JOBSEEKERS
Login
Sign Up
Jobseeker
Employer
Staffing Firm
Direct Client
SQL Server interview questions part 25
SQL Server interview questions part 25
Back
Take as many assements as you can to improve your validate your skill rating
Total Questions: 20
1. You cannot use the ____________ statement to enable Resource Governor when in a user transaction.
A. ALTER RESOURCE GOVERNOR
B. ALTER GOVERNOR
C. ALTER RESOURCE
D. All of the mentioned
Show Correct Answer
Correct Answer is :
ALTER RESOURCE GOVERNOR
2. Enabling the Resource Governor requires _________ permission.
A. CONTROL SERVER
B. CONTROL
C. SERVER
D. SELECT
Show Correct Answer
Correct Answer is :
CONTROL SERVER
3. Point out the wrong statement :
A. Two workload groups (internal and default) are created and mapped to their corresponding resource pools when SQL Server is installed
B. A resource group serves as a container for session requests that have similar classification criteria
C. Resource Governor also supports user-defined workload groups
D. Resource Governor does not impose any controls on a dedicated administrator connection (DAC)
Show Correct Answer
Correct Answer is :
A resource group serves as a container for session requests that have similar classification criteria
4. Which of the following query enables the Resource Governor ?
A. ALTER RESOURCE GOVERNOR CONFIGURE;
B. ALTER RESOURCE RECONFIGURE;
C. ALTER RESOURCE GOVERNOR RECONFIGURE;
D. None of the mentioned
Show Correct Answer
Correct Answer is :
ALTER RESOURCE GOVERNOR RECONFIGURE;
5. Which of the following query disables the resource governor ?
A. ALTER RESOURCE GOVERNOR ENABLE CONFIGURE;
B. ALTER GOVERNOR DISABLE;
C. ALTER RESOURCE GOVERNOR DISABLE;
D. None of the mentioned
Show Correct Answer
Correct Answer is :
ALTER RESOURCE GOVERNOR DISABLE;
6. ____________ is a hard cap limit on the CPU bandwidth for all requests in the resource pool.
A. MIN_CPU_PERCENT
B. CAP_CPU_PERCENT
C. MAX_CPU_PERCENT
D. MAX_MEMORY_PERCENT
Show Correct Answer
Correct Answer is :
CAP_CPU_PERCENT
7. ___________ lets you affinitize a resource pool to one or more schedulers or NUMA nodes for greater isolation of CPU resources.
A. MAX_IOPS_PER_VOLUME
B. AFFINITY
C. MAX_CPU_PERCENT
D. MAX_MEMORY_PERCENT
Show Correct Answer
Correct Answer is :
AFFINITY
8. Which of the following formula is used for calculating the effective MAX% ?
A. 100 – sum(MIN %)
B. min(X,Y)
C. max(X,Y)
D. Effective MAX % – MIN %
Show Correct Answer
Correct Answer is :
min(X,Y)
9. Which of the following condition in the where clause will return the login identification name of the user?
A. UserName = SUSER_NAME()
B. UserName = SUSER_SNAME()
C. UserName = CURRENT_USER()
D. UserName = USER()
Show Correct Answer
Correct Answer is :
UserName = SUSER_SNAME()
10. Point out the correct statement:
A. Implementing row level security based on security labels is possible in SQL Server 2008
B. A security label is a marking that describes the securable content of an item
C. Row-level permissions are used for applications that store information in a single table
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Row-level permissions are used for applications that store information in a single table
11. View that contains the list of all the security labels present in the database:
A. vwVisibleLabels
B. VisibleLabels
C. vwVisibleLabel
D. All of the mentioned
Show Correct Answer
Correct Answer is :
vwVisibleLabels
12. Which of the following retrieves a SecurityLabel instance describing the subject label of the current database user?
A. fn_Dominates
B. usp_GetUserLabel
C. usp_GetCurrentUserLabel
D. usp_GetSecLabelDetails
Show Correct Answer
Correct Answer is :
usp_GetCurrentUserLabel
13. Point out the wrong statement :
A. usp_EnableCellVisibility opens all the symmetric keys that are mapped to security labels
B. usp_DisableCellVisibility opens all the symmetric keys that were previously opened
C. On SQL Server 2012 you can use the Contained Database feature to create a user without a login
D. No arguments are available for usp_EnableCellVisibility
Show Correct Answer
Correct Answer is :
usp_DisableCellVisibility opens all the symmetric keys that were previously opened
14. What will the fn_Dominates return if A dominates B where A and B both are security label?
A. 0
B. 1
C.
D. None of the mentioned
Show Correct Answer
Correct Answer is :
1
15. The major components of the Label Security Toolkit are:
A. Documentation
B. The Label Policy Designer application
C. Examples showing the implementation of row- and cell-level security in different scenarios
D. All of the mentioned
Show Correct Answer
Correct Answer is :
All of the mentioned
16. Return type of CertName field in vwVisibleLabels is:
A. XML
B. INT
C. NVARCHAR(256)
D. VARCHAR(256)
Show Correct Answer
Correct Answer is :
NVARCHAR(256)
17. Which of the following will not return user name of current session?
A. CUURENT_USER()
B. USER_NAME()
C. CUSER_NAME()
D. None of the mentioned
Show Correct Answer
Correct Answer is :
None of the mentioned
18. Grant ________ permission on the stored procedures to database roles for implementing call level security.
A. EXECUTE
B. EXEC
C. READ
D. WRITE
Show Correct Answer
Correct Answer is :
EXECUTE
19. Point out the correct statement :
A. You can use Source control to audit schema changes
B. The SQL Server Audit feature enables you to audit column level groups of events and individual events
C. Audit level actions encompass data manipulation languages (DML) and data definition language (DDL) operations
D. None of the mentioned
Show Correct Answer
Correct Answer is :
You can use Source control to audit schema changes
20. Which of the following event is not intrinsically audited?
A. ALTER DATABASE AUDIT SPECIFICATION
B. CREATE SERVER AUDIT SPECIFICATION
C. DROP SERVER AUDIT SPECIFICATION
D. All of the mentioned
Show Correct Answer
Correct Answer is :
All of the mentioned
Similar Interview Questions
Search for latest jobs
Find Jobs