What should you do?
Your company has two SQL Server 2005 computers named SQL1 and SQL2. Transaction log shipping occurs
from SQL1 to SQL2 by using default SQL Server Agent schedule settings.
You need to reconfigure transaction log shipping to provide minimum latency on SQL2.
What should you do?
Which two actions should you perform?
You are implementing transaction log shipping for a database named DB1 from a server named SQL1 to a
server named SQL2. Because DB1 is 100 GB in size, it is too big to transfer over the network in a reasonable
amount of time.
You need to minimize the impact on the network while you initialize the secondary database.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
Your company has a network that consists of two domains named DOM1 and DOM2. There is no trust
relationship between DOM1 and DOM2. DOM1 contains a server named SQL1. DOM2 contains a server named
SQL2. Both servers run SQL Server 2005.
The SQL Server instance on SQL1 uses the DOM1SQLService1 service account. The SQL Server instance on
SQL2 uses the DOM2SQLService2 service account. There are no mirroring endpoints on either server.
SQL1 contains a database named DB1. You want to mirror DB1 to SQL2 by using highprotection mode without a
witness.
You need to create the database mirroring endpoints and configure security on all participating server instances.
What should you do?
Which three actions should you perform?
Your company uses a mission-critical database named DB1, which is located on a server named SQL1. You
want to mirror DB1 on a second server named SQL2.
Before you can establish database mirroring, you need to prepare DB1 and the servers for mirroring.
Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
What should you do first?
Your company has two SQL Server 2005 computers named SQL1 and SQL2. A user in your company named
Eric writes many ad hoc queries against the company databases. Eric has access to the Customer database on
SQL1. He does not have access to the Sales database on SQL2.
You need to ensure that Eric can write queries that join information from both servers.
What should you do first?
What should you do?
Your company has multiple servers in a distributed environment. You work with two SQL Server 2005
computers named SQL1 and SQL2. Each server uses SQL Server Authentication and they use different logins.
You need to write a distributed query that joins the data on SQL1 with the data on SQL2.
What should you do?
What should you do?
Your application must access data that is located on two SQL Server 2005 computers. One of these servers is
named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your
application. However, on SQL2 you only have permissions to select data.
You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY
Transact-SQL statement. However, the query fails when executed.
You need to troubleshoot the cause of the error.
What should you do?
What should you do first?
You configure a new SQL Server 2005 computer to use TCP/IP with all default settings. Your corporate policy
requires that each server use a firewall. You find that you can connect to the SQL Server instance from the local
computer. However, client computers cannot connect to the SQL Server instance.
You need to identify the most likely cause of the connection issues.
What should you do first?
Which permission set should you use?
Application developers in your company create an assembly that contains a CLR function. This CLR function
reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer.
You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the
least privileged security permission set.
Which permission set should you use?
Which two protocols can you use to achieve this goal?
You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client
computers might use to connect to the server.
Which two protocols can you use to achieve this goal? (Each correct answer presents a complete solution. Choose
two.)