单项选择题X 纠错
A.A single RAID 5 volume
B.A single RAID 10 volume
C.A RAID 0 volume and a RAID 5 volume
D.A RAID 1 volume and a RAID 5 volume
你可能喜欢
单项选择题
A.A single RAID 5 volume should be utilized.
B.A RAID 1 volume and a RAID 5 volume should be utilized.
C.A single RAID 10 volume should be utilized.
D.A RAID 0 volume and a RAID 5 volume should be utilized.
多项选择题
A.To finish the task, Log shipping should be utilized.
B.To finish the task, Failover clustering should be utilized.
C.To finish the task, Replication should be utilized.
D.To finish the task, Database snapshot should be utilized.
单项选择题
A.To finish the task, hourly database snapshots should be utilized.
B.To finish the task, the full-recovery model along with transaction log backups should be utilized.
C.To finish the task, the full-recovery model along with differential backups should be utilized.
D.To finish the task, the simple-recovery model along with differential backups should be utilized.
单项选择题
A.To finish the task, the Distributed File System Replication service should be utilized.
B.To finish the task, a configuration server should be utilized.
C.To finish the task, the policies should be distributed by utilizing Group Policy Objects.
D.To finish the task, the policies should be distributed by utilizing the Active Directory directory service.
单项选择题
A.To finish the task, the client-side profiler trace should be utilized.
B.To finish the task, the dynamic management views should be utilized.
C.To finish the task, the data collector should be utilized.
D.To finish the task, the System Monitor counter log trace should be utilized.
单项选择题
A.Create multiple data files for the database.
B.Place database and log files on the same volume.
C.Configure the affinity mask option appropriately.
D.Configure the affinity I/O mask option appropriately.
单项选择题
A.To finish the task, you should utilize Resource Governor.
B.To finish the task, you should utilize Database Engine Tuning Advisor.
C.To finish the task, you should utilize Extended Events.
D.To finish the task, you should utilize Performance Monitor (SYSMON).
单项选择题
A.Use Transparent data encryption.
B.Use the Trustworthy option for the database.
C.Use the Advanced Encryption Standard encryption on all columns in the database.
D.Use the NTFS file system security and limit the access of the database files to the SQL Server 2008 Service account.
单项选择题
A.The SAFE code access security should be utilized for the assembly.
B.All public static fields should be replaced with public fields.
C.All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
D.All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.
多项选择题
A.Use NTFS file system compression on the volume.
B.Use row-level compression on the document table.
C.Use varbinary(MAX) data type with FILESTREAM storage.
D.Enable row-level compression on all columns that use the vardecimal() data type.