You are a professional level SQL Sever 2008 Database Administrator. A new database application is hosted by the instance. The data security strategy should be designed for the application. The data should be duplicated to another instance of SQL Server 2008 by utilizing the Snapshot duplication. Since you are the technical support of the company, you should make sure that all stored data should be encrypted, and the minimum amount of administrative effort should be utilized. Which action will you perform?
A. Encrypted connections should be enabled between the instances.
B. Transparent data encryption should be enabled for the Publisher, Distribution, and Subscriber databases
C. Transparent data encryption for the MSDB database should be enabled on the two instances.
D. Certificate-based encryption should be enabled for the Publisher, Distribution, and Subscriber databases.
You are configuring a new SQL Server installation.
The SQL Server instance will be used for both online analytical processing (OLAP) and relational data. The data in the server is accessed frequently. You can configure the services, startup type, and accounts used by the services that run on the server according to the following table:
You want to raise the level of security on the server. You need to minimize the surface area for potential attacks on the server. What should you do? (More than one answer choice may achieve the goal. Select the BEST answer.)
A. Change the Startup type property for all the services to Manual.
B. Change the Startup type property for all the services to Disabled.
C. Create a single non-administrative local user account and assign it to each of the services.
D. Create three different non-administrative local user accounts and assign them to each of the services.
You are a professional level SQL Sever 2008 Database Administrator. A solution will be implemented to have hardware configurations obtained. The hardware configuration obtained should include the number of processors on a computer and the processor type of all SQL Server 2008 computers. The requirements listed below should be satisfied by the solution. The solution should be hosted on the central computer. And the hardware configurations for multiple servers should be verified bythe solution. A technology should be selected to satisfy the requirements, and the least amount of development effort should be utilized. Which action should you perform to finish the task?
A. To finish the task, you should utilize the Invoke-Sqlcmd cmdlet in SQL Server PowerShell cmdlet.
B. To finish the task, you should utilize the ExecuteWQL function to define policies based on conditions.
C. To finish the task, you should utilize the Windows Management Instrumentation (WMI) provider for the server events.
D. To finish the task, you should utilize the ExecuteSql function to define policies based on conditions.
You administer a SQL Server 2008 infrastructure. You plan to deploy a new SQL Server 2008 multi-node failover cluster. The failover cluster uses a storage area network (SAN) that will use redundant array of independent disks (RAID) level 5. You need to format the logical unit numbers (LUNs) for optimal performance of the database data files. Which of the following is the best allocation unit size you should use?
You administer a SQL Server 2008 instance that hosts a large database.
The following backup strategy is used for the database: A full database backup is performed at 02:00 hr every Monday. A differential backup is performed at 23:00 hr every day. A transaction log backup is performed on an hourly basis. A power failure on Thursday causes the SQL Server 2008 server to restart at 09:15 hr.
Fifteen minutes after the server restarts, the users report that they are unable to execute certain queries that access customer data. You discover that the customer data is unmodified after the power failure. When you execute the DBCC CHECKDB command on the database, you receive the following error message: