Download New Updated (June) Microsoft 70-465 Practice Test 61-70

Ensurepass

 

QUESTION 61

DRAG DROP

You plan to deploy a database by using SQL Server 2014.

 

Your company identifies the following requirements for the database:

 

clip_image002The name of all stored procedures must start with “usp_”always.

clip_image002[1]All distribution statistics must be updated daily.

 

You need to identify which feature must be used to meet each database requirement.

 

Which features should you identify?

 

To answer, drag the appropriate feature to the correct database requirement in the answer area.

 

clip_image004

 

Correct Answer:

clip_image006

 

 

QUESTION 62

You are troubleshooting an application that runs a query. The application frequently causes deadlocks. You need to identify which transaction causes the deadlock. What should you do? More than one answer choice may achieve the goal. Select the BEST answer.

 

A.

Query the sys.dm_exec_sessions dynamic management view.

B.

Query the sys.dm_exec_requests dynamic management view.

C.

Create a trace in SQL Server Profiler that contains the Deadlock graph event

D.

Create an extended events session to capture deadlock information.

 

Correct Answer: D

Explanation:

Troubleshooting deadlocks

You have been receiving reports from users indicating that certain applications are returning deadlock errors. To maximize the effectiveness of troubleshooting these problems, you decide to focus on the deadlocks that are hit most frequently. You create an Extended Events session that:

 

/ Configures deadlock event tracking for the session. / Specifies a target that aggregates based on an identifier for the deadlock.

 

You run the Extended Events session, and after additional deadlocks are reported you are able to obtain aggregated deadlock information, along with the complete XML deadlock graph for each source. Using this information you are able to pin point the most common deadlocks and start working on a solution.

Create an Extended Events Session

View Event Session Data

 

 

QUESTION 63

DRAG DROP

You plan to deploy SQL Server 2014.

 

You identify the following security requirements for the deployment:

 

clip_image002[2]Users must be prevented from intercepting and reading the T-SQL statements sent from the clients to the database engine.

clip_image002[3]All database files and log files must be encrypted if the files are moved to another disk on another server.

 

You need to identify which feature meets each security requirement. The solution must minimize processor overhead.

 

Which features should you identify?

 

To answer, drag the appropriate feature to the correct requirement in the answer area.

 

clip_image008

 

Correct Answer:

clip_image010

 

 

QUESTION 64

You have two databases named DB1 and DB2 that are located on the same server. You plan to create a stored procedure named SProc1 in DB1. SProc1 will query a table named Table2 in DB2. You need to recommend a solution to ensure that SProc1 can access Table2 without granting users direct access to Table2. What should you include in the recommendation? More than one answer choice may achieve the goal. Select the BEST answer.

 

A.

Contained databases

B.

Application roles

C.

Cross-database ownership chaining

D.

Digital certificates

 

Correct Answer: B

Explanation:

An application role is a database principal that enables an application to run with its own, user-like permissions. You can use application roles to enable access to specific data to only those users who connect through a particular application. Unlike database roles, application roles contain no members and are inactive by default.

 

Application Roles

 

 

QUESTION 65

DRAG DROP

You are designing an authentication strategy for a new server that has SQL Server 2014 installed. The strategy must meet the following business requirements:

 

clip_image002[4]The account used to generate reports must be allowed to make a connection during certain hours only.

clip_image002[5]Failed authentication requests must be logged.

 

You need to recommend a technology that meets each business requirement. The solution must minimize the amount of events that are logged.

 

Which technologies should you recommend?

 

To answer, drag the appropriate solution to the correct business requirement in the answer area.

 

clip_image012

 

Correct Answer:

clip_image014

QUESTION 66

You are creating a database that will store usernames and passwords for an application. You need to recommend a solution to store the passwords in the database. What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.

 

A.

One-way encryption

B.

Encrypting File System (EFS)

C.

Transparent Data Encryption (TDE)

D.

Reversible encryption

 

Correct Answer: C

Explanation:

* Transparent Data Encryption (TDE) is a special case of encryption using a symmetric key. TDE encrypts an entire database using that symmetric key called the database encryption key. The database encryption key is protected by other keys or certificates which are protected either by the database master key or by an asymmetric key stored in an EKM module.

 

* SQL Server provides the following mechanisms for encryption:

Transact-SQL functions

Asymmetric keys

Symmetric keys

Certificates

Transparent Data Encryption

 

Transparent Data Encryption (TDE)

 

 

QUESTION 67

DRAG DROP

You need to recommend a backup process for data warehouse database.

 

The solution must meet the following requirements:

 

clip_image002[6]Ensure that if a hardware failure occurs, you can bring the database online without losing more than 24 hours of transactions.

clip_image002[7]Minimize the amount of administrative effort required to restore any lost data.

clip_image002[8]Minimize the space used by transaction logs.

 

What should you include in the recommendation?

 

To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.

 

clip_image015

 

Correct Answer:

clip_image016

 

 

QUESTION 68

DRAG DROP

You plan to deploy a database to SQL Azure.

 

You must create two tables named Table 1 and Table 2 that will have the following specifications:

 

clip_image002[9]Table1 will contain a date column named Column1 that will contain a null value approximately 80 percent of the time.

clip_image002[10]Table2 will contain a column named Column2 which is the product of two other columns in Table2.

 

Both Table1 and Table2 will contain over one million rows.

 

You need to recommend which options must be defined for the columns. The solution must minimize the time it takes to retrieve data from the tables.

 

Which options should you recommend?

 

To answer, drag the appropriate options to the correct column in the answer area.

 

clip_image018

 

Correct Answer:

clip_image020

 

 

QUESTION 69

You have a server named Server1 that has 16 processors. You plan to deploy multiple instances of SQL Server 2014 to Server1. You need to recommend a method to allocate processors to each instance. What should you include in the recommendation? More than one answer choice may achieve the goal. Select the BEST answer.

 

A.

Processor affinity

B.

Windows System Resource Manager (WSRM)

C.

Max Degree of Parallelism

D.

Resource Governor

 

Correct Answer: A

Explanation:

CPU affinity management through Windows System Resource Manager is not recommended for SQL Server multi-instance management. Instead, use the processor affinity settings in SQL Server.

Server Properties (Processors Page)

 

 

QUESTION 70

DRAG DROP

You need to recommend the actions that are required to partition a table. In which order should the four actions be performed? To answer, move the actions from the list of actions to the answer area and arrange them in the correct order.

 

clip_image022

 

Correct Answer:

clip_image024

 

Free VCE & PDF File for Microsoft 70-465 Real Exam

Instant Access to Free VCE Files: MCSE|MCSA|MCITP…
Instant Access to Free PDF Files: MCSE|MCSA|MCITP…