Sie sind auf Seite 1von 8

Review Windows 2K Professional and MS SQL Server 2K 1

1/ Which of the following service pack is used to upgrade SQL Server 6.5 to SQL Server 2000 on
the same computer?
a. Service Pack 3.
b. Service Pack 1.5.
c. Service Pack 2.
d. Service Pack 5.

2/ You are the database administrator at a commercial bank. The integrity of data is extremely
critical for the bank. The management stipulates that you perform backup periodically to prevent
data loss. You do not want to take chances with the critical data and need to take the backup so
that the data in its entirety is backed up. You also require that the backed up database should be
carried forward to the next financial year. Which type of backup will you select?
a. Differential Backup.
b. Full Backup.
c. Filegroup Backup.
d. Differential Filegroup Backup.

3/ A user reports that all applications on his Windows 2000 Professional computer are running
very slow. You notice that the computer has 128 MB of RAM and 200 MB free disk space. What
should you do to improve the performance of the computer?
a. Add the user to the Power Users group.
b. Set the total paging file size to 75 percent of physical memory.
c. Perform a disk analysis, and defragment the disk, if recommended.
d. Ensure that the performance options are optimized for background services.

4/ What does the –f parameter in the BCP command refers to?


a. The maximum number of permissible errors that can occur before the bulk copy program is
cancelled.
b. The location of the format file that is created during the bulk copy program.
c. The location of the error file that stores the rows that the bulk copy program was unable to
transfer to the specified database.
d. The number of rows per batch of data that is copied.

5/ You have just finished installing a second instance of SQL Server 2000 on a machine. How
can you check if SQL Server was installed properly and is running? (Choose the best answer)
a. Run the sqlcli.iss file.
b. Use the Query Analyzer and try to run a query on Pubs database of this new Server instance.
c. Check the folder \\Microsoft SQL Server.
d. Check the registry.

6/ You are the administrator of several SQL Server 2000 databases. You need to import numeric
data from some SQL Server databases, which do not define the precision and scale values of
data consistently, to a database that stores financial data. How will you ensure data integrity while
importing data?
a. Change data types in source tables by using the ALTER COLUMN clause of the ALTER
TABLE statement. This will ensure data types use the lowest precision and scale values of data.
b. Change the data types in destination tables by using the ALTER COLUMN clause of the
ALTER TABLE statement. This will reflect the highest precision and scale values.
c. Set a flag on each DTS transformation for an exact match between the source and the
destination columns.
d. Set the maximum error count for each DTS transformation task equal to the number of rows of
data that you need to import. And, store rows of data generating errors in an exception file.
7/ BlueMun Inc. has a database running on SQL Server 2000 and many users connect to the
database through their Windows account. Some employees have been recently transferred to
another branch. John, the DBA at BlueMun Inc, needs to remove the login accounts of these
employees from SQL Server 2000. What should he do to ensure that only the invalid users are
deleted?
a. Execute and filter the sp_who system procedure and remove the login ids using
sp_revokelogins.
b. Execute and filter the sp_who system procedure and remove the login ids using
sp_revokedbaccess.
c. Execute and filter the sp_validatelogins system procedure and remove the login ids using
sp_revokedbaccess.
d. Execute and filter the sp_validatelogins system procedure and remove the login ids using
sp_revokelogins.

8/ Tedd, a DBA of Online Sales Inc., regularly checks database and other DBCC checks in order
to administer and maintain the SQL Server database. Tedd uses the SQLMaint utility and
specifies the CkDB argument with the SQLMaint command. Which of the following did Tedd
intend to do with this command?
a. Specify the database name, for which the maintenance tasks need to be performed.
c. Specify the location and name of the file in which the reports would be generated and stored.
b. Execute DBCC NEWALLOC statement on the specified database.
d. Execute DBCC CHECKDB statement on the specified database.

9/ You are the network administrator of a Windows 2000 Professional network. You encrypt a file
on a Windows 2000 Professional computer for security reasons. To enable a particular user
access the encrypted file, you create a private key by exporting a certificate in the Microsoft
Management Console (MMC) window. To export a certificate, what file format do you need to use
with Secure/Multipurpose Internet Mail Extension (S/MIME)?
a. DER Encoded binary X.509.
b. Base64 encoded X.509.
c. Cryptographic message syntax standard (PKCS #7).
d. Personal Information Exchange.

10/ Global Software Inc. maintains its databases on SQL Server 2000. John, a junior DBA, has
the db_ddladmin database role assigned. He requires permissions to add Windows 2003 groups
and users, and SQL Server users to a database. Marc, the DBA, wants to grant appropriate role
to John’s login. Which of the following system stored procedure statements will Marc use to do
so?
a. sp_addrolemember 'db_accessadmin', 'John'.
b. sp_addrolemember 'db_securityadmin’, 'John'.
c. sp_addrolemember 'db_admin', 'John'.
d. No change in database role required.

11/ Your computer runs on Windows 2000 Professional and has 64 MB of RAM. An application
that you have installed on your computer requires minimum 16 MB of memory. After you install
the application, you observe that the performance of the computer has become slow. To monitor
the memory, you want to generate an alert each time the memory becomes a bottleneck. Which
counter should you choose in the System Monitor for the alert to be generated?
a. Available bytes.
b. %Free Space.
c. Bytes Total/sec.
d. %Processor Time.

12/ You are the administrator of a SQL Server 2000 computer. The server contains a Data
Transformation Services (DTS) package that queries multiple databases and writes the results to
a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the
dtsrun utility to execute the DTS package. You want to ensure that connection properties, such
as login names and passwords, cannot be read or modified by users. Which of the following
actions should you take?

A. Save the DTS package so that it has an owner password.


B. Save the DTS package so that it has a user password.
C. Encrypt the DTS package details in the command line of the dtsrun utility.
D. Store the DTS package in the Meta Data Services repository.
E. Store the DTS package as a Microsoft Visual Basic file.

a. A, D
b. B, C
c. B, E
d. A, C

13/ You are the network administrator of a Windows 2000 Professional network. A user, Jack,
informs you that it takes a long time for him to log onto his system. He does not face any
problems when accessing network resources. You realise that his system seems to be the only
one on the network that is experiencing this problem. What can be the cause of this problem?
a. Jack is the member of multiple user groups.
b. Jack’s computer has a slower processor than the rest of the computers on the network.
c. Jack has a large user profile, which takes long to download.
d. Jack connects to the domain controller through a slow router, which is at a different subnet.

14/ You are a SQL Server 2000 database administrator of a bank. The bank has several hundred
branches spread all over the United States of America. The database server at the headquarter
stores the entire data of all the customers. As per the bank policy, when a customer mobilizes
his/her account, the customer's new balance must reflect on the database servers at all the
branches as well as at the headquarter. What would you do to minimize latency between the
database servers at the headquarter and the branch offices?
a. Implement merge replication. Use the DATETIME conflict resolver. Schedule replication at
non-working hours.
b. Implement transactional replication. Allow immediate updating of subscribers. Schedule
replication to run continuously.
c. Create a DTS package on the headquarters database server. Configure the DTS package to
import new account data from each of the servers at the branch offices and write it to all other
database servers. Schedule the DTS package to run during non-working hours.
d. Configure log shipping between the database server at the headquarters and the branch office
servers. Configure the headquarters server as the primary server and the branch office servers
as secondary servers. Schedule log backups and log shipping to run every 30 minutes.

15/ Jane has to install Windows 2000 Professional on 50 non-PXE (Pre-boot Executive
Environment) compliant computers. She creates and loads the RIS image on the RIS server.
When she starts all the 50 computers, she finds that the computers cannot connect to the RIS
server. What should Jane do to enable the computers to connect to the RIS server?
a. Create a non-PXE compliant remote boot disk by using the Rbfg.exe command.
b. Create a non-PXE complaint startup disk by using the winnt32.exe command.
c. Create a non-PXE complaint startup disk by using the sysprep.exe command.
d. Create a new RIS image for non-PXE compliant computers.

16/ One Windows 2000 Professional computer is going to share its Internet connection with three
other computers over a LAN. The computer will use a 56Kbps modem and a dial-up phone line
account with an ISP to connect to the Internet. What components must you configure on the
Windows 2000 Professional computer to enable ICS?
a. On the computer that will be used to dial the Internet connection, right-click My Computer and
select Sharing. Select the Enable Internet Connection Sharing For This Connection checkbox
from the Sharing tab of the dial-up connection’s Properties sheet. Physically connect the modem
to the computer. Open the Network And Dial-Up Connections window and double-click Make New
Connection to create a dial-up connection to the Internet.
b. Open the Network And Dial-Up Connections window and double-click Make New Connection
to create a dial-up connection to the Internet. Open the dial-up connection’s Properties sheet.
Select the Enable Internet Connection Sharing For This Connection checkbox from the Sharing
tab of the dial-up connection’s Properties sheet.
c. Go to Control Panel, double-click Phone And Modem Options. Click Modems, select the
modem you want to share, and click Properties. Click the Advanced tab and then click the Share
This Device option. Open the Network And Dial-Up Connections window and double-click Make
New Connection to create a dial-up connection to the Internet.
d. Open the Network And Dial-Up Connections window and double-click Make New Connection
to create a dial-up connection to the Internet. Go to Start/Programs/Administrative Tools and
select Routing And Remote Access. Configure the shared Internet connection from the Routing
And Remote Access Service (RRAS) MMC snap-in.

17/ You are the network administrator of Technology Solutions Inc. having a network of 100
computers running Windows 2000 Professional. Peter is the finance manager in the company. He
saves all his confidential and important documents in a folder called Financial Data. Peter asks
you to maximize the security of the folder, Financial Data, so that no other users can access this
folder. Peter also wants to be able to access this folder from any other computer on the network.
How will you secure the Financial Data folder?
a. Install the signing certificate on the computer that Peter uses.
b. Create a mandatory user profile for Peter and enable file encryption of the Financial Data
folder.
c. Create a roaming user profile for Peter and enable file encryption of the Financial Data folder.
d. Add the cipher /e /s *.* to the start up script of Peter’s computer.

18/ Your company has recruited an assistant database administrator to help you to manage SQL
2000 Servers. You have already created an account for him. You want to delegate management
of linked servers to the new user. Which of the following roles will you assign to him for the
required permissions? (Choose the best answer)
a. Assign him to sysadmin.
b. Assign him to serveradmin.
c. Assign him to processadmin.
d. Assign him to setupadmin.

19/ You try to create four databases and name them as INSERT, DELETE, BACKUP, and
REMOVE, respectively. However, you do not succeed in doing this. Which of the following name
can you use to name a database?
a. INSERT
b. DELETE
d. REMOVE
c. BACKUP

20/ As an administrator, you need to troubleshoot the SQL Server 2000 events. To do this, you
want to search for trace files and templates using wildcards. What file extensions will you specify
for the search?
a. *.TRC and *.TDF
b. *.TRC and *.TMP
c. *.TMP and *.TDF
d. *.TDF and *.DAT

21/ You don’t want to view various sites, such as sites related to pornography and violence on
your computer. Which Internet options settings enable you to do this?
a. Selecting the Security options present on the Advanced tab.
b. Selecting the Restricted sites option on the Security tab.
c. Moving the Private settings slider for the Internet zone to high.
d. Using the Content tab to enable the Content advisor.

22/ Your company has a large database with billions of records. Two analysts, who generate
reports and do rapid calculations based on this data, are the only users. Which SQL Server 2000
licensing mode will suite your requirements?
a. Per-processor license.
b. Any of the licensing mode.
c. Per-seat license.
d. Both the licensing modes need to be selected.

23/ You install a new plug-and-play internal modem on your Windows 2000 Professional
computer. The Windows 2000 Professional operating system does not detect it. As a result, the
driver of the modem is not being installed. How can you install the driver?
a. Use the Add New Hardware utility.
b. Use the Display Properties dialog box.
c. Use the Add/Remove Hardware wizard.
d. Install only Plug-and-Play hardware on Windows 2000 Professional.

24/ You are the administrator of a company named Firmware Corporation. One of the users shuts
down his computer and when he starts it, the computer does not boot up. You suspect that the
file system boot sector is corrupted. How can you resolve this problem?
a. Use recovery console to fix the MBR.
b. Reboot the system again, it will automatically correct the problem.
c. Use the F8 option at start up and select Last Known Good Configuration.
d. Use the Emergency Repair Disk to repair the problem.

25/ A company deploys Windows 2000 Professional for its three departments: logistics,
marketing, and finance. Additional processors are added to the workstations of the finance
department because of a sudden requirement. However, a certain processor has not been
recognized by a workstation. Identify the preferred mode to enable this processor.
a. Enable the second processor through a registry setting.
b. No preferred mode, the processor is already enabled.
c. Reinstall Windows 2000 Professional on the workstation.
d. Update the driver through the System applet in Control Panel.

26/ You are the network administrator of a small organization having 70 computers on the
network. You need to assign IP addresses to all the computers on the network. What IP address
class will you use to assign IP addresses to all the client computers on the network?
a. Class A.
b. Class B.
c. Class C.
d. Class D.

27/ Consider the following statements:


Statement A: RAID-5 is also known as Stripe set with parity because data is striped across an
array of three or more hard disks in RAID-5 volumes.
Statement B: RAID-5 is also known as Stripe set with parity because data parity is striped across
the disk array in RAID-5 volumes.
Which of the following alternatives is true, with respect to the above statements?
a. Both Statement A and Statement B are false.
b. Both Statement A and Statement B are true.
c. Satement A is true and Statement B is false.
d. Statement A is false and Statement B is true.
28/ You have attempted installing Windows 2000 Professional on 11 computers in the network
successfully. While installing the operating system on the next machine, you encounter
installation problems. You have a clear understanding on the installation process. Therefore, you
know the actions that are performed during installation process. To troubleshoot installation
problem, you want to know why the installation process was not successful. Identify the log file
that enables you to do that.
a. setupact.log.
b. setuperr.log.
c. setuperror.log.
d. setupaction.log.

29/ Identify the file system to which you should configure the boot partition when you need to boot
Windows 95 and Windows 2000 on your workstation. In addition, you want all files to be
accessible from both operating systems.
a. DOS.
b. FAT.
c. FAT 32.
d. NTFS.

30/ Tom is the administrator of a SQL Server 2000 database. Tom configures a set of alerts on
the server to notify him whenever certain operations fail or encounter errors. The notifications are
sent to his Microsoft Windows 2000 Professional computer by using the net send command. He
successfully tests the alerts. After several days, however, Tom stops receiving notifications when
operations fail or encounter an error. Tom verifies that the service is started. What should Tom do
to make sure that he continues to receive alert notifications?
a. Stop and restart the SQLServerAgent service.
b. Clear the application log on the SQL Server computer.
c. Clear the application log on the Windows 2000 Professional computer.
d. Install the SQL Server 2000 administrative tools on your Windows 2000 Professional computer.

31/ You are the administrator of a Windows 2000 Professional computer. A user Mary has
administrative rights on the computer. Some users report that Mary has modified their files on the
computer without their permission. You want Mary to be able to install programs, perform
backups, and manage printers, but you do not want her to view and modify files, permissions for
which have not been granted. What can you do to achieve the above by applying least
administrative effort?
a. Let Mary be the local administrator and limit her rights using a local policy.
b. Let Mary be the local administrator and change the NTFS permissions on other files to deny
Mary from viewing or modifying them.
c. Remove Mary’s administrative rights. Add her to the Power Users group and Backup Operators
group.
d. Remove Mary’s administrative rights. Add her to the Power Users group and grant her NTFS
permission to the files she will need to back up.

32/ You are working as a network administrator at TSE Inc. Susan Redcliffe, a user complains
that one of the applications is not responding on her computer. You decide to check the
performance of her computer to solve the problem. How would you do this?
a. Use the System Log option of the Event Viewer utility.
b. Use the Security Log option of the Event Viewer utility.
c. Use the Application Log option of the Event Viewer utility.
d. Use the System Tool option of the Computer Management window.

33/ You work as a help desk employee in a small firm. One user comes up with a problem that
during startup, his Windows 2000 Professional computer proceeds directly to the desktop without
first prompting for a username and password. You need to ensure that the system prompts for a
username and password before proceeding to the desktop. What should you do?
a. Disable the ‘disable CTRL+ALT+DEL’ setting in the local security settings.
b. Add the user to the local Administrator group and restart the computer.
c. In the Control Panel, modify the startup and recovery settings in the System option.
d. In the Control Panel, add the appropriate user accounts to the Users and Passwords setting.

34/ You are the administrator of computers with SQL Server 2000 installed on them. You have
configured multi server jobs. Which statement is true for multi-server jobs?
a. One master server can be associated with only one target server.
b. One master server can be associated with one or more target servers.
c. The target server is responsible for distributing jobs to the master server.
d. The target server defines and manages the schedules for all the jobs on the master server.

35/ You, as a database administrator at Abel Inc., perform a recovery operation on a SQL Server
2000 database. The server returns error 1105. While diagnosing the above problem, you find that
a database has been marked suspect. Which of the following system database will store this
information?
a. Sysmessages.
b. sysdevices.
c. sysdatabases.
d. Sysfiles.

36/ Which of the following is true about trusted connection between SQL Server and it’s clients?
a. Only Windows authenticated users can have a trusted connection.
b. All Mixed mode authenticated users have trusted connection.
c. All SQL Server authenticated users have trusted connection.
d. Between SQL Server and client, trusted connection cannot be established.

37/ You are the network administrator of a LAN consisting of a NetWare server and 25 Windows
2000 Professional computers. The NetWare server is configured as the file server. You need to
enable Windows 2000 Professional computers to access the resources on the NetWare server.
You also need to install a shared network printer on a Windows 2000 Professional computer on
your network. What protocol or protocols do you need to install on each of the client computers
on the network to connect to the NetWare server and access the print server?
a. Only NWLink.
b. Only TCP/IP.
c. DLC and NWLink.
d. TCP/IP and NWLink.

38/ Brad is the network administrator for Deias, Inc. He wants to configure the user computers
running Windows 2000 Professional on his network to run virus scans daily. At the same time, he
also wants that the virus scans should not interrupt or hinder any user’s work. How should he
accomplish this most effectively?
a. Use Task Scheduler to configure the virus scan task to run daily. Send the task to all users.
b. Use login scripts to specify the task of running virus scan at the time of log off every day on
every user’s computer.
c. Set a reminder task in your email with occurrence set to daily so that notifications are sent daily
to all he users just before the users leave office.
d. Use Administrative Templates to configure virus scan to run daily and distribute this task to all
the users.

39/ You, as a SQL Server 2000 database administrator, are responsible for ensuring data
consistency and securing data modification in a multi-user environment. You want to lock 64 KB
of data at a time whenever a page lock is implemented. Which granularity level will you use
considering that the data is available to many users at any given time?
a. Page.
b. DB.
c. Extent.
d. Table.

40/ Which of the following DTS tool is used for building DTS packages, and for importing,
exporting, and transforming data?
a. DTS Import/Export Wizard.
b. DTS Designer.
c. DTS Object Transfer.
d. DTS Bulk Insert.

Das könnte Ihnen auch gefallen