Download Administering a SQL Database Infrastructure.70-764.PremDumps.2019-03-20.57q.vcex

Vendor: Microsoft
Exam Code: 70-764
Exam Name: Administering a SQL Database Infrastructure
Date: Mar 20, 2019
File Size: 569 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
You manage a Microsoft SQL Server environment. You implement Transparent Data Encryption (TDE). A user will assist in managing TDE. You need to ensure that the user can view the TDE metadata while following the principle of lease privilege. Which permission should you grant?
  1. DDLAdmin
  2. db_datawriter
  3. dbcreator
  4. dbo
  5. View Database State
  6. View Server State
  7. View Definition
  8. sysadmin
Correct answer: G
Explanation:
Viewing the metadata involved with TDE requires the VIEW DEFINITION permission on the certificate.https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/transparent-data- encryption-tde
Viewing the metadata involved with TDE requires the VIEW DEFINITION permission on the certificate.
https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/transparent-data- encryption-tde
Question 2
You are the database administrator for a company that hosts Microsoft SQL Server. You manage both on-premises and Microsoft Azure SQL Database environments. You have a user database named HRDB that contains sensitive human resources data. The HRDB backup files must be encrypted. You need to grant the correct permission to the service account that backs up the HRDB database. Which permission should you grant?
  1. DDLAdmin
  2. db_datawriter
  3. dbcreator
  4. dbo
  5. View Database State
  6. View Server State
  7. View Definition
  8. sysadmin
Correct answer: G
Explanation:
Restoring the encrypted backup: SQL Server restore does not require any encryption parameters to be specified during restores. It does require that the certificate or the asymmetric key used to encrypt the backup file be available on the instance that you are restoring to. The user account performing the restore must have VIEW DEFINITION permissions on the certificate or key. https://docs.microsoft.com/en-us/sql/relational-databases/backup-restore/backup-encryption
Restoring the encrypted backup: SQL Server restore does not require any encryption parameters to be specified during restores. It does require that the certificate or the asymmetric key used to encrypt the backup file be available on the instance that you are restoring to. The user account performing the restore must have VIEW DEFINITION permissions on the certificate or key. 
https://docs.microsoft.com/en-us/sql/relational-databases/backup-restore/backup-encryption
Question 3
You are the database administrator for a company that hosts Microsoft SQL Server. You manage both on-premises and Microsoft Azure SQL Database environments. You plan to delegate encryption operations to a user. You need to grant the user permission to implement cell-level encryption while following the principle of least privilege. Which permission should you grant?
  1. DDLAdmin
  2. db_datawriter
  3. dbcreator
  4. dbo
  5. View Database State
  6. View Server State
  7. View Definition
  8. sysadmin
Correct answer: G
Explanation:
The following permissions are necessary to perform column-level encryption, or cell-level encryption: - CONTROL permission on the database. - CREATE CERTIFICATE permission on the database. Only Windows logins, SQL Server logins, and application roles can own certificates. Groups and roles cannot own certificates. - ALTER permission on the table. - Some permission on the key and must not have been denied VIEW DEFINITION permission. https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/encrypt-a-column-of-data 
The following permissions are necessary to perform column-level encryption, or cell-level encryption: 
- CONTROL permission on the database. 
- CREATE CERTIFICATE permission on the database. Only Windows logins, SQL Server logins, and application roles can own certificates. Groups and roles cannot own certificates. 
- ALTER permission on the table. 
- Some permission on the key and must not have been denied VIEW DEFINITION permission. 
https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/encrypt-a-column-of-data 
Question 4
A company has an on-premises Microsoft SQL Server environment and Microsoft Azure SQL Database instances. The environment hosts a customer database named DB1. Customers connect to hosted database instances by using line-of-business applications. Developers connect by using SQL Server Management Studio (SSMS). You need to grant the developers permission to alter views for DB1 while following the principle of least privilege. Which permission should you grant?
  1. DDLAdmin
  2. db_datawriter
  3. dbcreator
  4. dbo
  5. View Database State
  6. View Server State
  7. View Definition
  8. sysadmin
Correct answer: A
Explanation:
To execute ALTER VIEW, at a minimum, ALTER permission on OBJECT is required. Members of the db_ddladmin fixed database role can run any Data Definition Language (DDL) command in a database.https://technet.microsoft.com/en-us/library/ms190667(v=sql.90).aspx
To execute ALTER VIEW, at a minimum, ALTER permission on OBJECT is required. Members of the db_ddladmin fixed database role can run any Data Definition Language (DDL) command in a database.
https://technet.microsoft.com/en-us/library/ms190667(v=sql.90).aspx
Question 5
You have an on-premises server that runs Microsoft SQL Server 2016 Standard Edition. You need to identify missing indexes. What should you use?
  1. Activity Monitor
  2. Sp_who3
  3. SQL Server Management Studio (SSMS) Object Explorer
  4. SQL Server Data Collector
  5. SQL Server Data Tools (SSDT)
  6. SQL Server Configuration Manager
Correct answer: D
Explanation:
Data Collector can gather performance information from multiple SQL Server instances and store it in a single repository. It has three built-in data collecting specifications (data collectors) designed to collect the most important performance metrics. The information collected by default is about disk usage, query statistics, and server activity. The Query Statistics data collection set collects information about query statistics, activity, execution plans and text on the SQL Server instance. Missing indexes can be found with the execution plans.https://www.sqlshack.com/sql-server-performance-monitoring-data-collector/
Data Collector can gather performance information from multiple SQL Server instances and store it in a single repository. It has three built-in data collecting specifications (data collectors) designed to collect the most important performance metrics. The information collected by default is about disk usage, query statistics, and server activity. The Query Statistics data collection set collects information about query statistics, activity, execution plans and text on the SQL Server instance. Missing indexes can be found with the execution plans.
https://www.sqlshack.com/sql-server-performance-monitoring-data-collector/
Question 6
You have a database named DB1 that stores more than 700 gigabyte (GB) of data and serves millions of requests per hour. Queries on DB1 are taking longer than normal to complete. You run the following Transact-SOL statement:
SELECT* FROM sys.database_query_store_options
You determine that the Query Store is in Read-Only mode. You need to maximize the time that the Query Store is in Read-Write mode. Which Transact-SOL statement should you run?
  1. ALTER DATABASE DB1SET QUERY_STORE (QUERY_CAPTURE_MODE = ALL)
  2. ALTER DATABASE DB1SET QUERY_STORE (MAX_STORAGE_SIZE_MB = SO)
  3. ALTER DATABASE DB1SET QUERY_STORE (CLEANUP _POLICY = (STALE_QUERY_THR 14));
  4. ALTER DATABASE DB1SET QUERY_STORE (QUERY_CAPTURE_MODE = NONE)
Correct answer: C
Explanation:
Stale Query Threshold (Days): Time-based cleanup policy that controls the retention period of persisted runtime statistics and inactive queries. By default, Query Store is configured to keep the data for 30 days which may be unnecessarily long for your scenario. Avoid keeping historical data that you do not plan to use. This will reduce changes to read-only status. The size of Query Store data as well as the time to detect and mitigate the issue will be more predictable. Use Management Studio or the following script to configure time-based cleanup policy:ALTER DATABASE [QueryStoreDB]SET QUERY_STORE (CLEANUP_POLICY = (STALE_QUERY_THRESHOLD_DAYS = 14));https://docs.microsoft.com/en-us/sql/relational-databases/performance/best-practice-with-the- query-store
Stale Query Threshold (Days): Time-based cleanup policy that controls the retention period of persisted runtime statistics and inactive queries. By default, Query Store is configured to keep the data for 30 days which may be unnecessarily long for your scenario. Avoid keeping historical data that you do not plan to use. This will reduce changes to read-only status. The size of Query Store data as well as the time to detect and mitigate the issue will be more predictable. Use Management Studio or the following script to configure time-based cleanup policy:
ALTER DATABASE [QueryStoreDB]
SET QUERY_STORE (CLEANUP_POLICY = (STALE_QUERY_THRESHOLD_DAYS = 14));
https://docs.microsoft.com/en-us/sql/relational-databases/performance/best-practice-with-the- query-store
Question 7
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have a data warehouse that stores sales data. One fact table has 100 million rows. You must reduce storage needs for the data warehouse. You need to implement a solution that uses column-based storage and provides real-time analytics for the operational workload.
Solution: You remove any clustered indexes and load the table for processing.
Does the solution meet the goal?
  1. Yes
  2. No
Correct answer: B
Explanation:
Clustered columnstore tables offer both the highest level of data compression as well as the best overall query performance. Clustered columnstore tables will generally outperform clustered index or heap tables and are usually the best choice for large tables. For these reasons, clustered columnstore is the best place to start when you are unsure of how to index your table. https://docs.microsoft.com/en-us/azure/sql-data-warehouse/sql-data-warehouse-tables-overview
Clustered columnstore tables offer both the highest level of data compression as well as the best overall query performance. Clustered columnstore tables will generally outperform clustered index or heap tables and are usually the best choice for large tables. For these reasons, clustered columnstore is the best place to start when you are unsure of how to index your table. 
https://docs.microsoft.com/en-us/azure/sql-data-warehouse/sql-data-warehouse-tables-overview
Question 8
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company is developing a new business intelligence application that will access data in a Microsoft Azure SQL Database instance. All objects in the instance have the same owner. A new security principal named BI_User requires permission to run stored procedures in the database. The stored procedures read from and write to tables in the database. None of the stored procedures perform IDENTIFY_INSERT operations or dynamic SQL commands. The scope of permissions and authentication of BI_User should be limited to the database. When granting permissions, you should use the principle of least privilege. You need to create the required security principals and
grant the appropriate permissions.
Solution: You run the following Transact-SQL statement in the database:
CREATE USER BI_User WITH PASSWORD = 'Pa$$w0rd'
GRANT EXECUTE TO BI_User
EXEC sp_addrolemember 'db_datawriter', 'BI_user'
Does the solution meet the goal?
  1. Yes
  2. No
Correct answer: B
Explanation:
One method of creating multiple lines of defense around your database is to implement all data access using stored procedures or user-defined functions. You revoke or deny all permissions to underlying objects, such as tables, and grant EXECUTE permissions on stored procedures. This effectively creates a security perimeter around your data and database objects. https://docs.microsoft.com/en-us/dotnet/framework/data/adonet/sql/managing-permissions-with- stored-procedures-in-sql-server
One method of creating multiple lines of defense around your database is to implement all data access using stored procedures or user-defined functions. You revoke or deny all permissions to underlying objects, such as tables, and grant EXECUTE permissions on stored procedures. This effectively creates a security perimeter around your data and database objects. 
https://docs.microsoft.com/en-us/dotnet/framework/data/adonet/sql/managing-permissions-with- stored-procedures-in-sql-server
Question 9
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
Your company is developing a new business intelligence application that will access data in a Microsoft Azure SQL Database instance. All objects in the instance have the same owner. A new security principal named BI_User requires permission to run stored procedures in the database. The stored procedures read from and write to tables in the database. None of the stored procedures perform IDENTIFY_INSERT operations or dynamic SQL commands. The scope of permissions and authentication of BI_User should be limited to the database. When granting permissions, you should use the principle of least privilege. You need to create the required security principals and grant the appropriate permissions.
Solution: You run the following Transact-SQL statement:
CREATE USER BI_User WITH PASSWORD = 'Pa$$W0rd'
GRANT EXECUTE TO BI_User
Does the solution meet the goal?
  1. Yes
  2. No
Correct answer: A
Explanation:
One method of creating multiple lines of defense around your database is to implement all data access using stored procedures or user-defined functions. You revoke or deny all permissions to underlying objects, such as tables, and grant EXECUTE permissions on stored procedures. This effectively creates a security perimeter around your data and database objects.https://docs.microsoft.com/en-us/dotnet/framework/data/adonet/sql/managing-permissions-with- stored-procedures-in-sql-server
One method of creating multiple lines of defense around your database is to implement all data access using stored procedures or user-defined functions. You revoke or deny all permissions to underlying objects, such as tables, and grant EXECUTE permissions on stored procedures. This effectively creates a security perimeter around your data and database objects.
https://docs.microsoft.com/en-us/dotnet/framework/data/adonet/sql/managing-permissions-with- stored-procedures-in-sql-server
Question 10
Note: This question is part of a series of questions that use the same or similar answer
choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
You are migrating a set of databases from an existing Microsoft SQL Server instance to a new instance. You need to complete the migration while minimizing administrative effort and downtime. Which should you implement?
  1. log shipping
  2. an Always On Availability Group with all replicas in synchronous-commit mode
  3. a file share witness
  4. a SQL Server failover cluster instance (FCI)
  5. a Windows Cluster with a shared-nothing architecture
  6. an Always On Availability Group with secondary replicas in asynchronous-commit mode
Correct answer: A
Explanation:
SQL Server Log shipping allows you to automatically send transaction log backups from a primary database on a primary server instance to one or more secondary databases on separate secondary server instances. The transaction log backups are applied to each of the secondary databases individually.https://docs.microsoft.com/en-us/sql/database-engine/log-shipping/about-log-shipping-sql- server?view=sql-server-2017
SQL Server Log shipping allows you to automatically send transaction log backups from a primary database on a primary server instance to one or more secondary databases on separate secondary server instances. The transaction log backups are applied to each of the secondary databases individually.
https://docs.microsoft.com/en-us/sql/database-engine/log-shipping/about-log-shipping-sql- server?view=sql-server-2017
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!