Interesting Questions from 70-228(MS SQL Server 2000)

Discussion in 'MCSE' started by Tman, May 20, 2004.

  1. Tman

    Tman Guest

    I had appeared for 70-228 last week but I don't understand
    why I could not pass and have been diagnosing the Question
    till Now. It looks like some questions have 2 answers.

    Please verify.

    1.You are the administrator of two Mircosoft Windows 2000
    computers. One computer is running
    Internet Information Services (IIS), and the other is
    running SQL Server 2000. Company partners
    need to connect by means of the Internet and query data
    stored on the SQL Server computer.
    Some of these partners have computers that do not use
    Microsoft operating systems or Web
    browsers. You need to configure the IIS and SQL Server
    2000 computers to allow access to data
    by means of the IIS virtual directory. IIS uses Basic
    Authentication to allow access to the
    virtual directory. Only company partners should have
    access to the SQL Server computer by means
    of the Internet. The partners should be allowed to make ad
    hoc queries. You want to be able to
    audit successful and failed logins to the SQL Server
    computer. You want to allow the partners
    access to the SQL Server computer while keeping your
    security scheme as simple as possible.
    Which two actions should you take? (Each correct answer
    represents part of the solution.
    Choose two.)

    A. Configure the IIS virtual directory to allow URL
    queries.
    B. Configure the IIS virtual directory to allow template
    queries.
    C. Create a new Windows user account. Create a
    corresponding Windows Authenticated login on the SQL
    Server
    computer. Configure the IIS virtual directory to always
    use this login when connecting to the SQL Server
    computer.
    D. Create a Windows Authenticated login on the SQL Server
    computer for the IIS Internet Guest Account.
    Configure the IIS virtual directory to always use the
    Internet Guest Account when connecting to the SQL Server
    computer.
    E. Create a Windows Authenticated login for each company
    partner on the SQL Server computer. Configure the IIS
    virtual directory to use Windows Integrated Authentication
    when connecting to the SQL Server computer.

    Answer: AC
    Why not A&E ( Choosing E would be more secure since each
    company would know its own password)



    2. You are the administrator of a SQL Server 2000
    computer. You are configuring a database
    for an inventory application. The hard disks on your
    server are configured as shown in the
    exhibit (Not Available). The operating system files are
    located on drive C. Your database
    will store a maximum of 6 GB of data and requires a
    maximum of 2 GB of disk space for the
    transaction log. You want to optimize database
    performance. What should you do?

    A. Add a 2-GB transaction log to drive D, a 3-GB data file
    to drive E, and a 3-GB data file to drive F
    B. Add a 1-GB transaction log to drive C, a 1-GB
    transaction log to drive D, a 3-GB data file to drive E,
    and a 3-
    GB data file to drive F
    C. Add a 1-GB transaction log to drive E, a 1-GB
    transaction log to drive F, a 3-GB data file to drive E,
    and a 3-GB
    data file to drive F
    D. Add a 2-GB transaction log to drive F, a 3-GB data file
    to drive D, and a 3-GB data file to drive E

    Answer: D

    Why Not A( How does Microsoft rate an answer to be correct
    or wrong,In this situation both A & D are
    correct, so How should one Mark the Answer
    Microsoft way so that nothing goes wrong)


    3. You are the administrator of a SQL Server 2000
    database. You import a table of geographic
    information from a Microsoft Access database into a SQL
    Server 2000 database. The table has
    12,000 rows. Each row averages 5,000 bytes. The table
    contains lookup data that does not
    change. You want to minimize the size of the data file and
    the time required to back up the
    data. Which two actions should you take?(Each correct
    answer presents part of the solution,
    Choose two )

    A. Create a 60-MB data file named Geography.ndf
    B. Create a 95-MB data file named Geography.ndf
    C. Create a 60-MB data file named Geography.mdf
    D. Create a 95-MB data file named Geography.mdf
    E. Place the table in the PRIMARY filegroup
    F. Place the table in a new filegroup named LOCATION

    Answer: BF (Is this right if so How)

    *Can somebody tell me How the above is calculated. The way
    I calculate it looks like onyly 57MB
    space is occupied (12000 * 5000 /1024*1024).


    4. You are the administrator of a Microsoft Windows NT
    Server 4 0 computer The server is the
    PDC in your domain and also runs SQL Server 2000. The
    server has four processors and 1 GB of
    RAM. Your network consists of 500 client computers that
    are running Microsoft Windows
    Millennium Edition. Users report that when they log on in
    the morning their computers respond
    slowly and occasionally return error messages. You use
    System Monitor to monitor processor
    performance and RAM utilization You discover that the %
    Total Time and % User Time counters
    average 90 percent and the % Privileged Time counter
    averages 20 percent. The Available Mbytes
    counter averages 800 MB. You need to improve server
    performance for user logons. What should you
    do?

    A. Increase the physical RAM on the computer to 2 GB
    B. Increase the virtual RAM on the computer to 4 GB
    C. Configure SQL Server to use only processors 1,2, and 3
    D. Configure SQL Server to use only processors 0, 1, and 2

    Answer: C (Why not D)



    5- You are the administrator of a SQL Server 2000 computer
    at a bank's headquarters.
    Customers can access their accounts from headquarters or
    from branch offices. The server at
    headquarters maintains a master copy of all account data
    for all customers. When a customer
    deposits or withdraws funds at a branch office, the
    customer's new balance must be reflected on
    the computers at that office and at headquarters. You want
    to minimize latency between the
    headquarters and branch offices. You want to copy account
    data between the server at
    headquarters and the servers at the branch offices. What
    should you do?

    A. Implement merge replication. Use the DATETIME (Later
    Wins) conflict resolver. Schedule replication for off-
    peak hours.
    B. Implement transactional replication. Allow immediate-
    updating subscribers. Schedule replication to run
    continuously.
    C. Create a data transformation services package on the
    server at headquarters. Configure the DTS package to
    import new account data from each of the servers at the
    branch offices and write it to all other servers. Schedule
    the DTS package to run during off-peak hours.
    D. Add all branch office servers to the headquarters
    server as linked servers. Create a job on the headquarters
    server. Configure the job to query each linked server for
    new account data and write this data to the other
    servers. Schedule the job to run every three minutes.
    E. Configure log shipping between the headquarters server
    and the branch office servers. Configure the
    headquarters server as the primary server and the branch
    office servers as secondary servers. Schedule log
    backups and log shipping to run every 10 minutes.

    Answer: B (Why not A, coz from the description it looks
    like the branch data should be updated
    first)
     
    Tman, May 20, 2004
    #1
    1. Advertisements

  2. Tman

    Guest Guest

    to long, cant be bothered, we dont get paid for this you
    know
     
    Guest, May 20, 2004
    #2
    1. Advertisements

  3. Tman

    Ron Guest

    AC is correct, because: You want to allow the partners
    access to the SQL Server computer while keeping your
    security scheme as simple as possible.
    Answer E is a more complex security scheme, albeit more
    secure, but C will get the job done quite nicely.
     
    Ron, May 20, 2004
    #3
  4. Tman

    Neil Guest

    <REMARKABLE AMOUNT OF SNIPAGE>

    Did you lift these directly from the exam you failed? Did you read the
    NDA? Did you understand what you agreed to? yeeesh?
     
    Neil, May 20, 2004
    #4
  5. Tman

    Session Guest

    Hi, it is stated for this question that there are two
    answers, each one of them making part of the solution.

    I suggest that you take a look at
    www.braindumpscentral.com, it is a very good site with a
    tone of questions for various exams, and people give
    their answers and reasonings on the questions.

    better luck next time, I'm sure you'll get it.

    Session
     
    Session, May 21, 2004
    #5
  6. Tman

    Tman Guest

    Thanks session, I am giving the exam again this Sunday -
    This time i am not taking any chances and cross-checking
    all the answers.
     
    Tman, May 21, 2004
    #6
  7. Tman

    Paul Lynch Guest

    Except that answer E would not work as you cannot perform 'double-hop'
    impersonation when using Windows Integrated Authentication. Apart from
    the fact that you would never use NTLM auth for an Internet
    application anyway.

    Sheesh, its when reading lame stuff like this that I realise just how
    safe my job really is.....


    Regards,

    Paul Lynch
    MCSE
     
    Paul Lynch, May 21, 2004
    #7
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.