What should you do?
You work as the Database Administrator for www.company.com.com. All servers on the
www.company.com.com network run Windows Server 2003 and Windows Server 2000, and all client
computers run Windows XP rofessional and Windows Vista. The www.company.com.com network
area consists of a single Active Directory domain named www.company.com.com.
The www.company.com.com network contains a Microsoft SQL Server 2005 database server named
COMPANY-DB111, which you administer at a regular interval of time. COMPANY-DB111 contains and
hosts three databases that support different types of business requirements. The network uses the
DBA database that supports internal operations including maintaining data, accounting, and mailing.
The network’s regular users make use of stored procedures for the data values that need insertion
into the tables. The stored procedures used in the network of the company are designed to access
SQL variant type parameters and then use the values to build and execute ad hoc query statements
that are the part of the SQL statements. During a routine network check, you discover that there are
several odd occurrences in the database. The odd occurrences include data deleted from tables and
other unauthorized activity. You suspect a user is executing the unauthorized statements through
the stored procedures. You are required to stop the unauthorized changes while having least impact
on the stored procedures that are in use. Your explanation must use the least administrative effort.
What should you do?
Which of the following is a fundamental unit of deployment that allows a user to create external, user-defined
Which of the following is a fundamental unit of deployment that allows a user to create external,
user-defined functions using any common language runtime (CLR) language?
You need to configure a folder that allows everyone in your department to view and edit the files in the folde
You need to configure a folder that allows everyone in your department to view and edit the files in
the folder. You also need to ensure that users outside the department cannot access the files. What
should you do?
Which of the following statements will you use to accomplish the task?
You work as a Database Administrator for DataOneWorld Inc. Management instructs you to remove
an object from the relational database management system. Which of the following statements will
you use to accomplish the task?
Which of the following configuration settings causes the unanticipated error?
You work as a Web Application Developer for company Inc. The company uses Visual Studio .NET as
its application development platform. You create an ASP.NET Web application using the .NET
Framework. The application is installed in a Network Load Balancing cluster. You are evaluating a
bug statement. When a failure takes place in the Web application, the client occasionally gets an
error page as anticipated. At other times, the client gets an exception stack with the error message,
which is not anticipated. You are required to find out the configuration setting that causes the
unanticipated error. Which of the following configuration settings causes the unanticipated error?
Which item in the Share With menu should you use?
You need to configure a folder that allows everyone in your group to view and modify files. Which
item in the Share With menu should you use?
Which of the following enables a user to use generic methods to access a database and to focus on the coding r
Which of the following enables a user to use generic methods to access a database and to focus on
the coding rather than the syntax for a specific database API?
Which of the following options is a Microsoft .NET Framework component that adds native data querying capabili
Which of the following options is a Microsoft .NET Framework component that adds native data
querying capabilities to .NET languages?
Windows hides some files by default to:
Windows hides some files by default to:
Which of the following will you use to accomplish the task?
You work as a Database Administrator for InfoTech Inc. The company has a database and they want
you to create a design for a database that will support the enterprise’s operations and objectives.
Which of the following will you use to accomplish the task?