单项选择题X 纠错
A.To finish the task, you should utilize Resource Governor.
B.To finish the task, you should utilize Database Engine Tuning Advisor.
C.To finish the task, you should utilize Extended Events.
D.To finish the task, you should utilize Performance Monitor (SYSMON).
你可能喜欢
单项选择题
A.To finish the task, database and log files should be placed on the same volume.
B.To finish the task, the affinity mask option should be configured properly.
C.To finish the task, multiple data files should be create for the database.
D.To finish the task, the affinity I/O mask option should be configured properly.
单项选择题
A.To finish the task, the client-side profiler trace should be utilized.
B.To finish the task, the dynamic management views should be utilized.
C.To finish the task, the data collector should be utilized.
D.To finish the task, the System Monitor counter log trace should be utilized.
单项选择题
A.To finish the task, Data Collector should be utilized.
B.To finish the task, the SQLdiag.exe utility should be utilized.
C.To finish the task, SQL Server Profiler and the tracerpt.exe utility should be utilized.
D.To finish the task, SQL Server Profiler and System Monitor should be utilized.
单项选择题
A.ROW compression should be utilized for the EmployeeData table.
B.The Profile column should be stored by utilizing filestream storage, and the NTFS file system Compression should be utilized.
C.PAGE LEVEL compression should be utilized for the EmployeeData table.
D.The Profile column should be implemented as a CLR user-defined type.
单项选择题
A.Replace read write non-static fields in the code with static fields.
B.Replace read-only static fields in the code with read write static fields.
C.Use the peverify.exe PEVerify tool to verify whether the code meets the type-safety requirements.
D.Use the regasm.exe assembly registration tool to register the assembly on the server before deployment.
单项选择题
A.Symmetric key encryption
B.Asymmetric key encryption
C.Certificate-based encryption
D.Transparent data encryption
单项选择题
A.Use Transparent data encryption.
B.Use the Trustworthy option for the database.
C.Use the Advanced Encryption Standard encryption on all columns in the database.
D.Use the NTFS file system security and limit the access of the database files to the SQL Server 2008 Service account.
单项选择题
A.Configure the default Web site on the instance to use the Integrated Security type.
B.Configure the application pool used by the default Web site to use a domain account.
C.Configure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.
D.Register a service principal name (SPN) in the Active Directory directory service for the SSRS instance.
多项选择题
A.Use NTFS file system compression on the volume.
B.Use row-level compression on the document table.
C.Use varbinary(MAX) data type with FILESTREAM storage.
D.Enable row-level compression on all columns that use the vardecimal() data type.
单项选择题
A.Create the database by using a single data file and a single log file.
B.Create the database by using a single data file and multiple log files.
C.Create the database by using a single log file and multiple filegroups.
D.Create the database by using a single log file and a filegroup that has multiple data files.