微软认证70-228模拟试卷4

0
收藏   分享
  • 卷面总分:0分
  • 试卷类型:模拟考试
  • 测试费用:免费
  • 答案解析:是
  • 练习次数:16次
  • 作答时间:30分钟
试卷简介

  • 1.单选题
  • 2.多选题
试卷预览
1

You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.

You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.

Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.

You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)

  • A.Configure the IIS virtual directory to allow URL queries.
  • B.Configure the IIS virtual directory to allow template queries.
  • C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.
  • D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.
  • E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.
1

You are the administrator of a SQL Server 2000 computer. The server contains a database named Sales. The database will store sales transactions. Retail locations must be able to add transactions to the database 24 hours a day every day. The server is configured as shown in the exhibit.

You need to configure the data files and transaction log for the Sales database. What should you do?

  • A.Place the transaction log on physical disk 0 and the data file on the RAID-5 disk array.
  • B.Place the transaction log on the RAID-5 disk array and the data file on physical disk 0.
  • C.Place the transaction log and the data file on physical disk 0.
  • D.Place the transaction log and the data file on the RAID-5 disk array.
5

You are the administrator of a SQL Server 2000 computer. You are creating a data transformation services package. As the first step in this process, you need to load data from text files into a database table. These text files contain data on new stores that join your franchise. The text files list the data columns in the following format StoreID, StoreName, Address, City, State, PostalCode, ManagerID, StoreTypeID, FacilityID.

The destination table is configured as shown in the exhibit.

You want to load the data into the table as quickly as possible. What should you do?

  • A.Use a Bulk Insert Task to read the data into a temporary table. Use an Execute SQL task to import the appropriate data into the destination table.
  • B.Create and edit a format file to select the columns you want to import. Use a Bulk Insert Task, and then specify the format file to import the appropriate data into the destination table.
  • C.Use a transform. data task to import the data. Use Microsoft ActiveX transformation scripts to write the appropriate data to the appropriate columns in the destination table.
  • D.Create and edit a format file to select the columns you want to import. Use a transform. data task, and then specify the format file to import the appropriate data into the destination table.
5

You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.

Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.

What should you do?

  • A.Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.
  • B.Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.
  • C.Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.
  • D.Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.
5

You are the administrator of a SQL Server 2000 computer. The server contains a database named inventory. The database has a Parts table that has a field named InStock. When parts are shipped, a table named PartsShipped is updated. When Parts are received, a table names PartsReceived is updated. The relationship of these tables is shown in the exhibit.

You want the database to update the InStock field automatically. What should you do?

  • A.Add triggers to the PartsShipped and the PartsReceived tables that update the InStock field in the Parts table.
  • B.Create a user-defined function those calculations that calculates current inventory by running aggregate queries on the PartsShipped and PartsReceived tables.
  • C.Use a view that creates an InStock as a part of an aggregate query.
  • D.Create stored procedures for modifying the PartsReceived and the PartsShipped tables that also modify the InStock fielding the parts table. Use these procedures exclusively when modifying data in the PartsReceived and the PartsShipped tables.
5

You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.

You want to minimize changes to your security model and to your database applications. How should you modify the database?

  • A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.
  • B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.
  • C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.
  • D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.