Exam Code: 70-465 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Designing Database Solutions for Microsoft SQL Server 2012
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass 70-465 Exam.
Q21. You need to recommend a solution that addresses the index fragmentation and index width issue.
What should you include in the recommendation? (Each correct answer presents part of the solution. Choose all that apply.)
A. Change the data type of the modifiedBy column to tinyint.
B. Change the data type of the lastModified column to smalldatetime.
C. Remove the id column from the clustered index.
D. Remove the modifiedBy column from the clustered index.
E. Change the data type of the id column to bigint.
F. Remove the lastModified column from the clustered index.
Answer: ABF
Q22. You plan to create a database.
The database will be used by a Microsoft .NET application for a special event that will last for two days.
During the event, data must be highly available.
After the event, the database will be deleted.
You need to recommend a solution to implement the database while minimizing costs. The solution must not affect any existing applications.
What should you recommend?
More than one answer choice may achieve the goal. Select the BEST answer.
A. SQL Server 2012 Standard
B. SQL Azure
C. SQL Server 2012 Express with Advanced Services
D. SQL Server 2012 Enterprise
Answer: B
Q23. You need to recommend a solution to meet the security requirements of the junior database administrators.
What should you include in the recommendation?
A. a database role
B. a server role
C. a shared login
D. a credential
Answer: B
Q24. You have a database named DB1.
You plan to create a stored procedure that will insert rows into three different tables. Each insert must use the same identifying value for each table, but the value must increase from one invocation of the stored procedure to the next.
Occasionally, the identifying value must be reset to its initial value.
You need to design a mechanism to hold the identifying values for the stored procedure to use.
What should you do?
More than one answer choice may achieve the goal. Select the BEST answer.
A. Create a sequence object that holds the next value in the sequence. Retrieve the next value by using the stored procedure.
B. Increment the sequence object to the next value by using an ALTER SEQUENCE statement. Reset the value as needed by using a different ALTER SEQUENCE statement.
C. Create an identity column in each of the three tables. Use the same seed and the same increment for each table. Insert new rows into the tables by using the stored procedure. Use the DBCC CHECKIDENT command to reset the columns as needed.
D. Create a fourth table that holds the next value in the sequence. At the end each transaction, update the value by using the stored procedure. Reset the value as needed by using an UPDATE statement.
E. Create a sequence object that holds the next value in the sequence. Retrieve the next value by using the stored procedure. Reset the value by using an ALTER SEQUENCE statement as needed.
Answer: D
Q25. You need to recommend a solution to minimize the amount of time it takes to execute sp5.
What should you include in the recommendation?
A. Use the EXECUTE AS clause in sp5.
B. Create all stored procedures used by sp5 by using the same owner.
C. Copy sp5 to each database.
D. Enable cross-database chaining.
Answer: B
Q26. You need to recommend a solution for the deployment of SQL Server 2012. The solution must meet the business requirements.
What should you include in the recommendation?
A. Deploy two servers that have SQL Server 2012 installed and implement database mirroring.
B. Create a new instance of SQL Server 2012 on the server that hosts the SQL Server 2005 instance.
C. Upgrade the existing SQL Server 2005 instance to SQL Server 2012.
D. Deploy two servers that have SQL Server 2012 installed and implement Failover Clustering.
Answer: C
Q27. DRAG DROP
You plan to deploy SQL Server 2012.
You identify the following security requirements for the deployment:
-Users must be prevented from intercepting and reading the T-SQL statements sent from the clients to the database engine.
-All database files and log files must be encrypted if the files are moved to another disk on another server.
You need to identify which feature meets each security requirement. The solution must minimize processor overhead.
Which features should you identify?
To answer, drag the appropriate feature to the correct requirement in the answer area.
Answer:
Q28. You are creating a database that will store usernames and credit card numbers for an application.
You need to recommend a solution to store and resuse the credit card numbers in the database.
What should you recommend? More than one answer choice may achieve the goal. Select the BEST answer.
A. Data encryption
B. Transparent Data Encryption (TDE)
C. Encrypting File System (EFS)
D. Data hashing
Answer: A
Q29. You need to recommend a solution for Application1 that meets the security requirements.
What should you include in the recommendation?
A. Encrypted columns
B. Certificate Authentication
C. Secure Socket Layer (SSL)
D. Signed stored procedures
Answer: B
Q30. You need to recommend an isolation level for usp_UpdateOrderDetails. Which isolation level should recommend?
A. repeatable read
B. read uncommitted
C. read committed
D. serializable
Answer: D