PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What action should you perform to accomplish this task?

You are a database developer and you have about two years experience in creating
business intelligence (BI) solutions by using SQL Server2008. Now you are employed in a
company which is named NaproStar and work as the technical support for the company
which uses SQL Server2008 Analysis Services (SSAS) solution. To meet the business
development, a dimension named DimSales is created with an Amount attribute, and then it
is used in a cube structure. Now you are assigned a task to make sure that aggregations
have no relationship with the Amount attribute. What action should you perform to
accomplish this task?

You need to design the database to meet the given requirements

You use SQL Server 2008 to design a database that will hold incoming XML responses for
an EDI system. You have the following requirements: ·The data is accessible to
heterogeneous platforms. ·The database stores various types of reports from multiple
sources. ·The solution allows search by keywords. ·The database stores large amounts of
data. ·The database is scalable. You need to design the database to meet the given
requirements. What should you do?

You need to choose an encryption strategy that has the minimum effect on the performance of the server

You are designing a database solution by using SQL Server 2008. The database has a
large number of tables that have columns that contain sensitive data. The sensitive data
must be protected. You need to choose an encryption strategy that has the minimum effect
on the performance of the server. What should you do? (More than one answer choice may
achieve the goal. Select the BEST answer.)

Which solution would be chosen to solve that problem?

You are a database developer and you have about two years experience in creating
business intelligence (BI) solutions by using SQL Server2008. Now you are employed in a
company which is named NaproStar and work as the technical support for the company
which uses SQL Server2008. To meet the business development, you use SQL Server 2008
to create a SQL Server 2008 Integration Services (SSIS) package. You have a Research
server named SQL_RES01 and a Sales server named SQL_SAL01. SQL_RES01 is not
connected to SQL_SAL01 in the network. Then you have the SSIS package configured on
the SQL_SAL01 server, however, you get a failure of the configuration, which is because the
SQL_RES01 server can not be connected by the package. In order to solve that problem,
the package should be modified to refer to the SQL_SAL01 server when you execute the
configuration.
Which solution would be chosen to solve that problem?

which command should be executed?

You are a database developer and you have about two years experience in creating
business intelligence (BI) solutions by using SQL Server2008.
Now you are employed in a company which is named NaproStar and you are in charge of a
SQL
Server 2008
Integration Services (SSIS) instance.
The SSIS instance has the packages stored in a SQL Server 2008 instance while another
SSIS instance had its packages stored in a shared directory.
According to the order of your manager, you need to deploy the package from the SSIS
instance to another
SSIS instance.
In order to achieve this goal, which command should be executed?

What action should you perform?

You are a database developer and you have about two years experience in creating
business intelligence (BI) solutions by using SQL Server2008. Now you are employed in a
company which is named NaproStar and work as a developer of a SQL Server 2008
Integration Services (SSIS) for the company. To meet the business requirements, SSIS
should be used on a SQL Server 2008 failover cluster. There is a complex package on your
server and it needs a long time to start it. Now your manager asks you to make sure that the

package can be resumed when it fails to execute the failover. What action should you
perform?

You need to minimize the surface area for potential attacks on the server

You are configuring a new SQL Server installation. The SQL Server instance will be used
for both online analytical processing (OLAP) and relational data. The data in the server is
accessed frequently. You can configure the services, startup type, and accounts used by
the services that run on the server according to the following table. You want to raise the
level of security on the server. You need to minimize the surface area for potential attacks
on the server. What should you do? (More than one answer choice may achieve the goal.
Select the BEST answer.)

which one would be used?

You are a database developer and you have about two years experience in creating
business intelligence (BI) solutions by using SQL Server2008. Now you are employed in a
company which is named NaproStar and work as a developer of a SQL Server 2008

Integration Services (SSIS) for the company. To meet the business requirement, you use the
SSIS to develop a package and use your local development environment to test the
package. Then the package is deployed to the file system in the production environment.
After the deployment, the users notice that the package contains no connection strings,
which means the package gets a failure of the deployment. Now you are assigned a task to
make sure that the package can be viewed and executed by changing the protection level of
the package. So of the protection levels of the package, which one would be used?

which one would be used to configure the report?

You are a database developer and you have about two years experience in creating
business intelligence (BI) solutions by using SQL Server2008.
Now you are employed in a company which is named NaproStar and work as a developer of
a SQL Server
2008 Reporting Services (SSRS) for the company.
To meet the business requirement, you develop a SSRS report with a parameter named
@ProductPriceRangeID.
Then you select a specific region to set the value of @ProductPriceRangeID in the report.
In order to stop modifying the value of @ProductPriceRangeID, you have to configure the
report.
So of the methods below, which one would be used to configure the report?