Download Provisioning SQL Databases.test4prep.70-765.2018-08-27.1e.111q.vcex


Download Exam

File Info

Exam Provisioning SQL Databases
Number 70-765
File Name Provisioning SQL Databases.test4prep.70-765.2018-08-27.1e.111q.vcex
Size 4.29 Mb
Posted August 27, 2018
Downloads 71



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Note: This questions is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
Your company has several Microsoft Azure SQL Database instances. 
Data encryption should be allowed to be implemented by the client applications that access the data. Encryption keys should not be made available to the database engine. 
You need to configure the database. 
What should you implement?

  • A: transport-level encryption
  • B: cell-level encryption
  • C: Transparent Data Encryption
  • D: Always Encrypted
  • E: Encrypting File System
  • F: BitLocker
  • G: dynamic data masking



Question 2
Note: This questions is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
You deploy Microsoft SQL Server to a virtual machine in Azure. You distribute the database files and filegroups across multiple Azure storage disks. 
You must be able to manage the databases as individual entities by using SQL Server Management Studio. All data in the databases must be stored encrypted. Backups must be encrypted by using the same key as the live copy of the database. 
You need to secure the data. 
What should you implement?

  • A: transport-level encryption
  • B: cell-level encryption
  • C: Transparent Data Encryption
  • D: Always Encrypted
  • E: Encrypting File System
  • F: BitLocker
  • G: dynamic data masking



Question 3
You are deploying a Microsoft SQL Server database that will support a mixed OLTP and OLAP workload. The target virtual machine has four CPUs. 
You need to ensure that reports do not use all available system resources. 
What should you do?

  • A: Increase the default database file auto growth sizes.
  • B: Increase the value for the Minimum System Memory setting.
  • C: Set MAXDOP to half the number of CPUs available.
  • D: Increase the value for the Minimum Memory per query setting.



Question 4
A company has an on-premises Microsoft SQL Server 2014 environment. The company has a main office in Seattle, and remote offices in Amsterdam and Tokyo. You plan to deploy a Microsoft Azure SQL Database instance to support a new application. You expect to have 100 users from each office. 
In the past, users at remote sites reported issues when they used applications hosted at the Seattle office. 
You need to optimize performance for users running reports while minimizing costs. 
What should you do?

  • A: Implement an elastic pool.
  • B: Implement a standard database with readable secondaries in Asia and Europe, and then migrate the application.
  • C: Implement replication from an on-premises SQL Server database to the Azure SQL Database instance.
  • D: Deploy a database from the Premium service tier.



Question 5
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets stated goals.
You have a mission-critical application that stores data in a Microsoft SQL Server instance. The application runs several financial reports. The reports use a SQL Server-authenticated login named Reporting_User. All queries that write data to the database use Windows authentication. 
Users report that the queries used to provide data for the financial reports take a long time to complete. The queries consume the majority of CPU and memory resources on the database server. As a result, read-write queries for the application also take a long time to complete. 
You need to improve performance of the application while still allowing the report queries to finish. 
Solution: You create a snapshot of the database. You configure all report queries to use the database snapshot.
Does the solution meet the goal?

  • A: Yes
  • B: No



Question 6
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets stated goals.
You have a mission-critical application that stores data in a Microsoft SQL Server instance. The application runs several financial reports. The reports use a SQL Server-authenticated login named Reporting_User. All queries that write data to the database use Windows authentication. 
Users report that the queries used to provide data for the financial reports take a long time to complete. The queries consume the majority of CPU and memory resources on the database server. As a result, read-write queries for the application also take a long time to complete. 
You need to improve performance of the application while still allowing the report queries to finish. 
Solution: You configure the Resource Governor to limit the amount of memory, CPU, and IOPS used for the pool of all queries that the Reporting_user login can run concurrently.
Does the solution meet the goal?

  • A: Yes
  • B: No



Question 7
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets stated goals.
You have a mission-critical application that stores data in a Microsoft SQL Server instance. The application runs several financial reports. The reports use a SQL Server-authenticated login named Reporting_User. All queries that write data to the database use Windows authentication. 
Users report that the queries used to provide data for the financial reports take a long time to complete. The queries consume the majority of CPU and memory resources on the database server. As a result, read-write queries for the application also take a long time to complete. 
You need to improve performance of the application while still allowing the report queries to finish. 
Solution: You configure the Resource Governor to set the MAXDOP parameter to 0 for all queries against the database.
Does the solution meet the goal?

  • A: Yes
  • B: No



Question 8
You administer a Microsoft SQL Server 2012 database. 
Users report that an application that accesses the database displays an error, but the error does not provide meaningful information. No entries are found in the SQL Server log or Windows event logs related to the error. 
You need to identify the root cause of the issue by retrieving the error message. 
What should you do?

  • A: Create an Extended Events session by using the sqlserver.error_reported event.
  • B: Create a SQL Profiler session to capture all ErrorLog and EventLog events.
  • C: Flag all stored procedures for recompilation by using sp_recompile.
  • D: Execute sp_who.



Question 9
You administer a Microsoft SQL Server 2012 server. One of the databases on the server supports a highly active OLTP application. 
Users report abnormally long wait times when they submit data into the application. 
You need to identify which queries are taking longer than 1 second to run over an extended period of time. 
What should you do?

  • A: use SQL Profiler to trace all queries that are processing on the server. Filter queries that have a Duration value of more than 1,000.
  • B: Use sp_configure to set a value for blocked process threshold. Create an extended event session.
  • C: Use the Job Activity monitor to review all processes that are actively running. Review the Job History to find out the duration of each step.
  • D: Run the sp_who command from a query window.
  • E: Run the DBCC TRACEON 1222 command from a query window and review the SQL Server event log.



Question 10
You administer a Microsoft SQL Server 2012 database. 
You need to ensure that the size of the transaction log file does not exceed 2 GB. 
What should you do?

  • A: Execute sp_configure 'max log size', 2G.
  • B: use the ALTER DATABASE...SET LOGFILE command along with the maxsize parameter.
  • C: In SQL Server Management Studio, right-click the instance and select Database Settings. Set the maximum size of the file for the transaction log.
  • D: in SQL Server Management Studio, right-click the database, select Properties, and then click Files. Open the Transaction log Autogrowth window and set the maximum size of the file.








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset