Certification Questions

Q:

You are an administrator of a SQL Server 2000 computer. The server contains a database that stores inventory data. Another database administrator has created a number of scheduled jobs to maintain the inventory database. Each weeknight the following jobs occur.


- A BULK INSERT job imports data at 10:00 P.M
- Indexes are rebuilt at 10:15 P.M
- Data integrity checks are performed at 10:30 P.M
- A differential backup is performed at 10:45 P.M
- A DBCC SHRINKDATABASE job runs at 11:00 P.M.


You notice that the final job often fails and returns the following error message: "Server: Msg 3140, Level 16, State 3. Could not adjust the space allocation for file  'inventory_data'."You need to ensure that the final job runs without errors.

What should you do?

A) Modify the DBCC SHRINKDATABASE job so that it uses DBCC SHRINKFILE statement to shrink each file individually. B) Create a new DBCC SHRINKFILE job to shrink the inventory_data file. Schedule the new job to run at the same time as the DBCC SHRINKDATABASE job.
C) Increase the time between the differential backup and the DBCC SHRINKDATABASE job. D) Increase the time between the data integrity checks and the differential backup.
 
Answer & Explanation Answer: C) Increase the time between the differential backup and the DBCC SHRINKDATABASE job.

Explanation:

The DBCC SHRINKDATABSE cannot be executed until the previous job step, the differential backup, has been completed. We should increase the time between these two job steps, or even better configure the last job step to run only after the differential backup has been completed.

 

Note: The DBCC SHRINKDATABASE statement shrinks data files on a per-file basis but shrinks log files as if all the log files existed in one contiguous log pool. The target size for the data and log files cannot be smaller than the minimum size of a file that was specified when the file was originally created, or the last explicit size set with a file size changing operation such as the ALTER DATABASE statement with the MODIFY FILE option or the DBCC SHRINKFILE statement.

Report Error

View Answer Report Error Discuss

0 4082
Q:

Communication requirements are defined by

A) the adaptation of the theory of sender-receiver models to the dominant listening and learning style of each stakeholder. B) the logistics of how many individuals will be involved with the project and at which locations.
C) the technologies or methods available to transfer information back and forth among project stakeholders. D) combining the type and format of information required with an analysis of the value of that information.
 
Answer & Explanation Answer: D) combining the type and format of information required with an analysis of the value of that information.

Explanation:

“ Communication requirements are defined by combining the type and format of information needed with an analysis of the value of that information.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4048
Q:

Users on the 192.168.10.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server?

A. IP route 0.0.0.0 0.0.0.0 s0/0/0
B. IP route 0.0.0.0 0.0.0.0 209.165.200.226
C. IP route 209.165.200.0 255.255.255.0 192.168.10.250
D. IP route 192.168.10.0 255.255.255.0 209.165.100.250

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 4038
Q:

Where is a Web Intelligence variable stored?

A. In the document

B. In the Central Management Server (CMS)

C. In the Metadata Cube

D. In the cell

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

2 4030
Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 4017
Q:

When a ping to the loopback address fails , what can you assume?

A) The IP address of the local host is incorrect B) The IP address of the remote host is incorrect
C) The NIC is not functional D) The IP stack has failed to initialize
 
Answer & Explanation Answer: D) The IP stack has failed to initialize

Explanation:

When a ping to the loopback address fails , you can assume the IP stack has failed to initialize.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4016
Q:

In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

A) All hosts have equal priority B) The two hosts that caused the collision will have equal priority
C) The host that sent the jam signal after the collision D) The host with the highest MAC address
 
Answer & Explanation Answer: A) All hosts have equal priority

Explanation:

After the expiration of the backoff algorithm , all hosts have equal priority.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4009
Q:

What is the specific term for the unwanted signal interference from adjacent pairs in the cable?

A) EMI B) RFI
C) Crosstalk D) Attenuation
 
Answer & Explanation Answer: C) Crosstalk

Explanation:

The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4003