Microsoft Certification Questions

Q:

You are the administrator of a SQL Server 2000 computer named CorpSQL. The server is a member of a Microsoft Windows NT domain named CORPORATE. Franz maintains a local user account on CorpSQL and is a member of the local Power Users group. He requests access to the SQL Server databases that are stored on CorpSQL.You need to allow Franz to access CorpSQL. Which Transact-SQL statement should you execute?

A) EXEC sp_grantlogin CorpSQL\Franz B) EXEC sp_grantlogin Franz
C) EXEC sp_grantlogin [Power Users\Franz] D) EXEC sp_grantlogin CORPORATE\Franz
 
Answer & Explanation Answer: A) EXEC sp_grantlogin CorpSQL\Franz

Explanation:
Report Error

View Answer Report Error Discuss

0 1969
Q:

Which authentication method provides the highest level of security?

A) Microsoft encrypted authentication version 2 (MS-CHAP v2) B) Microsoft encrypted authentication (MS-CHAP)
C) Encrypted authentication (CHAP) D) Shiva password Authentication Protocol (SPAP)
 
Answer & Explanation Answer: A) Microsoft encrypted authentication version 2 (MS-CHAP v2)

Explanation:

Microsoft encrypted auhentication version 2 (MS-CHAP v2) is the most secure authentication method.

Report Error

View Answer Report Error Discuss

0 1965
Q:

John is a system administrator for a renowned travel agency.The agency is planning to upgrade its computer systems to Windows XP Professional.Most of the computers are networked but some computers do not have CD-ROM drives.How can John upgrade the computer systems without CD-ROM drives to Windows XP Professional?

A) can attach a portable tape backup unit to each computer and install the operating system from it. B) can use the windows installer program to push out the operating system.
C) can perfom the installation over a network share. D) can not install windows XP Professional unless he installs a CD-ROM drive in the computer systems that do not have them.
 
Answer & Explanation Answer: C) can perfom the installation over a network share.

Explanation:
Report Error

View Answer Report Error Discuss

0 1963
Q:

You responsible for maintaining an application that was written by a former colleague at XYZ.

 

The application reads from and writes to log files located on the local network. The original author included the following debugging code to facilitate maintenance:

try {
Debug.WriteLine(“Inside Try”);
throw(new IOException());}
catch (IOException e) {
Debug.WriteLine (“IOException Caught”);}
catch (Exception e) {
Debug.WriteLine(“Exception Caught”);}.
finally {
Debug.WriteLine (“Inside Finally”);}
Debug.WriteLine (“After End Try”);

 

Which output is produced by thus code?

A) Inside Try Exception Caught IOException Caught Inside Finally After End Try B) Inside Try Exception Caught Inside Finally After End Try
C) Inside Try IOException Caught Inside Finally After End Try D) Inside Try IOException Caught Inside Finally
 
Answer & Explanation Answer: C) Inside Try IOException Caught Inside Finally After End Try

Explanation:

First the try code runs. Then one single exception, the IOException occurs, not two exceptions.Then the Finally code segments executes. After Finally code bas been executed normal application resumes at the next line after the line that called the error. In this case, the After End Try code runs.

Report Error

View Answer Report Error Discuss

1 1952
Q:

A large CRM project took place last year included hundreds of meetings between the various key users. All of the conversations were save in a single Word 2010 document. You need to find all instances of the following words 'bleed' and 'bled'. Which of the following wildcard searches would be best?

A) ble{2}d B) ble{1,}d
C) ble{e2}d D) ble[e2]d
 
Answer & Explanation Answer: B) ble{1,}d

Explanation:
Report Error

View Answer Report Error Discuss

2 1952
Q:

What protocol is required by Internet Information Services(IIS), the indexing Service, and Certificate Services?

A) TCP/IP B) NWLink IPX/SPX/NetBIOS Compatible Transport protocol
C) NetBEUI D) RIP Version 2 for Internet Protocol
 
Answer & Explanation Answer: A) TCP/IP

Explanation:

When you think Internet (or anything Internet - related), think TCP/IP

Report Error

View Answer Report Error Discuss

0 1947
Q:

You plan to deploy your ASP.NET application over XYZ’s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs.

 

You need to configure security for your application. What should you do?

A) Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application. B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
C) Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application. D) Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.
 
Answer & Explanation Answer: B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.

Explanation:

We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

 

Incorrect Answers:

A: We should only use a single account to access the SQL Server database.

C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.

Report Error

View Answer Report Error Discuss

0 1946
Q:

You are the database administrator of a SQL Server 2000 computer. The server contains your company's Accounts database. Hundreds of users access the database each day.Because you have had power interruptions in the past, you want to protect the physical integrity of the Accounts database. You do not want to slow down server operations.What should you do?

A) Create a database maintenance plan to check database integrity and make repairs each night. B) Enable the torn page detection database option for each database.
C) Disablewrite caching on all disk controllers. D) Ensure that write caching disk controllers have battery backups.
 
Answer & Explanation Answer: D) Ensure that write caching disk controllers have battery backups.

Explanation:

The scenario states that power interruptions have occurred in the past. By buying a battery backup solution for the disk controllers the power interruption problem would be prevented.

Report Error

View Answer Report Error Discuss

0 1945