PrepAway - Latest Free Exam Questions & Answers

Category: 70-465 (v.1)

Exam 70-465: Designing Database Solutions for Microsoft SQL Server 2012 (update May 20th, 2015)

What should you recommend?

Your network contains an Active Directory domain that has two groups named Group1 and
Group2.
The domain contains two SQL Server instances named SQLDev and SQLProd. Each SQL
Server instance has access to various storage media.
The SQL Server instances have a database that contains a table named Table1.
Table1 contains a column named Column1. The value for Column1 can be either Value1 or
Value2.
You need to recommend a solution to ensure that users in Group1 can retrieve only rows
from Column1 that contain the value of Value1.
What should you recommend?

What should you recommend?

You have two SQL Server instances named SQLDev and SQLProd that have access to
various storage media.
You plan to synchronize SQLDev and SQLProd.
You need to recommend a solution that meets the following requirements:
• The database schemas must be synchronized from SQLDev to SQLProd.
• The database on SQLDev must be deployed to SQLProd by using a package.
• The package must support being deployed to Windows Azure SQL Database.
What should you recommend?More than one answer choice may achieve the goal. Select
the BEST answer.

Which features should you identify?

DRAG DROP
You plan to deploy SQL Server 2014.
Your company identifies the following monitoring requirements for the database;
• An e-mail message must be sent if the SQL Server Authentication mode changes.
• An e-mail message must be sent if CPU utilization exceeds 90 percent.
You need to identify which feature meets each monitoring requirement.
Which features should you identify?
To answer, drag the appropriate feature to the correct monitoring requirement in the answer area.

You need to set up a monitoring process that will capture any cases where statistics could have been useful if

You are the new database administrator for a SQL Server 2014 instance.
You conduct an assessment on the instance and determine that the auto create statistics
setting on the database named DB1 has been turned off. You see no evidence that any
maintenance has been occurring.
You want to set up monitoring to see if query performance is being affected.
You need to set up a monitoring process that will capture any cases where statistics could
have been useful if they existed.
What should you do?

Which features should you identify?

DRAG DROP
You plan to deploy SQL Server 2014.
Your company identifies the following monitoring requirements:
• Tempdb must be monitored for insufficient free space.
• Deadlocks must be analyzed by using Deadlock graphs.
You need to identify which feature meets each monitoring requirement.
Which features should you identify?
To answer, drag the appropriate feature to the correct monitoring requirement in the answer area.

Which features should you identify?

DRAG DROP
You plan to deploy three highly available SQL Server environments that will use SQL Server 2014.
You identify the following specifications for each environment as shown following table.

You need to recommend which high-availability feature is required for each environment.
Which features should you identify?
To answer, drag the appropriate feature to the correct requirement in the answer area.

Which features should you identify?

DRAG DROP
You plan to deploy a database by using SQL Server 2014.
Your company identifies the following requirements for the database:
• The name of all stored procedures must start with “usp_”always.
• All distribution statistics must be updated daily.
You need to identify which feature must be used to meet each database requirement.
Which features should you identify?
To answer, drag the appropriate feature to the correct database requirement in the answer area.

Which features should you identify?

DRAG DROP
You plan to deploy SQL Server 2014.
You identify the following security requirements for the deployment:
• Users must be prevented from intercepting and reading the T-SQL statements sent
from the clients to the database engine.
• All database files and log files must be encrypted if the files are moved to another
disk on another server.
You need to identify which feature meets each security requirement. The solution must
minimize processor overhead.
Which features should you identify?
To answer, drag the appropriate feature to the correct requirement in the answer area.


Page 2 of 1012345...10...Last »