PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

You create a new site definition from an existing site definition. You copy the directory of the existing site definition to a new directory in the correct folder. You use a different name for the new directory.

You need to ensure that the new site definition is available on a Microsoft Windows SharePoint Services site.

What should you do?

Which XML fragment should you use?

You are developing an assembly named ABC.Employee.dll for the human resources (HR) department site of your company. The assembly has the following properties:

* A namespace named ABC
* PublicKeyToken def148956c61a16b
* Version 1.0.0.0

The assembly also contains two Web Part classes named Benefits and ContactInformation. You may add additional Web Parts before you release the assembly.

You need to ensure that all the Web Parts in the assembly are trusted.

Which XML fragment should you use?

What should you do?

You are a database administrator for AIOTestKing.com. You discover that a SQL Server 2005 application performs slowly when you execute the following query. SELECT * FROM Orders WHERE OrderStatus = ‘InProgress’ The application executes this query as an ad hoc query. This query usually executes much more quickly. The OrderStatus column is indexed. Only a small number of the rows contain the value InProgress.
However, the OrderStatus column index is not being used, even though the index is optimal for this query. You need to improve the performance of this query. However, you cannot modify the application that executes the query. Your solution must also minimize the impact on end users. What should you do?

What should you do?

You are a database administrator for AIOTestKing.com. Users report that a SQL Server 2005 application is performing slowly. You check the SQL Server error log and discover that the server frequently runs out of memory to manage locks. The application designer informs you that dirty reads are acceptable. You need to resolve the problem indicated by the error log. What should you do?

What should you do?

You work as DBA at AIOTestKing.com. You administer a SQL Server 2005 computer named AIOTestKingA. Users regularly report that they receive error messages stating that the transaction log is full. When they get this message, their data changes fail. You notice that disk space on AIOTestKing A is limited. You need to configure AIOTestKing A to automatically prevent users’ data changes from failing due to full transaction logs. What should you do?

What should you do?

You work as DBA at AIOTestKing.com. You administer two SQL Server 2005 computers named AIOTestKing A and AIOTestKing B. AIOTestKing A and AIOTestKing B contain a copy of a database named Sales. The database is replicated between AIOTestKing A and AIOTestKing B by using transactional replication. A full backup of each database is performed every night.
Transaction log backups are performed every hour. Replication latency is typically less than two minutes. One afternoon, the Sales database on AIOTestKing A becomes corrupted.
You are unable to repair the database. The Sales database on AIOTestKing B is unaffected.
You need to return the Sales database on AIOTestKing A to normal operation as quickly as possible. You must ensure a minimum loss of data and minimal impact to users of either server. What should you do?

Which Transact-SQL script should you use?

You work as DBA at AIOTestKing.com. You administer a Microsoft Windows Server 2003 computer named AIOTestKingA. AIOTestKing A runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to AIOTestKingA. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name\password for first account:
pentest\P@ssw0rdUser name\password for second account: hacktest\password You need to provide the information security team with the requested access to AIOTestKing A.
Which Transact-SQL script should you use?