
with multiple Subscribers 

Answer: D 


44. The applications at your company use SQL Server 6.5 with replication. 
Your company's replication topology is shown in the exhibit. You need to 
upgrade these servers to SQL Server 7.0. 

Publisher (SQL6.5;TOR01), Distributor (SQL6.5;TOR02), Subscriber(SQL6.5;TOR03) 

In which order should you upgrade the servers? 

A. TOR-01, TOR-02, TOR-03 
B. TOR-02, TOR-01, TOR-03 
C. TOR-03, TOR-02, TOR-01 
D. TOR-03, TOR-01, TOR-02 

Answer: B 
(the first server to be upgraded is the distribution server)

When upgrading enterprise servers involved in replication, you 
must upgrade the Distributor before upgrading any other servers. 
Microsoft(r) SQL Server(tm) version 7.0 replication is designed to support 
existing SQL Server 6.5 Publishers and Subscribers automatically, in 
addition to SQL Server 7.0 replication servers. You can phase in the 
conversion of the servers in your replication topology by upgrading the 
Distributor first and then upgrading other servers as time and resources 
permit. 

45. Southwest Financial Services uses Oracle for their HumanResources 
database. Woodgrove Bank uses SQL Server for their HumanResources 
database. The employee tables are defined in the following chart. 

Southwest Financial Services employee table (Oracle) 
emp_id - fname - Iname - address - city - state - zip_code

Woodgrove Bank employee table (SQL Server) 
emp_id - First_name - Last_name - Address_line1 - Address_Iine2 - city - 
state - zip code 

Woodgrove Bank purchases Southwest Financial Services. You need to combine 
the HumanResources databases of the two companies. What should you do to 
combine the rows from the Oracle employee table into the existing SQL 
Server employee table? 

A. Use the SQL statement INSERT INTO. 
B. Use the SQL statement SELECT INTO. 
C. Use the SQL statement BULK INSERT. 
D. Use the bcp utility. 

Answer: A 

Using the Data Transformation Services (DTS) Import and Export 
wizards or DTS Designer to create a DTS package that can be used to import 
or export data. *The DTS package can also transform data during the import 
or export process. *Using SQL Server replication to distribute data across 
an enterprise. *The replication technology in SQL Server allows you to 
make duplicate copies of your data, move those copies to different 
locations, and synchronize the data automatically so that all copies have 
the same data values. Replication can be implemented between databases on 
the same server or different servers connected by LANs, WANs, or the 
Internet. *Using the bcp command prompt utility to import and export data 
between SQL Server and a data file. *Using the BULK INSERT statement to 
import data from a data file to SQL Server. *Using the SELECT INTO 
statement to create a new table based on an existing table. It is possible 
to select data from an arbitrary OLE DB provider, allowing data to be 
copied from external data sources into SQL Server. *Using the INSERT 
statement to add data to an existing table. 


46. Your company purchases a new Pentium computer that has 256 MB of RAM 
and five 18.2-GB disk drives. The new computer will be used to support the 
Payroll application. The application requires the highest availability and 
performance possible. The Payroll database has been initially sized at 25 
GB. You need to organize the database files on the new computer. Which 
actions should you take? 

A. Create a hardware RAID 0 configuration that uses all the disk drives. 
Create the primary data file and a transaction log data file on the RAID 0 
set. 
B. Create a software RAID 5 configuration that uses all the disk drives. 
Create the primary data file and a transaction log data file on the RAID 5 
set. 
C. Create one mirrored set that uses drives D and E, Create another 
mirrored set that uses drives F and G, Create the primary data file on one 
of the mirrored sets, Create the transaction log file on the other 
mirrored set. 
D. Create a mirrored set that uses drives F and G, Create the transaction 
log file on the mirrored set. Create a hardware RAID 5 set that uses 
drives C, D, and E, Create the primary data file on the RAID 5 set. 

Answer: D 


47. The Claims database contains more than 50 million rows and requires 
100 GB of disk space. It uses five database files. Users in the Usage 
Analysis department use a variety of graphical query tools to query the 
Claims database every business day, between 8 A.M. and 4 P.M. There is a 
scheduled nightly batch job that runs at 2 A.M. to update the database 
with the previous day's claims. A full database backup or restore takes 
approximately six hours. You need to develop a backup strategy that can 
support recovery to the end of the previous business day and that can 
recover from a failure in less than 12 hours. Which set of backups should 
you choose? 

A. full database backup every Sunday differential database backups every 
night after the batch job is completed 
B. full database backup every Sunday transaction log backups every six 
hours 
C. full database backup every Sunday database file backup on a rotating 
basis throughout each week transaction log backups every six hours 
D. database file backup on a rotating basis throughout each week 
transaction log backups every six hours 

Answer: A 


48. You plan to implement a large batch job. You want to be able to 
restore the database quickly and easily in the event that the batch job 
fails. What should you do before running the batch job? 

A. Perform a differential database backup of the database. 
B. Perform a full database backup of the database. 
C. Perform a backup of the transaction log. 
D. Use a single transaction to perform the batch job. 

Answer: B 


ZAHOOR SAYS If the database is corrupted or destroyed during the job, the 
fastest recovery is just to restore the full backup. If you did a 
differential before, then first you have to do the Full Backup before, 
then that differential. Either way, you have to do the restore of the full 
backup. So why do any more? 


59. Stephen tries to connect to the Sales database by using SQL Server 
Enterprise Manager. He receives the message "Unable to open default 
database '' . You notice that neither Stephen nor the guest account was 
granted access to the Sales database. What must you do to give only 
Stephen access with the minimum permissions? 

A. Remove Stephen from the db_denydatareader and db_denydatawriter roles. 
B. Add Stephen's login as a new user in the Sales database. 
C. Change the default database in Stephen's Login properties dialog box. 
D. Add the guest account to the Sales database in the Database users 
dialog box. 

Answer: B 


50. You install merge replication. You are investigating the default 
conflict resolution. You verity that the value of the ContactName field is 
Carolyn Seeley for customer 10 in a merge article on both the Publisher 
and the Subscriber. The value of ContactName for customer 10 on the 
Publisher is changed to Amy Jones. The value of ContactName for customer 
10 on the Subscriber is changed to Jenny Sm. The Merge Agent runs. What is 
the value of CantactName for customer 10 on the Publisher and on the 
Subscriber after conflict resolution? 

A. Amy Jones on both the Publisher and the Subscriber 
B. Jenny Sax on both the Publisher and the Subscriber 
C. Amy Jones on the Publisher and Carolyn Seeley on the Subscriber
D. Jenny Sax on the Publisher and Amy Jones on the Subscriber 

Answer: A 


51. Your company's current applications use Microsoft Access. New 
applications will use SQL Server. The new applications must be able to 
access data from the Access database. What must you do so that SQL Server 
queries can access the Access database?

A. Register connection information for the Access database in SQL Server. 
B. Register connection information for SQL Server in the Access database. 
C. Establish a connection to the Access database when a query is executed. 

D. Use the same Microsoft Windows NT domain account for the Access 
database and SQL Server. 

Answer: A 


52. Your History database consists of two flies, History_data.mdf and 
History_log.ldf. History data has grown from its original size of 500 MB 
to 1GB. The database is not configured to automatically shrink. You delete 
data so that you now have free space of 800 MB in the History database. 
You want to reclaim 600 MB of the free database space. Which statement 
should you execute to reduce the physical size of the History_data file to 
the desired size? 

A. DBCC SHRINKFILE (History_data, 60) 
B. DBCC SHRINKFILE (History_data, 400) 
C. DBCC SHRINKDATABASE (History, 50) 
D. DBCC SHRINKDATABASE (History, 400) 
E. ALTER DATABASE History MODIFY FILE (NAME = History_data, SIZE = 200) 

Answer: B 



ZAHOOR

1.With an individual student, such as the current address,
a school address and addresses of significant relatives.
You also need to track significant events in a student's
life which might include attendance at a special training
session, medical treatment, a gratuation or a death in
the family. You want to accomplish the following goals:

*ensure that any kind of descriptor can be associated with student.
*Ensure that multiple Addresses can be associated with multiple Students, 
& that the Address usage can be reported.
*Ensure that any family Relationship with another Student can be reported.
*Ensure that all known Aliases for student can be reported.
*Ensure that Significant Events in a Student's life
can be reported. (Exhibit).Chose that all apply?

a) Any kind of descriptor can be associated with student.
b) Multiple addresses can be associated with multiple Students & the 
address usage can be reported.
c) Any family Relationship with other student can be reported.
d) All known Aliases for student can be reported.
e) Significant events in a Student's life can be reported.

Answer: C,D,E 

(not sure)

2.You're working on a data conversion effort for SALES database
You have successfully extracted all of existing Customer data into 
tab-delimited flat file. The new Customer is defined as follows:

CREATE TABLE Customer (Id int IDENTITY NOT NULL
Last Name Varchar (50) NOT NULL,
First Name Varchar (50) NOT NULL,
Phone Varchar (15) NOT NULL,
Email Varchar (255) NOT NULL)

You need to populate this new table with the Customer information that 
currently exists in a tab-delimited flat file with the following format:

NAME PHONE EMAIL
Adam Barr 555-555-1098 Adam@hotmail.com
Keren Berger 555-555-7668 Keren@Yahoo.com
Amy Jones 555-555-0192 Amy@netscape.net

How can you transfer data to accurately populate the Customer table?

a) Import the data by using bcp utility with the /E option to accommodate 
the column that has the INDENTITY Property.
b) Import the flat file, separate the NAME column into
FirstName & LastName columns by using a bcp format
file, & then import the data by using the bcp.
c) Import the data by using DTS with the Transform
Imformation as It is copied to the destination
option button selected.
d) Import the data by using DTS with Enable Identity Insert
check box selected.

ANSWER: C,D

3.Installing SQL on a network, there are Windows 95, NT Workstations and 
NETWARE clients. All must be able to connect. Choose all that apply: 
a) Create NT logons for Windows NT clients 
b) Create NT logons for Windows 95 clients 
c) Create NT logons for NETWARE clients 
d) Create SQL logons for Windows NT clients 
e) Create SQL logons for Windows 95 clients 
f) Create SQL logons for NETWARE clients 

Ans: A, B, D, E, F 

Someone else ABDEF

ZAHOOR SAYS It clear that Windows 95/98 installed as a server (Desktop 
Edition) does not support Named Pipes or NT Authentication. But, when a 
Windows 95/98 user logons to a NT Server as a Domain Logon, they have 
Logon Credentials and are authenticated via the NT Server. Microsoft's 
goal is to eliminate Non Authentication, and the only reason that Mixed 
Security is still there - besides backward compatibility - is for NETWARE 
and UNIX, Windows 95/98 is NOT an exception. There has been NO discussion 
on this one. It is quite clear and a pretty good concensous that B is the 
answer. The point is that in a pure Microsoft Environment - one that is 
exclusively Windows 95/98 and NT, the only mode that Microsoft would like 
to see you use is 1) The Domain Model, and 2) NT Authentication. This 
means that all Windows 95/98 machines use Domain accounts, and LOGON to a 
NT Domain Server, as well as all NT W/S using Domain Logons. A Windows 
95/98 or NT W/S ONLY requires a SQL Login when it is in "peer" mode, a.k.a 
running as a member of a Workgroup. The only other reason for SQL Logins 
(in other words, turning on Mixed Security) is for 1) Backward 
Compatibility, such as when Credentials are included in precanned stuff, 
like stored procedures, and 2) Non-Microsoft environments, such as Unix 
and Netware. 






6. Susan is the admin for an SQL Server and creates SQL Server logins. 
These logins have the same names and passwords like the Windows NT user 
accounts. When the users log on to SQL Server, what are their effective 
permissions?
a) Cumulative of NT and SQL
b) NT overrides SQL Server 
c) SQL Server overrides NT 
d) SQL only 

Answer: D 
ZAHOOR SAYS Only SQL accounts mentioned here not NT authentication. You 
can run NT and only use SQL authentication.



13. You want to increase security on the Finance Database so that only 
members of the FINANCE group can run and execute applications. You create 
a Test login that is not a member of the finance group but is able to 
query and get results "finance.costs."
a) Disable the guest login 
b) Deny permission for the Finance Db to all NT groups except the Finance 
users 

Answer: A 
ZAHOOR SAYS Access was allowed by the guest login. If you did B, you 
could only do it for all EXISTING NT Groups. The month AFTER you plug this 
hole, a new one could develop once a new group is created and woops! 
Forgot to exclude Finance! Kill the guest account. 

14. Eric needs to manage user accounts on the HumanResources database. 
Which minimum role can you apply to him: 
a) db_securityAdmin 
b) db_accessadmin 
c) db_owner 
d) securityadmin 
e) serveradmin 

Answer: B 
ZAHOOR SAYS 1.db_owner Performs the activities of all database roles, as 
well as other maintenance and configuration activities in the database. 
2.db_accessadmin adds or removes Windows NT groups, Windows NT users, and 
SQL Server users in the database. 3.db_securityadmin Manages roles and 
members of SQL Server database roles, and can manage statement and object 
permissions in the database. 

15. K and S have Win NT accounts but they are not members of 
administrators. They need to access the Marketing database. You want to 
identify actions of both. How? 
a) Create seperate SQL logins with dbo permission. 
b) Create seperate SQL logins and add logins to db_owner role in DB. 
c) Add Win NT accounts to db_owner role. 
d) Create SQL login account for K and add to dbo, add S's Win NT account 
to db_owner role in DB. 

Answer: C
ZAHOOR SAYS Windows NT security provides more features, such as secure 
validation and encryption of passwords, auditing, password expiration, 
minimum password length, and account lockout after multiple invalid login 
requests. Thus SQL logins do not allow auditing of user actions. 

14. Product group has access to DB. Carmen is member of the prod ct group. 
You want to deny product group access to DB but Carmen should receive more 
then guest access to this DB. How? 
a) Grant Carmen's account to DB after denying product group access to DB 
b) Create a new SQL-login for Carmen 
c) Remove Carmen from product group and grant her account access to the DB 

d) Do nothing, the public role and the guest account grants Carmen enough 
access 

Answer: C
ZAHOOR SAYS As long as Carmen is a member of the Product group, she will 
loose all access because the DENY implies "no access" which overrides all 
other permissions. There is no way of knowing if public role is adequate, 
because we don't know what permissions product group had in the first 
place, and the question already ruled out the guest account. 



16. You create a local group named SQL admin and add it to the sys admin 
role. You add your Windows NT account to SQL admin. Now, the SQL Server 
Agent service will not start and your scheduled jobs will not run. What is 
the most likely cause of the problem? 
A. The SQL Server Agent service does 
not have the Windows NT administrative privileges that are required in 
order for it to run. 
B. The SQL Server Agent service does not have permission to connect to SQL 
Server.
C.THESQL Server Agent service account does not have the right to log on as 
a service. 
D. The SQL Server Agent service account is disabled. 

Answer: A 
ZAHOOR SAYS In this case, it needs the Domain Admin Privileges, or it 
would be unable to access the network and do other things that are needed. 
At a minimum the agent needs "local administrator privileges". 



18. Your company's network contains UNIX and NetWare legacy systems in 
addition to a Windows NT 4.0 domain. Many users log in to the legacy 
systems for access to e-mail and proprietary software. Currently, only 
Windows NT accounts are able to access SQL Server. What must you do to 
give the UNIX and NetWare Users the same access to the SQL Server database 
that current members of the Windows NT domain have? (Choose all that 
apply) 
A. Create SQL Server logins for the UNIX and NetWare users. 
B. Create Windows NT accounts for the UNIX and NetWare users. 
C. Add the UNIX and NetWare users to the appropriate Windows NT groups. 
D. Add the UNIX and NetWare users to the appropriate SQL Server roles. 
E. Ensure that security on SQL Server is set to Mixed Mode. 

Answer: A and E 
ZAHOOR SAYSUNIX and NETWARE don't use NT Authentication, require Standard 
Security, in SQL 7.0 is a.k.a Mixed Security, so E for Mixed and A for 
Creating SQL Logins. 





24.The corporate database contains only three tables, which are named 
sales, credit, and prices. Four Windows NT groups in the domain are named 
Marketing_users, Marketing_mgrnt, Finance_users, and Finance_mgmt. All of 
these groups have SELECT permissions on all three tables. You want only 
the Marketing_mgmt group to have UPDATE permissions on the sales table. 
You want only the Finance_mgmt group to have UPDATE permissions on the 
credit and prices tables. What must you do to ensure that the 
Marketing_mgmt group and the Finance_mgmt group get the appropriate 
permissions? (Choose two.) 
A. Add the Marketing_mgmt group to the db_denydatawriter role for the 
credit and prices tables. Add the Marketing_mgmt group to the 
db_datawriter role for the sales table. 
B. Add the Finance_mgmt group to the db_denydatawriter role for the sales 
table. Add the Finance_mgmt group to the db_datawriter role for the credit 
and prices tables. 
C. Grant the Finance_mgmt group UPDATE and DELETE permissions on the 
credit and prices tables. 
D. Grant the Marketing_mgmt group UPDATE and DELETE permissions on the 
sales table. 
E. Add the Finance_mgmt group to the db_datawriter role. Grant the 
Finance_mgmt group SELECT permissions an the sales table. 
F. Add the Marketing_mgmt group to the db_datawriter role. Grant the 
Marketing_mgmt group SELECT permissions on the credit and prices tables. 

Answer: C, D 
ZAHOOR SAYSThus all you really have to know is what change and delete 
imply. There is no need to affect the other 2 groups as they cannot 
change/delete with "select" (meaning 'read') permission. 


26. Bruno is member in the NT group MKTG. The MKTG group access to the DB 
has been revoked. What do you do to give Bruno access to the DB?? 
a) Remove him from the MKTG group 
b) Create new NT group and place him and everybody else who need access to 
the DB. 
c) Add Bruno as a user to DB. 
d) Create SQL login in DB 

Answer: C
ZAHOOR SAYSSQL Login is different than the NT Authentication mode already 
being used. It would also imply that mixed mode was in effect, which is 
not specified, nor is it the default mode.. However, creating the account 
and putting everyone in it is NOT enough, you also have to map that new 
Group to a user in the database. That leaves C as the only thing that is 
sure to work with the least amount of assumptions of how the id/group is 
being created. 



28. Katrin is the system administrator of SQL Server and she is in the 
role of db_owner of the corporate database. Carlos is in the roles of 
setupadmin and db_accessadmin. Julia is in the roles securityadmin and 
db_securityadmin. Katrin must ensure that only she can grant permissions 
in the database and that only Julia can grant users and groups access to 
SQL Server and the corporate database? How must role membership be changed 
to meet these requirements? (Choose three) 
a) Add Julia to the serveradmin role. 
b) Remove Carlos from db_accessadmin role. 
c) Remove Julia from db_securityadmin role. 
d) Add Julia to the db_accessadmin role. 
e) Add Katrin to the db_securityadmin role. 
f) Add Katrin to the db_accessadmin role. 
g) Remove Carlos from the 
setupadmin role. 

Answer: B,C,D 

ZAHOOR SAYSCarlos has to be omitted, since Katrin must be the only one to 
do permissions. Julia needs to be removed for the same reason. But, in 
order for Julia to grant access (create userids in the database) she needs 
the db_accessadmin. 

Choose 2 - B,C

29.Paolo is removed from a MKTG group (NT - group) where he has created a 
table SALES. He is put in a new group called Manufacturing group which 
uses Products database. How can you make Paolo use his table which he 
created in MKTG group? 
a) He can't be removed from the MKTG group cause he created the table 
b) Grant him access and activate SQL mixed mode 
c) Grant him access to the MKTG database 
d) Grant him access through public group & SQL guest user account 

Answer: C 
ZABOOR SAYSUsers who are granted access to SQL Server through their 
memberships in a Windows NT Group do not have entries for their individual 
Windows NT user accounts in the system tables. However, an entry is 
created for their individual Windows NT User accounts if they create 
objects, such as a table or a stored procedure, in a SQL Server database. 
This makes that A is wrong, since ownership does not go to the group. 
There is NO need for mixed mode, a SQL Login won't work because it is a 
different entity than the DOMAIN\Paolo id that has already been created, 
(eliminates B), and if he came in as Guest, he won't have the same rights 
as if he was DOMAIN\Paolo since the guest would not be the owner. 
(Eliminates D). So, I agree that C is what is left, make sure he has 
access because his definition is already there. 

30. SQL server is configured with a Net-Library with TCP/IP socket 1450, 
which is non-standard port setting. How to connect clients? 
a) At the server use the Network utility to use port 1450. 
b) At the server use the Client utility to use port 1450. 
c) At the Client configure the Server Client utility to use port 1450. 
d) At the Client modify TCP/IP services to associate to SQL server on port 
1450. 

Answer: C
ZAHOOR SAYS The SQL Server Client Network Utility lets you configure any 
of the following network protocols to communicate with a specific server: 
*Named Pipes *TCP/IP Sockets *Multi protocol *NWLink IPX/SPX *AppleTalk 
*Banyan VINES *Other (for network protocols supplied by a third party) The 
Net-Libraries for a protocol must be installed before you can set up a 
configuration. If the client Net-Library for a network protocol is not 
installed, it will not be listed on the Network Libraries tab.

31. Three Users ANITA, CARMEN, PHILIPPE all have db_owner roles currently 
for the FINANCE database. You want PHILIPPE to continue to manage the dB 
as before, Anita to ONLY create users accounts and grant permissions for 
users, Carmen should be ONLY able to create tables, views, indexes and 
other objects, 
a) Remove Carmen from db_owner and add to db_ddladmin role. 
b) Remove Anita from db_owner role and db_accessadmin role 
c) Remove Anita from db_owner role and add to db_security and 
db_accessadmin roles. 
d) Remove Anita from db_owner role and add to 
db_security role 

Answer: A,C 

ZAHOOR SAYS Anita needs dB access (create accounts) and dB security 
(assign permissions) and Carmen needs dB DDL for creating objects. 
db_accessadmin-Adds or removes Windows NT groups, Windows NT users, and 
SQL Server users in the database. db_ddladmin-Adds, modifies, or drops 
objects in the database. db_securityadmin-Manages roles and members of SQL 
Server database roles, and can manage statement and object permissions in 
the database. 

32. Laura is the new sales coordinator for your company. She will process 
all orders. You want Laura to be able to modify the order database only 
through the order applications. How should you control access to the order 
database? 
a) Use a stored procedure that Laura has permission to execute 
b) Use a User-defined application role that has UPDATE permission on the 
order database. 
c) Use a SQL Server user account that has UPDATE permission on the order 
database. 
d) Use a view of the Order database in which Laura has UPDATE permission 
on the Order database. 

Answer: B 

ZAHOOR SAYSYou want users to be restricted to accessing data only through 
a specific application without the ability to access data directly, for 
example using SQL Server Query Analyzer or Microsoft Excel. This prevents 
a user from connecting to SQL Server using an application such as SQL 
Server Query Analyzer and executing a poorly written query, which affects 
the performance of the whole server. 

33. You install SQL Server onto an MS Windows NT Server computer that is 
a member of the Workgroup SQLGROUP. Your computer users are also members 
of SQLGROUP. None of the users can connect to the SQLServer by using SQL 
Server Query Analyzer, even though they are using valid SQL Server login 
ID's and passwords. You use the SQL Server Client Network Utility to 
confirm that the default Net-Library is Named Pipes. What is the most 
likely cause of the problem? 
a) The users computers are not configured with a valid ODBC DSN for SQL 
Server. 
b) The users computers are not connecting by using trusted connection. 
c) The SQL Server database files are not available in a network share. 
d) The Server's Windows NT Guest account is disabled 

Answer: D
ZAHOOR SAYS When connecting to a SQL Server running on Windows NT using 
Named Pipes, the user must have permission to connect to the Windows NT 
Named Pipes IPC, \\\IPC$. If the user does not have permission to connect, 
it is not possible to connect to SQL Server using Named Pipes unless 
either the Windows NT guest account on the computer is enabled (by default 
disabled). I also think that both B & D are correct as possible issues. 
But, for this question is the "most likely", and in this case I see "D" as 
the most likely of the two. Creation of SQL Logins on the SQL Server does 
NOT create NT user accounts on the SQL Server; it creates its own accounts 
putting this stuff in SQL tables. If an administrator did not fully 
understand this, then most likely all they would have done would be to 
create the userid and password in SQL - not the server. Then users would 
fail to connect BECAUSE they don't have an account on the server to give 
permissions to set up the named pipe. This is the MOST LIKELY mistake that 
would be made in this environment - and the easiest correction would be to 
enable the NT Guest account so that the named pipe can be created. 



*************************************************************

2MANAGING SQL SERVER REPLICATION 

35. Replication. NY ( NY1----T1-----------NY2) -----56kbps------------>( 
Seattle-----T1----San Francisco----T1---Los Angeles) 

a.NY1=pub/dist NY2,Seattle,SF,LA as subscriber 
b. NY1=pub/dist SF= subscriber/dist/pub NY2,Seattle,LA as subscriber 
c.NY1=pub NY2=dist Seattle, SF, LA as subscriber. 
d.NY1=Pub LA= dis something not workable. 

Answer: B

ZAHOOR SAYS Both the Publisher and the publishing Subscriber are acting 
as their own local Distributors. If each were set up to use a remote 
Distributor, each Distributor would need to be on the same side of the 
slow or expensive communications link as its Publisher. Publishers must be 
connected to remote Distributors by reliable, high-speed communications 
links. 

36. Arbor Shoes has 100 stores. Their Pricing database resides on the 
corporate server. The pricing database server has limited space. The 
pricing database contains a price table. The price table has a high 
frequency of updates. The in-store checkout application requires an 
up-to-date local price table in order to ensure accurate pricing. Which 
type of SQL Server replication should you use to replicate the price table 
to the in-store computers? 
a) Snapshot replication with a central Publisher, remote Distributor, and 
Multiple Subscriber 
b) Transactional replication with a central Publisher, remote Distributor, 
and Multiple Subscriber 
c) Transactional replication with a central Publisher/Distributor, and 
Multiple Subscriber 
d) Snapshot replication with a central Published/ 
Distributor, and Multiple Subscriber 

Answer: B
ZAHOOR SAYS The pricing database server has limited space. The 
distributor contains the distribution database and stores metadata, 
history data, and (for transactional publications) transactions. 
Additionally with 100 stores to replicate to and a frequently updated 
price list the pricing database server would be overworked. 

37. Your company has five call centres that are located worldwide. These 
call centres manage the reservations for an airline. The reservation 
application has a customer table on the corporate server. The customer 
table is read locally and can be updated locally but the updates must 
maintain consistency across all five locations. Which type of SQL Server 
replication should you implement? 
a) Merge replication with push subscribers. 
b) Merge replication with pull subscribers. 
c) Transaction replication with push subscriptions. 
d) Transaction replication with immediate-updating subscribers. 

Answer: D
ZAHOOR SATYThe Immediate-updating Subscribers option provides latent 
transactional consistency to other Subscribers (it is immediate between 
the Subscriber doing the updating and the Publisher) without requiring 
that updates only be done at the publishing site. This option is set at 
the time the publication is created and allows a Subscriber to update the 
copy of its local data, as long as that update can be immediately 
reflected to the Publisher by using the two-phase commit protocol (2PC).




40.You have set upsnapshot replication between a publisher and multiple 
remote subscribers. You set up a distributor on a separate computer on 
your LAN. You suspect that the snapshot data has become corrupted and you 
want to clear it out manually. From where should you clear the data?
a) from the source database on the publisher 
b) from the target database on the subscriber 
c) from the distribution database on the distributor 
d) from the snapshot folder on the distributor 

Answer: D 
ZAHOOR SAYS Snapshot Agent Snapshot replication is carried out by the 
Snapshot Agent and the Distribution Agent. The Snapshot Agent prepares 
snapshot files containing schema and data of published tables, stores the 
files in the snapshot folder on the Distributor, and records 
synchronization jobs in the distribution database on the Distributor. The 
Distribution Agent moves the snapshot jobs held in the distribution 
database tables to the destination tables at the Subscribers. The 
distribution database is used only by replication and does not contain any 
user tables. Note On a Distributor server running Microsoft(r) Windows 
NT(r), the snapshot directory defaults to using the $ share and a path of 
\\\$\Mssql17\Repldata. 



42. Transaction replication, updates synchronized on Publisher and 
Subscriber, MSrepl_commands is empty, why: 
a) automatically cleaned up 
after transaction 
b) log reader purged it for next batch 
c) replication 
distribution clean up job ran and purged it 
d) log reader did not log 
activity to it 

Answer: C

ZAHOOR SAYStransactional replication, cleanup tasks When the distribution 
database is created, SQL Server adds three tasks automatically to SQL 
Server Agent at the Distributor to purge the data no longer required: 
*Agent checkup *Transaction cleanup *History cleanup 

43. Mark configured replication on the SQL server in the accounting 
department to replicate information from the Payroll database to an SQL 
server in the Human Resources department. The transaction log of the 
Payroll database is filling up more frequently than it had before he 
configured replication. What is the MOST likely cause of this problem? 
a) 
The Snapshot Agent. 
b) The Synchronization Process. 
c) The Log Reader 
Agent. 
d) The Distribution Agent. 

Answer: C

ZAHOOR SAYS Transactions that are to be replicated are marked for 
replication in the transaction log of the publishing database. The Log 
Reader Agent monitors the transaction log for these transactions and 
copies them to the distribution database. Once the transactions are 
copied, they may be truncated via the normal methods. If the Log Reader 
Agent is not copying these transactions to the distribution database, the 
normal truncation process cannot truncate anything past the oldest 
distributed transaction and the transaction log may fill up. The stored 
procedures sp_repltrans and sp_replcmds can be used to obtain information 
about transactions in the transaction log of the publishing database. The 
Distribution Agent distributes data to the subscribers as scheduled. It 
obtains the information it needs from the distribution database. The 
Synchronization process is responsible for checking if there are any new 
subscribers for which initial synchronization must be done. The 
synchronization is done using schema script and data files, not directly 
from the published database or its transaction log. The Snapshot Agent 
prepares the schema and data files. 





46. You enable merge replication. What must you do to enable conflict 
resolution on the articles in your publications? 
a) Add a column to each 
article and assign the IDENTITY property to each column. 
b) Add a column 
of the timestamp data type to each article. 
c) Add a column of the 
UNIQUEIDENTIFIER data type to each article. 
d) Do nothing. SQL Server will 
add a column of the UNIQUEIDENTIFIER data type to each article. 

Answer: D

ZAHOOR SAYS. If the base table already contains a uniqueidentifier column 
with the ROWGUIDCOL property, SQL Server uses that column automatically as 
the row identifier for that replicated table. Otherwise, SQL Server adds 
the column rowguid (with the ROWGUIDCOL property) to the base table. SQL 
Server also adds an index on the rowguid column to the base table. 






*************************************************************

3MANAGING SQL SERVER BACKUP 



59.You want to schedule the Finances database so that backups occur 
according to the following three requirements: every two hours, Monday 
through Friday, 8 A.M. to 6 P.M. every four hours, Monday through Friday, 
8 P.M. to 4 A.M. the following day every eight hours, 6 A.M. Saturday to 
10 P.M. Sunday You Want to minimize the number of scheduled jobs. How 
should you schedule the backups? 
A. Create one single-step job to back up the database. Schedule the job to 
run according to the three requirements. 
B. Create one multistep job consisting of three separate steps to back up 
the database according to the three requirements. 
C. Create three separate single-step jobs to back up the database. 
Schedule the three jobs according to the three requirements. 
D. Use the Windows NT at command to create three scheduled jobs to back up 
the database according to the three requirements. 

Answer: A 

60. The backup schedule for the Accounting database is shown in the 
following table. -1:00 A.M. Full database backup -7:00 A.M. Transaction 
log backup -8:00 A.M. Transaction log backup -9:00 A.M. Transaction log 
backup At 8.45 A.M. on October 10, 1998 a user runs a now transaction that 
incorrectly updates data in several tables. The manager of the Accounting 
department tells you that all updates after that time can be reconstructed 
from the paper forms. You restore the 1:00 A.M. full database backup. 
Which set of steps is the best method to use to restore the database to a 
consistent state closest to what the state was at 8:45 A.M.? 
A. Restore the 7:00 A.M. transaction log backup by using the WITH 
NORECOVERY option. 
B. Restore the 8:00 A.M. transaction log backup by using the WITH 
NORECOVERY option. 
C. Restore the 9:00 A.M. transaction log backup by using the WITH RECOVERY 
option and the STOPAT = 'Oct 10. 1998, 8:44 AM' option. 

Answer: A 

61.The periodicals database is 10GB in size. You specify multiple 
tape-backup devices, and you schedule a full database backup to occur 
nightly. One night, the backup fails while writing to the third tape. You 
resolve the problem with the tape. What is the fastest way to complete the 
backup? 
a) Return the schedule job. 
b) Manually back up the database and 
use the INIT option 
c) Manually back up the database and use the NOINIT 
option 
d) Manually back up the database and use the RESTART option. 

Answer: D 
ZAHOOR SAYSTo restart an interrupted backup operation, execute the 
interrupted BACKUP statement again

62. Every night the backup fails. Which DBCC command could repair the 
Sales DB and check the data integrity and indices? 
a) DBCC NEWALLOOC
b) DBCC CHECKALLOC 
c) DBCC CHECKDB 
d) DBCC DBREPAIR 

Answer: C 
The command DBCC CHECKDB validates the integrity of everything in a 
database and the other commands like REPAIR_ALLOW_DATA_LOSS | REPAIR_FAST| 
REPAIR_REBUILD - Specifies that DBCC CHECKDB repair the found errors. 

63. You restore the db from tape backup - upon 50% you have a tape drive 
failure - you replace the drive and want to finish your restore - what 
now? 
a) EXEC RESTORE WITH RECOVERY 
b) EXEC RESTORE WITH RESTART 
c) EXEC RESTORE WITH STANDBY 
d) EXEC RESTORE WITH REPLACE 
e) EXEC RESTORE WITH NORECOVERY 

Answer: B 

ZHOOR SAYS The same clauses used in the original RESTORE statement. *The 
RESTART clause. 

64. You have filegroup1 on disk1 and filegroup2 on disk2. You have a 
customer table in filegroup1 and its index in filegroup2. Now the 
filegroup1 on disk1 fails. What is the quickest way to restore? 
a) Apply filegroup1 backup and filegroup2 backup 
b) Apply filegroup1 backup and rebuild indexes. 
c) Apply filegroup1 backup and filegroup2 backup restore all the 
transaction logs since the backup. 
d) Apply filegroup2 backup and apply all the transaction logs for the 
filegroup2. 

Answer: C 

ZAHOOR SAYS If a table's indexes span multiple file groups, all file 
groups containing the table and its indexes must be backed up together, 
after which a transaction log backup must be created. Otherwise, only some 
of the indexes may be backed up, preventing the index from being recovered 
if the backup is restored later. 



67. Your DB is updated by a batch process every day at 2.00am with the 
data from the last day. Which backup-strategy should you use? 
a) Full back up at Sunday, diff back up every day after batch process 
b) Full back up at Sunday, diff back up every day 
c) Full back up at Sunday, log back up every 6 hours 
d) Another option with log back up 

Answer: A 
ZAHOOR SAYSDifferential would be best with a baseline on the weekend. Not 
much use unless it is run AFTER the batch process, otherwise if done 
before you'd have to re-run the batch - which you don't want to do. Also, 
if a transaction log file was generated, it would be very large - assuming 
a large batch job, and it would be faster to restore via diff than to 
replay the work. 





71. You create a full backup and three log backups every day. Full backup 
at 7am. Log backup at 10am. Log backup at 1pm .Log backup at 3pm. Your DB 
gets corrupted after one of the employees by mistake updates one of the 
columns in the DB at 2:30 pm. How can you solve this problem? 
a) Restore the full backup of 7am with NORECOVERY option Restore the Log 
backup of 10am with NORECOVERY option Restore the Log backup of 1pm with 
NORECOVERY option Restore the Log backup of 3pm with RECOVERY option, 
STOPAT 2:29pm 
b) Restore the full backup of 7am with NORECOVERY option Restore the Log 
backup of 10am with NORECOVERY option Restore the Log backup of 1pm with 
NORECOVERY option Restore the Log backup of 3pm with NORECOVERY option, 
STOPAT 2:29pm 
c) Restore Log backup of 7am with NORECOVERY option. Restore Log backup of 
10am with NORECOVERY option. Restore Log backup of 1pm with RECOVERY 
option. 
d) Something similar, not important. 

Answer: A

ZAHOOR SAYSWithout recovery, your db wont be able to function, you want 
to restore all the transaction logs since your last full/differential 
backup. 



73. You load a large amount of data into your database. You notice that 
the select Into/bulk copy option is still enabled and that your 
transaction log is almost full. You turn off the select into/bulk copy 
option. Which 2 additional steps should you take to ensure the viability 
of future backups? (Choose 2) 
a) Perform a full database backup. 
b) Perform a transaction log backup and 
use default options. 
c) Perform a differential database backup. 
d) Turn on 
the trunc. log on the chkpt option. 
e) Perform a transaction log backup 
and use the TRUNCATE_ONLY option. 

Answer: A,E 

Other says C,D A nonlogged bulk copy occurs if all the following conditions 
are met: The database option select into/bulkcopy is set to true. 
Differential database backups record all the changes made to the database 
since the database backup was created, including nonlogged operations. 
After performing a nonlogged bulk copy, it is no longer possible to back 
up the transaction log. Therefore, it is recommended that a database or 
differential database backup is created instead. I think that since it 
says "things", a Log Truncate Only may be required to reset the log, 
making the answer C & D? 



76. You want to transfer a database copy from Server A to Server B using a 
full backup and restore. A complete backup uses 5 tapes. Server A has two 
tape drives and Server B has one tape drive. What is the easiest way to 
accomplish the database transfer? 
a) Make a new backup on server A only using one tape drive 
b) Transfer the database by replication 
c) Back up using two tape drivers on server A and restore sequentially 
using one tape drive on server B 

Answer: C 
ZAHOOR SAYSBy using the two tape drives on server A you could get the 
backup done in half the time because the backup will overlap the I/O 
across the two tapes.

77. The disk drive containing your Master Database failed. Your User 
Databases are unaffected. You cannot locate a recent master database 
backup. So you rebuild the master database. What should you do to ensure 
that your user databases are accessible in the shortest amount of time? 
a) Restore the user database from an existing backup
b) Attach the existing user database to the new master database. 
c) Manually edit the master database system catalog and add to the user database. 
d) Do nothing. The process of rebuilding the master database automatically restores links to the user database. 

Answer: B 
ZAHOOR SAYSYou would use the rebuildm.exe to rebuild the master database, 
or if the master database was backed up and user databases had been 
created after the backup, the restore does not have them defined, then 
you'd have to attach the database. For example, if a user database is 
created after master is backed up, tables and data added to the database, 
and then master is restored because of a hard disk failure, the user 
database will not be known to SQL Server because there are no entries in 
the restored master database for this new user database. 




80. The engine manufacturing application records data about all the 
engines the are manufactured at your plant. The database contains 
approximately 500 million records and is approximately 500GB in size. The 
database increases by 1,000 records per day. You want to accomplish the 
following goals; 1. Minimize the time required to recover the database 2. 
Provide the ability to recover the database to a specific time. 3. 
Minimize the number of transaction logs that need to be restored during 
recovery. 4. Minimize the time required to back up the database. You take 
the following actions. 1.Schedule a full database back up of the entire DB 
to occur every Sunday at 1 AM 2.Schedule transaction log back up to occur 
every day at 3 P.M Which result or results do these action produce? 
(Choose all the apply) 
a) The time required to recover the database is minimized. 
b) The database can be recovered to a specific time. 
c) The number of transaction logs is minimized. / *** variation (logs that 
need to be applied during recovery is minimized. 
d) The time required to back up the database is minimized 

Answer: B,D 

Other B,C

ZAHOOR SAYSThe ideal backup system is FULL back up once a week, 
differential backup at night, and transactional backup throughout the day. 
With transaction logs the database would be able to be recovered with the 
'STOP AT' clause, so B is correct. 
Now finally onto D, The database is 500GB's, ie a VLDB (very large 
database -> M.O.C). Thus the only way to reduce the backup time, and this 
is recommended in M.O.C, is to use file groups to back up data 
periodically and this isn't done in this example. 



85. Sales representatives use portables. They need to implement 
replication scenario so that the sales reps can enter orders. You want to 
minimize network traffic: 
a) Transactional 
b) Snapshot with pull 
c) Snapshot with push 
d) Merge 

Answer: B 
ZAHOOR SAYS Laptop users should be pull, since they are not always 
connected, they would log on and request (PULL) the database. If you used 
transactional, the Laptops need to be connected - or your logs would be 
unmanageable. And transaction and Merge's eventually time out and would 
force a snapshot anyway. 


*************************************************************

4MANAGING SQL SERVER NETWORKING
(Upgrading and Installation)



87.Your company uses SQL 4.2 but plans to upgrade to SQL7.0. How must you 
accomplish this migration? 
a) Use the SQL Server upgrade wizard. 
b) Use the bcp utility to extract all the data from the SQL 4.2 database 
and then load the data into a new SQL 7.0 database. 
c) Upgrade SQL4.3 to SQL 6.5 and then upgrade to SQL7.0 
d) Use Data Transaction Service (DTS) to migrate the data from SQL4.2 to 
SQL7.0 

Answer: C

Ref: BOL - Index on: upgrading SQL Server, versions that can be 
upgraded. Only Microsoft(r) SQL Server(tm) version 6.x databases can be 
upgraded to SQL Server 7.0. You cannot upgrade SQL Server 4.2 software or 
databases directly to SQL Server 7.0. Instead, you must upgrade the SQL 
Server 4.2 software and databases to SQL Server 6.5, and then upgrade to 
SQL Server 7.0. 


92.You are moving a server from FINANCE DOMAIN to MONEY domain. SQL Server 
is not able to start. 
a) Money is a Datatype in SQL so it cannot be 
restarted. 
b) SQL Server NT account is inaccessible. 
c) Internal SQL 
server name is now different than the network name. 
d) Domain name cannot 
be changed after installing SQL. 

Answer: B

If you moved to another domain and did nothing else how would 
the new pdc/bdc authenticate the domain account? It won't be in the SAMS 
database to be replicated. Ref: BOL - Index on: user accounts, SQL Server 
Agent, When running on Microsoft(r) Windows NT(r), Microsoft SQL 
Server(tm) and SQL Server Agent are started and run as Windows NT services 
named MSSQLServer and SQLServerAgent. For these services to run, they must 
be assigned a Windows NT user account. Both services may be assigned the 
same user account. Three types of accounts can be assigned to SQL Server 
services: *Local system *Local user *Domain user The local system and 
local user accounts do not have network access rights. Using a local 
account restricts SQL Server from interacting with other servers. Some 
server-to-server activities can be performed only with a domain user 
account. 

93.Browsing of other servers from an SQL server running on Win98 is not 
possible. Browse list is not available. When trying to register they are 
not able to do it. But they are able to connect for File sharing. 
a) verify the Win98 machines are connected to the same subnet. 
b) verify the 
Win98 machines are using the same Net-library 
c) verify the Win98 machines 
are having proper logins 
d) Browsing is not supported in Win98 

Answer: D

SQL Server 7.0 on Windows 95/98 The Windows 95/98 network 
redirector does not provide computer browser support. SQL Server dialog 
boxes that depend on this feature to get a list of servers do not display 
a server list on Windows 95/98. This includes the Register Server dialog 
box, the Register Server Wizard, and the Query Analyzer Login dialog box. 



95.You change the memory settings for SQL Server. Now SQL Server will not 
start. You want to restore SQL Server's previous functionality, and you 
want to minimize downtime and the potential for loss of other server 
settings or objects. What should you do? 
a) Start SQL Server at the 
command prompt with the appropriate parameters, and reconfigure the memory 
settings. 
b) Edit the appropriate section of the registry to change memory 
settings. 
c) Reinstall SQL Server. Start SQL Server in single-user mode, 
and restore master database from the most recent SQL Server backup. 
d) 
Restore the master database files from the most recent Windows NT file 
backup 

Answer: A

Useful if setting of a configuration value (for example, 
over-committing memory) has prevented the server from starting. Enables 
the sp_configure allow updates option. By default, allow updates is 
disabled. 



96.You are planning the installation of SQL Server onto servers at 
various International offices in your company. You want to accomplish the 
following goals. Minimize the time required to complete the Installations. 
Minimize network utilization during the Installations. Minimize the 
possibility of errors during the installations. Maximize the compatibility 
of the SQL Servers. Allow each international office to store characters 
that are specific to Its region. Which course of action will best 
accomplish your goals? 
A. Instruct the server administrators at each 
international office to install each SQL Server by using the Typical 
Installation option. 
B. Instruct the server administrators at each 
international office to use the character set, sort order, and Unicode 
collation that are optimal for their region. 
C. Create a standardized 
installation of SQL Server at your office. Back up the installation to 
tape by using the Windows NT Backup utility. Send each international 
office a copy of the backup tape, and instruct the server administrators 
at each international office to restore the tape's contents onto their 
server. 
D. From your office, perform a remote installation of SQL Server 
for each international office, using a standardized set of installation 
options. 

Answer: A 



98.During an upgrade of sql server 6.5 to sql server7.0, a custom stored 
procedure is not upgraded. The procedure reports on database object 
constraints by referencing the sysobjects, syscolumns, and sysconstraints 
tables. What should you do to enable the procedure to be upgraded? 
a) 
Recompile the procedure directly on the version 7.0 server 
b) Rewrite the 
procedure to use the appropriate system tables 
c) Rewrite the procedure to 
use the appropriate information schema views 
d) Prior to upgrading the 
procedure, upgrade other databases referenced by the procedure 

Answer: C

To obtain metadata, use system stored procedures, system 
functions, or these system-supplied views only. Querying the system tables 
directly may not provide accurate information if system tables are changed 
in future releases. These views provide an internal, system 
table-independent view of the SQL Server metadata. Information schema 
views allow applications to work properly even though significant changes 
have been made to the system tables. The information schema views included 
in SQL Server conform to the SQL-92 Standard definition for the 
INFORMATION_SCHEMA. 

99.Installation to 10 Remote SQL Servers. Remote Sysadmin has no 
experience with SQL Server. You want to ensure that the installation of 
the remote SQL Server was compatible to the existing. 
a) Backup all SQL 
files and registries to a tape and send a copy of the tape to the remote 
admin 
b) Install the SQL Server on a similar file and use the SQL70cst.log 
file for the remote installation, use the domain user account. 
c) Install 
the SQL Server on a similar system, use the local system account and use 
the sql70ins.iss file for remote inst. 
d) Install the SQL Server on a 
similar system, use the admin system account and use the sql70ins.iss file 
for remote inst. 

Answer: C

If doing remote install, need a administator account that is 
valid on REMOTE machine. sql70ins.bat sql70ins.iss Installs a typical 
installation of SQL Server1 sql70cst.bat sql70cst.iss Installs a custom 
installation of SQL Server1,2 1 These files assign the SQL Server services 
to the local system account. If you want the unattended installation to 
assign domain user accounts, create a custom setup initialization file. 



101. The default options were used when Micrsoft Windows NT Server was installed onto 10 computers. You are planning unattend installations of SQL Server onto these 10 Servers, and you want to avoid unnecessary modifications to the servers. The SQL Server databases will be accessed by Micrsoft Windows 95 client computers. What must you first install on the 10 windows NT Server computers? (Choose all that apply): 

A. Windows NT 4.0 Service Pack 4 or later 
B. Windows NT option Pack 
C. NWLink IPX/SPX 
D. Gateway Services for Netware 
E. Microsoft Internet Explorer 4.01 with Service Pack 1 or later 
F. Tcp/ip 

Answer: A,E 

By default, during setup, the following server Net-Libraries are activated to listen for clients: Named Pipes, TCP/IP Sockets, and Multiprotocol on Microsoft Windows NT(r) servers. Both A and E are a prerequisite for installing SQL server 7.0, you can find these options on your SLQ 7.0 installation cd. TCP/IP will be sufficient for win95 clients to connect, thus there's no need for NWLink or Gateway services. Windows NT option pack is not needed.



104. FINANCE will upgrade from SQL 6.5 to SQL7.0. 6.5 is local installed on 
several WINDOWS 98 clients and local copies of the DB. To test SQL7.0 
application you should build up some test system with the min. 
administration. 
a) Upgrade to NT and install SQL7.0 use the same install 
option as the current Finance Server. Use SQL Wizard to update the 
database. 
b) Upgrade from 98 to NT, install SQL7.0 backup 6.5 DB and 
perform Tape upgrade of the DB 
c) Install SQL7.0 on WINDOWS 98, use DTS to 
transfer the DB, scripts, query and any other object to 7.0 
D) Install 
SQL7.0 on WINDOWS 98 make a snapshot of the current DB and restore these 
on the test system 

Answer: A

A upgrade from 6.x to 7.0 can only be done on Windows NT 
Platform. 
What is the name of the unattended setup file? Per bol: Unattended 
Installation SQL70ins.iss Installs a typical installation of SQL Server1 
SQL70cst.iss Installs a custom installation of SQL Server1,2 

105.You are using DTS to load 500 MB of data from a flat file to a SQL 
Server table. Each row contains 6000 bytes. You have 100 MB of free disk 
space for the transaction log. 
Which are the important options to set on the target database to minimize 
the possibility that the transaction log will not have any disk space 
available? 
a) Autochk 
b) trunc. log on chkpt 
c) select into/bulk copy 
d) autoclose 

Answer: B 

Note: If the database option trunc. log on chkpt. is set on, 
then there is no need to generate log records that would support rolling 
forward a bulk copy operation. 



*************************************************************

5MANAGING SQL SERVER PERFORMANCE 


110.Your company has three servers running SQL Server in adjoining 
buildings. You are responsible for monitoring performance of stored 
procedures and for monitoring the connections to the servers. In order to 
do this monitoring, you want to forward all applicable information to the 
server in your building. You also want to automatically start monitoring 
in the event that SQL Server shuts down and then restarts on any of the 
three servers. What must you do to most these goals? 
A. Use Windows NT 
Performance Monitor to monitor all three servers from one location. 
B. Use 
SQL Server Profiler extended stored procedures to forward a trace to the 
server in your building, and make the stored procedures startup stored 
procedures. 
C. Use the Create Trace Wizard in SQL Server Profiler to 
create a trace on the server in your building, and replay the trace on the 
other two servers. 
D. Use the Create Trace Wizard in SQL Server Profiler 
to create a trace on each server, and replay the trace on the server in 
your building. E. Use Windows NT Performance Monitor from each server. Log 
each server's activity and forward it to the server in your building. 

Answer: B 






117.A developer has mistakenly issued a large bulk-insert query without 
any predicate. The log file has 3GB available. About 500MB of data has 
been loaded and the developer estimates that about 50% of data still is 
remaining to be loaded. Other users are complaining they cannot access the 
application because of the locks held by the query. You want to get the 
system function as quickly as possible. What do you do? 
a) Kill the 
bulk-insert query 
b) Let the query run to completion. 
c) Kill the other 
processes which are being held by the bulk-insert query 
d) Stop/Start 
MSSQLServer service or something like that 

Answer: B

We ARE logging here, we may or may not. We are doing insert, 
and not update, so we must be doing some sort of serialized locking. If we 
are NOT logging, then there could be ramifications of killing the Insert, 
we may leave a questionable DB and be required to restore from backups, a 
real mess. If we are logging, then killing the Bulk Insert would cause a 
massive rollback, but in this case we would have to delete half a batch's 
transactions. That leaves the question - is the rollback going to cost 
more or less than just letting the transaction running to complete. BTW: I 
think on this one they should add another option: Kill that Developer! 



120.Your SQL sever database is currently running on a single computer. To 
improve the availability of the SQL server database to an accounting 
application, you are implementing a second computer running Microsoft NT 
Server. The accounting application must be available every business day 
between 9 AM and 5 PM. In event of disk drive failure the data must be 
recoverable to the end of the previous business day. How should you 
configure the second computer? 
a) install it as a SQL Server Standby 
server 
b) Install it to use SQL Server Failover support. 
c) Set up SQL 
Server Transaction replication. 
d) Set up Windows NT-based replication 

Answer: A

A standby (warm backup) server is a second server that can be 
brought online in the event of failure of the primary production server. 
The standby server contains a copy of the databases on the primary server, 
possibly including the system databases if this is a complete duplicate of 
the primary system. This copy is maintained by, initially backing up the 
databases on the primary and restoring them on the standby. Periodically, 
transaction log backups from the databases on the primary server are 
applied on the standby to ensure that the standby remains synchronized 
with the primary server. In the event of the primary server failing, or 
even if just a single database fails, the databases on the standby server 
are made available to user processes. Any user processes that cannot 
access the primary server should use the standby server instead. A standby 
server configuration is not the same as the virtual server configuration 
used in Microsoft(r) SQL Server(tm) Failover Support. 

121.Web based SQL server with Internet users needing to access order entry 
application to enter new orders and inquiries. You must develop a strategy 
to ensure availability of application and integrity of database. You use a 
2nd PC, how do you configure it: 
a) Standby server 
b) Failover Support 
c) SQL Transactional Replication 
d) Windows NT based Backup/Restore 

Answer: B

A virtual server configuration is not the same as a standby 
server configuration. A standby server contains a second copy of SQL 
Server and a second copy of the SQL Server database. In a virtual server 
configuration, there is a single copy of the database, located on a common 
external disk, that is shared by the primary and secondary physical 
servers that make up the cluster and host the virtual server. Only one 
server in the cluster has control over the shared disk resource at a time. 
Rather than associating SQL Server with a physical Windows NT Server, 
Clustering Service virtual server technology allows you to place SQL 
Server and SQL Server Agent cluster resources into a virtual server. The 
SQL Server virtual server's name is independent of the physical node name 
on which the virtual server runs (the names of the physical Windows NT 
Servers and the SQL Server virtual server must be different). Regardless 
of which physical Windows NT Server in the cluster controls SQL Server, 
the virtual server name and address remains the same. Clients connect to a 
SQL Server virtual server using the virtual server name, rather than a 
physical Windows NT Server name. The SQL Server virtual server name is 
implemented as a cluster network name resource and maps to a primary or 
backup node, depending on which node hosts the virtual server. Any client 
that uses WINS or directory services to locate servers can track the 
virtual server automatically as it moves between nodes. Automatically 
tracking the SQL Server virtual server does not require client 
modification or reconfiguration (this includes SQL Server Enterprise 
Manager and any OLE DB, ODBC, or DB-Library client applications). 





124.You have Disk1, Disk2, and Disk3. (C,D, E). On C you have program 
files, System database files, msdb, etc., D- Transaction log and E- user 
database files. There are no frequent updates but heavy query users report 
of slow performance. What do you do? 
a) Create additional files for the 
transaction log on C 
b) Create new filegroups on C and place heavily used 
indexes on the new filegroups 
c) Create new filegroups on D and place 
heavily used indexes on the new filegroups 
d) Place System Databases on 
drive E, put transaction log on Drive C 

Answer: C
By creating the index on a different filegroup, you can 
realize performance gains if the filegroups make use of different physical 
drives with their own controllers. Data and index information can then be 
read in parallel by multiple disk heads. 

125.You have SQL 7.0 on Win 98 machines in Branch offices and in the 
corporate you have SQL 7.0 on Win NT Server. Branch offices report slow 
performance. DB Admin is in the corporate office. How should the profiler 
be configured in the branch offices so that they can be centrally 
collected in the Corporate office by the DB Admin? 
a) Use SQL Profiler extended stored procedure and send them to the NT App log in the corporate 
office. 
b) Use SQL Profiler extended stored procedure and send them to the table in the corporate office.
c) Use xp_sendmail procedure to send the statistics thru e-mail to the DB Admin 
d) Use OS commands to build a batch file, and send them to the corporate office. 

Answer: B

Choosing a Tool to Monitor Server Performance and Activity 
Provides the ability to monitor server and database activity You can 
capture SQL Server Profiler data to a SQL Server table or a file for later 
analysis, and also replay the events captured on SQL Server, step by step, 
to see exactly what happened. SQL Server Profiler tracks engine process 
events, such as the start of a batch or a transaction. You can register 
other servers in Profiler. When you create a trace, you can choose the 
server to run it on and you also have the option to save the trace to a 
file or to a table. The table can be on the local server or another 
server. So...if you've registered another server with Profiler and created 
the database where you want the data to reside, you're on your way. 

126.You install SQL server on an IIS machine. You need to optimize IIS. 
What do you configure on SQL Server ? 
a) Set working set size 
b) Min 
Server memory 
c) Max server memory 
d) Max worker threads 

Answer: C

Use min server memory to guarantee a minimum amount of memory 
to SQL Server. Use max server memory to prevent SQL Server from using more 
than the specified amount of memory, thus leaving remaining memory 
available to start other applications quickly. SQL Server gives memory 
back to the operating system if another application starts and there is 
less than 5 MB of memory free. There is a short delay between the start of 
a new application and the time SQL Server releases memory. Using max 
server memory will avoid this delay and may give better performance to the 
other application. Only set min server memory if the start time of other 
applications sharing the same server as SQL Server shows up as a problem. 
It is better to let SQL Server use all of the available memory. 



129.How should you monitor the performance of the stored procedures? 
a) In Windows NT Performance monitor, monitor the SQLServer:Cache ManagerCache 
Hit Ratio counter and the SQLServer:Cache Manager Cache Use counts/sec 
counter while repeatedly executing the stored procedure. 
b) In Windows NT 
Performance monitor, monitor the Adhoc SQL Plans and the Prepared SQL 
Plans instances of the SQLSvr:Cache Manager Object. 
c) In SQL Server 
Profiler, monitor the SP:CacheHit and SP:Cache??? Event classes. (can't 
read my writing) 
d) In SQL Server Profiler, monitor the SP:Starting and 
SP:CacheRemove event classes. 

Answer: C

A stored procedure is compiled the first time it is loaded 
into the cache after the SQL server is started. The plan remains in the 
cache. If it gets knocked out of the cache, it gets recompiled again. SQL 
Server Profiler is the one that has the values. If the Cache Hit is low, 
then memory is not large enough, and SQL has to keep recompiling the 
Stored Procedures each time they are reloaded. 

130.You are running a web site; you want accounting who is accessing 
specific tables, You use performance monitor to monitor: 
a) connection 
execution plan servicecontror SQL user name NT user name 
b) attention exec 
prepared SQL user name NT user name 
c) Connection disconnection existing 
connection NT user name 
d) Object:opened SQL user name NT user name. 

Answer: C 





*************************************************************

6MANAGING SQL SERVER UTILITIES 



135.Your servers run SQL Server 6.5 and 7.0. You want to centrally manage 
these servers from your workstation by using SQL Server Enterprise 
Manager. What must you do? 
A. Install only the SQL Server 7.0 
administrative tools and Client connectivity components on your 
workstation 
B. Install the SQL Server 6.5 and SQL Server 7.0 
administrative tools and client connectivity components on your 
workstation. 
C. Install the SQL Server 7.0 administrative tools and client 
connectivity components on the servers that run SQL Server 6.5. 
D. Install 
the SQL Server 6.5 administrative tools and client connectivity components 
on the servers that run SQL Server 7.0. 

Answer: B 


139.You want to repair allocation errors and delete corrupted text objects 
in your db my_db. 
a) DBCC CHECKDB('my_db', REPAIR_ALLOW_DATA_LOSS) 
b) DBCC 
CHECKDB('my_db', REPAIR_REBUILD) 
c) DBCC CHECKALLOC('my_db', 
REPAIR_ALLOW_DATA_LOSS) 
d) DBCC CHECKALLOC('my_db', REPAIR_REBUILD) e) 
DBCC REPAIR_DB 

Answer: A

DBCC CHECKALLOC DBCC CHECKDB is the safest repair statement 
because it catches and repairs the widest possible range of errors. If 
only allocation errors are reported for a database, execute DBCC 
CHECKALLOC with a repair option to correct them. However, to ensure that 
all errors (including allocation errors) are repaired properly, execute 
DBCC CHECKDB with a repair option. DBCC CHECKALLOC messages are sorted by 
object ID, except for those messages generated from tempdb. DBCC 
CHECKALLOC validates the allocation of all data pages in the database 
while DBCC CHECKDB validates the page information used in the storage of 
data in addition to validating the allocation information. 
REPAIR_ALLOW_DATA_LOSS - Performs all repairs done by REPAIR_REBUILD and 
includes allocation and deallocation of rows and pages for correcting 
allocation errors, structural row or page errors, and deletion of 
corrupted text objects. These repairs can result in some data loss. The 
repair can be done under a user transaction to allow the user to roll back 
the changes made. If repairs are rolled back, the database will still 
contain errors and should be restored from a backup. If a repair for an 
error has been skipped due to the provided repair level, any repairs that 
depend on the repair are also skipped. After repairs are completed, back 
up the database. 





145.You start receiving continuous error messages by e-mail indicating 
that the transaction log is full. After 2 days, the messages suddenly 
stopped. What could be the reason? 
a) The auto grow option of SQL server 
automatically corrected the problem 
b) Windows NT App log is full 
c) SQL 
Server Agent stopped 
d) SQL Server Log Reader Agent stopped 

Answer: B
Because SQL Server Agent both depends on and monitors SQL 
Server, SQL Server Agent can become caught in an endless loop of firing 
the same alert. This generally occurs when SQL Server runs out of an 
essential global resource and an alert has been defined on this event.When 
the number of alerts raised exceeds the SQL Server Agent alert processing 
rate, a backlog is created. Emphasis is placed on the message stopping 
after 2 days. To assume that by chance the SQL server agent stopped is 
unreasonable. The most likely answer would be B, although its not the only 
possible correct answer. 



147.You want to configure SQL Server to notify you by e-mail when an 
alert occurs. Which series of steps must you perform? 
A. Configure the SQL 
Server Agent service to log on as the local system account. Log on to the 
server running SQL Server as your user account, and configure e-mail 
connectivity. Configure the SQLServerAgent service to use the resulting 
e-mail profile. 
B. Configure the SQLServerAgent service to log on as a 
domain user account. Log on to the server running SQL Server as the SQL 
Server Agent account, and configure e-mail connectivity. Configure the 
SQLServerAgent service to use the resulting e-mail profile. 
C. Configure 
the MSSQLServer service to log on as a domain user account. Log on to the 
server running SQL Server as the SQL Server account, and configure e-mail 
connectivity. Configure SQL Mail to use the resulting e-mail profile. 
D. Configure the MSSQLServer service to log on as a domain user account. Log 
on to the server running SQL Server as your user account. and configure 
e-mail connectivity. Configure SQL Mail to use the resulting e-mail 
profile. 

Answer: B 



149.If an application generates an error, you want to receive 
notifications. How can the Developers of the application implement this? 
a) Create a user defined SQL server using the SQLALRTR to log the error 
b) RAISERROR Statement 
c) Use the NT Application Log to log the error 
d) Minor error to occur which executes an alert triggered by resulting error 

Answer: B

A (SQLALRTR) is used for backwards compatibility, not needed. 
Unfortunately, it is virtually impossible to try and understand what the 
dumper meant by D, but it simply describes a Raiserror statement. Thus 
leaving us with B or C. Essentially both could be considered correct, 
however RAISERROR is used for user defined errors, not necessarily general 
application errors. Here it is stated that an application generates an 
error, and not that you still need to generate an error (as in RAISERROR). 
NOTE:-Errors and messages, or events, are generated by Microsoft(r) SQL 
ServerT and entered into the Microsoft Windows NT(r) application log. SQL 
Server Agent reads the application log and compares events to alerts that 
you have defined. When SQL Server Agent finds a match, it fires an alert. 
" 


151.You want to export data from a temp table #tempdb with bcp, but it 
does not work. bcp #tempdb..table out c:\tempfile.txt -n -Sserver -Uuser 
-Ppassword 
a) tempfile does not exist 
b) you have native format and not 
the text format (-c) 
c) bcp cannot export data from the tempdb 

Answer: C

When using bcp or BULK INSERT to bulk copy data using a global 
temporary table, the table name must be specified at the command prompt, 
including initial number signs (##). For example, to bulk copy data from 
the global temporary table ##temp_authors to the Temp_authors.txt data 
file, execute at the command prompt: bcp ##temp_authors out 
temp_authors.txt -c -Sservername -Usa -Ppassword However, do not specify 
the database name when using global temporary tables because temporary 
tables only exist in tempdb. It is only possible to use a local temporary 
table (for example, #temp_authors) when bulk copying data using the BULK 
INSERT statement. 

152.You want to export your information from your database into a 
comma-separated-values format text file named output.csv. what cmdline do 
you choose? 
a) bcp db..developer in c:\data\txt\output.csv -n -t\c -Usa 
-Ppaswd 
b) bcp db..developer out c:\data\txt\output.csv -N -t\t -Usa 
-Ppaswd 
c) bcp db..developer out c:\data\txt\output.csv -c -t, -Usa 
-Ppaswd 
d) bcp db..developer in c:\data\txt\output.csv -w -t -Usa -Ppaswd 

Answer: C


154.You want export data from a temp table #tempdb with bcp, but it does 
not work. bcp #tempdb..table out c:\tempfile.txt -n -Sserver -Uuser 
-Ppassword 
a) Use ##tempdb as the destination for the SELECT..INTO 
statement, then use bcp 
b) Use DTS Export Wizard instead 
c) Use the BULK 
INSERT statement 
d) You can not export data from a temporary table with 
bcp 

Answer: A

So effectively the answers are saying that you should convert 
the table from a # to a ## (local to global) temporary table, and then use 
the BCP pointing to the Global Temporary Table. 

155.Andrew wants to prevent long-running queries from executing. How 
should he do this? (Choose two.) 
a) Modify the configuration parameter 
show advanced options. 
b) Run the stored procedure set query governor cost 
limit. 
c) Modify the configuration parameter query governor cost limit. 
d) 
Modify the configuration parameter min memory per query. 

Answer: A,C

The configuration parameter "query governor cost limit" 
defines an upper limit for query cost, which is the time estimated it will 
take to run a query on a specific hardware configuration. Since this 
configuration option is an advanced option, the parameter "show advanced 
options" must also be set. The stored procedure "SET QUERY GOVERNOR COST 
LIMIT" can be used to set the limit on a per-connection basis rather than 
on a server-wide basis. The configuration parameter "min memory per query" 
defines the minimum amount of memory to allocate for a query. It is also 
an advanced option. 




160.You have a database and you want to add images to the already existing 
records how do you create file groups. Drive File C check.mdf D check1.ndf 
E check2.ndf E check3.ndf F check.ldf 
a) One file groups 
b) Two file group 
c) Three file groups 

Answer: B



94. The database for a check-processing application contains a record for 
each check that is processed. Each check has an associated image column 
that is accessed only when the user requests a display of the check. You 
plan to create the following flies to the Check database. Logical drive 
File name File type 
C check0.mdf Primary data file D Checkl. ndf check2. ndf 
Secondary data file Secondary data file E check3.ndf Secondary data file F 
check0.ndf Transaction log file 

Which step or set of steps should you use as a strategy for placing tables 
and indexes? 

A. Specify the filegroup Default for placement of all the tables and 
indexes. 
B. Add the filegroup Image to the Check database. Add check3.ndf to the 
filegroup Image. Place the Image column in the filegroup Image. Specify 
the filegroup Default for placement of all the tables and Indexes. 
C. Add the filegroup Data to the Check database. Add check1.ndf, 
check2.ndf, and check3.ndf to the filegroup Data. Specify the filegroup 
Data for placement of all the tables and indexes. 
D. Add the filegroup Data1 to the Check database. 

Answer: B 



162. It took you hours to create an index on a table. What 
should you do to protect it? 
a) Back up master db 
b) Back up user db 
c) Make differential backup of user db 
d) Back up log 

Answer: B

NOTE: B would work if the database was clustered, you save on 
the sort. But if it is nonclustered, then differential might be best - 
since the data itself did not change, and only the index would have to be 
restored - not the entire database. But in the case of a media failure, 
you would have to do a full restore anyway - so in the end, you might as 
well do a full backup. 

164.You have a DB which is updated frequently. You have set full text 
search and want it to be always up to date. How do you update your 
full-text search. 
a) batch file 
b) job 
c) scheduled task 

Answer: B

Populate all of the full-text indexes in a catalog at one time 
by calling sp_fulltext_catalog with the start_full option. A job step is 
an action that the job takes on a database or a server. Every job must 
have at least one job step. Job steps can be operating system commands, 
Transact-SQL statements, Microsoft(r) ActiveX Script, or replication 
tasks. 

165.You want to be able to forward certain diagnostic info via a trace to 
your workstation connected to SQL 7 box 2 from another SQL 7 box 1. You 
are using a workstation connected to SQL7 box 2. How do you do that? 
a) Get the events from SQL7 box 1 forwarded to box2 
b) Get box1 to email you 
c) Set up an SP to report info to you about box1 

Answer: A

Forwarding the events captured in a trace to a forwarding 
server is useful when you want to centrally monitor event data generated 
by many computers running SQL Server. To forward events, a queue is 
created on each computer running SQL Server that you want to monitor. Each 
queue is configured using xp_trace_setqueuedestination to send the events 
to the forwarding server. By monitoring only the forwarding server using 
SQL Server Profiler or another consumer, you can effectively monitor all 
the events sent from the computers running SQL Server. The name of the 
computer that generated the event is attached as a prefix to the event. 


167.3 Tables - Table1, Table2, Table3. 4 groups - group1a, group1b, 
group2a, group2b. All groups have select permissions on all tables group1b 
should be the only group that can change and delete data in table1. 
Group2b should be the only group that can change and delete data in table2 
and table3 (Choose two) 
a) add group1b to denydatawriter for table2 and table3; add group1b to 
datawriter for table1 
b) add group2b to denydatawriter for table1; add group2b to datawriter for 
table2 and table3 
c) give group1b update and delete permissions on table1 
d) give group2b update and delete permissions on table2 and table3 
e) and f were something else about fixed database roles 

Ans: C,D

Note: There is no need to affect the other 2 groups as they 
cannot change/delete with "select" (meaning :'read') permission. E and F 
are overboard.

27. A query which loads data on Production Server runs. Transaction Log 
isapproaching 500MB, less than 50% done. 3GB HD was free on the drive. DB growth 
was auto. The query blocks out other users. How could you give the general user 
quick access to the database for use.

a) Kill update process (less then 50%)
b) Let the update process runs until it finished
c) Kill the blocked processes
d) Stop and restart the SQL server
e) Truncate the transaction log

answer: A

38. The Development department uses a Oracle database with one table and you 
should convert it to SQL 7 and no target table exists in SQL Server.

a) BULK INSERT
b) Merge Replication
c) SELECT...INTO
d) bcp

Answer: C

note: the target table DOESNT exist in SQL, so SELECT INTO  

Submit your own braindump through our submission form



Have a question about a braindump? Don't understand why the answer is the answer? Think the answer might be wrong? Ask it on the discussion forum

If you see any braindumps with copyrighted information please email the webmaster

 
 


