单项选择题
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There is a database in the instance, and the day-to-day business of your company requires the database. When reports are executed, slow response time will be experienced by Users. A performance monitoring strategy will be implemented by you so as to have three aspects of data captured and stored: Blocking and deadlock information, Executed Transact-SQL statements Query activity and Counters for disk, CPU, and memory. You are required to utilize the least amount of administrative effort to implement the monitoring process.
Which action will you perform to finish the task?()
A.To finish the task, the client-side profiler trace should be utilized.
B.To finish the task, the dynamic management views should be utilized.
C.To finish the task, the data collector should be utilized.
D.To finish the task, the System Monitor counter log trace should be utilized.
相关考题
-
单项选择题
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed. It is reported by the customers that the server performance degraded due to a newly implemented process. Dynamic Management Views is utilized to confirm that no long running queries exist. The operating system performance data should be correlated with the actual query execution trace, and the least administrative effort should be utilized. Which action will you perform to finish the task?()
A.To finish the task, Data Collector should be utilized.
B.To finish the task, the SQLdiag.exe utility should be utilized.
C.To finish the task, SQL Server Profiler and the tracerpt.exe utility should be utilized.
D.To finish the task, SQL Server Profiler and System Monitor should be utilized. -
单项选择题
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security,troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A database is included by the instance, and a table named EmployeeData is contained by the database. There is a column named Profile in the EmployeeData table. Microsoft Office Word 2003 documents are stored in the column. The space utilized by the Profile column should be cut to the least. In addition, a reasonable performance should be maintained to retrieve the content of the column. Which action will you perform?()
A.ROW compression should be utilized for the EmployeeData table.
B.The Profile column should be stored by utilizing filestream storage, and the NTFS file system Compression should be utilized.
C.PAGE LEVEL compression should be utilized for the EmployeeData table.
D.The Profile column should be implemented as a CLR user-defined type. -
单项选择题
You administer a SQL Server 2008 instance. You plan to deploy a third-party database application to the instance. The application uses stored procedures that are developed by using SQL CLR integration. The application must be configured to enable the EXTERNAL_ACCESS code access security setting. You need to ensure that the application is deployed to the instance without loss of functionality. What should you do first?()
A.Replace read write non-static fields in the code with static fields.
B.Replace read-only static fields in the code with read write static fields.
C.Use the peverify.exe PEVerify tool to verify whether the code meets the type-safety requirements.
D.Use the regasm.exe assembly registration tool to register the assembly on the server before deployment.
