PrepAway - Latest Free Exam Questions & Answers

Category: 98-364 (v.1)

Exam 98-364: Database Fundamentals (update January 3rd, ,2015)

What should you do?

You work as the Database Administrator for www.company.com.com. All servers on the
www.company.com.com network run Windows Server 2003 and Windows Server 2000, and all client
computers run Windows XP rofessional and Windows Vista. The www.company.com.com network
area consists of a single Active Directory domain named www.company.com.com.
The www.company.com.com network contains a Microsoft SQL Server 2005 database server named
COMPANY-DB111, which you administer at a regular interval of time. COMPANY-DB111 contains and
hosts three databases that support different types of business requirements. The network uses the
DBA database that supports internal operations including maintaining data, accounting, and mailing.
The network’s regular users make use of stored procedures for the data values that need insertion
into the tables. The stored procedures used in the network of the company are designed to access

SQL variant type parameters and then use the values to build and execute ad hoc query statements
that are the part of the SQL statements. During a routine network check, you discover that there are
several odd occurrences in the database. The odd occurrences include data deleted from tables and
other unauthorized activity. You suspect a user is executing the unauthorized statements through
the stored procedures. You are required to stop the unauthorized changes while having least impact
on the stored procedures that are in use. Your explanation must use the least administrative effort.
What should you do?

Which of the following factors lead you to define an artificial key for use as a primary key in the Info table

You work as a Database Designer for Tritech Inc. You are designing a table named Info. The table
contains the following attributes:
Login and Password
Name
ContactNumber
Address
Each new employee joining the company is assigned an E-mail Login and Password. This E-mail Login
and Password is used by each employee
to access his account on the company’s Web site. The value of both the attributes should be unique
and cannot be NULL. You design an
artificial key EmpID in the Info table to serve as a primary key. Which of the following factors lead
you to define an artificial key for use as a
primary key in the Info table?
Each correct answer represents a part of the solution. Choose all that apply.

Which of the following steps will you take to resolve the issue?

You are the database administrator for a MySQL database server. The network contains new and old
(pre-4.1) clients. You configure another database server on the network. You allow the network
clients to connect to the new server. Some users complain that when they try to connect to the
server, they receive the following error:
ERROR 1251: The client does not support authentication protocol requested by the server; consider
upgrading MySQL client
You do not want to upgrade any client or server right now, and want to enable all clients to connect
to the new server successfully. Which of
the following steps will you take to resolve the issue?


Page 3 of 1212345...10...Last »