PrepAway - Latest Free Exam Questions & Answers

Category: 70-465 (v.4)

Briefing 70-465: Designing Database Solutions for Microsoft SQL Server 2012 (update January 1st, 2018)

Which technologies should you recommend?

DRAG DROP
You are designing an authentication strategy for a new server that has SQL Server 2014 installed. The strategy
must meet the following business requirements:
The account used to generate reports must be allowed to make a connection during certain hours only.
Failed authentication requests must be logged.
You need to recommend a technology that meets each business requirement. The solution must minimize the
amount of events that are logged.
Which technologies should you recommend?
To answer, drag the appropriate solution to the correct business requirement in the answer area.
Select and Place:

Which features should you identify?

DRAG DROP
You plan to deploy SQL Server 2014.
You identify the following security requirements for the deployment:
Users must be prevented from intercepting and reading the T-SQL statements sent from the clients to the
database engine.
All database files and log files must be encrypted if the files are moved to another disk on another server.
You need to identify which feature meets each security requirement. The solution must minimize processor
overhead.
Which features should you identify?
To answer, drag the appropriate feature to the correct requirement in the answer area.
Select and Place:

What should you include in the recommendation?

You have two databases named DB1 and DB2 that are located on the same server.
You plan to create a stored procedure named SProc1 in DB1.
SProc1 will query a table named Table2 in DB2.
You need to recommend a solution to ensure that SProc1 can access Table2 without granting users direct
access to Table2.
What should you include in the recommendation?
More than one answer choice may achieve the goal. Select the BEST answer.

You need to identify which feature meets each monitorin…

DRAG DROP
You plan to deploy SQL Server 2014.
Your company identifies the following monitoring requirements:
Tempdb must be monitored for insufficient free space.
Deadlocks must be analyzed by using Deadlock graphs.
You need to identify which feature meets each monitoring requirement.Which features should you identify?
To answer, drag the appropriate feature to the correct monitoring requirement in the answer area.
Select and Place:

Which features should you identify?

DRAG DROP
You plan to deploy three highly available SQL Server environments that will use SQL Server 2014.
You identify the following specifications for each environment as shown following table.

You need to recommend which high-availability feature is required for each environment.
Which features should you identify?
To answer, drag the appropriate feature to the correct requirement in the answer area.
Select and Place:

Which features should you identify?

DRAG DROP
You plan to deploy a database by using SQL Server 2014.
Your company identifies the following requirements for the database:
The name of all stored procedures must start with “usp_”always.
All distribution statistics must be updated daily.
You need to identify which feature must be used to meet each database requirement.
Which features should you identify?
To answer, drag the appropriate feature to the correct database requirement in the answer area.
Select and Place:

Which features should you identify?

DRAG DROP
You plan to deploy SQL Server 2014.
Your company identifies the following monitoring requirements for the database:
An e-mail message must be sent if the SQL Server Authentication mode changes.
An e-mail message must be sent if CPU utilization exceeds 90 percent.
You need to identify which feature meets each monitoring requirement.
Which features should you identify?
To answer, drag the appropriate feature to the correct monitoring requirement in the answer area.
Select and Place:


Page 5 of 11« First...34567...10...Last »