You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()
You are the network administrator for. You administer a Windows Server 2003 computer named TestKing4. TestKing4 has a single physical disk that is configured as a simple volume. You plan to store the files for a large database on TestKing4. You plan to install additional physical disks on TestKing4. You need to reconfigure the disks on TestKing4. Your solution must provide fault tolerance for the operating system and the database files. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two.)
You are the network administrator for ExamSheet.net. You administer ExamSheet's Windows 2000 network. You want to update the device driver for the network adapter in your Windows 2000 Professional computer. You log on the computer by using the local Administrator account. You use Device Manager to verify that the network adapter is installed on your computer. You select the Driver tab and Update Driver option, and install a new driver from the network adapter manufacturer. You restart the computer. After displaying the Windows 2000 Professional startup screen, your computer displays aCkernel stop error message. You want to configure your computer to start successfully. Which two methods can you use to resolve the problem?()
You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
You administer a SQL Server 2008 instance. You plan to deploy a third-party database application to the instance. The application uses stored procedures that are developed by using SQL CLR integration. The application must be configured to enable the EXTERNAL_ACCESS code access security setting. You need to ensure that the application is deployed to the instance without loss of functionality. What should you do first?()
You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. Computers on the network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. The users of the Windows 2000 Professional computers run legacy applications which are not certified for Windows 2000. These applications will not run for those users who only have User rights on the computers. You want to uniformly grant the users of these computers with the least possible administrative rights and still allow them to run the applications. What should you do? ()
You want the user APP_DBA to administer the Oracle database from a remote machine. APP_DBA is granted the SYSDBA privilege to perform administrative tasks on the database. Which file is used by the Oracle database server to authenticate APP_DBA?()
You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. Toyour surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this?()
You administer a SQL Server 2008 instance. You plan to deploy a new database to the instance. The database will be subject to frequent inserts and updates. The database will have multiple schemas. One of the schemas will contain a large amount of read-only reference data. You need to design the physical database structure for optimal backup performance. What should you do?()
You are the network administrator for You administer a Windows Server 2003 computer named TestKing5. The hardware vendor for TestKing5 notifies you that a critical hotfix is available. This hotfix is required for all models of this computer that have a certain network interface card. You need to find out if the network interface card that requires the hotfix is installed in TestKing5. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)()