1. You cannot use the ____________ statement to enable Resource Governor when in a user transaction.
Correct Answer is : ALTER RESOURCE GOVERNOR
2. Enabling the Resource Governor requires _________ permission.
Correct Answer is : CONTROL SERVER
3. Point out the wrong statement :
Correct Answer is : A resource group serves as a container for session requests that have similar classification criteria
4. Which of the following query enables the Resource Governor ?
Correct Answer is : ALTER RESOURCE GOVERNOR RECONFIGURE;
5. Which of the following query disables the resource governor ?
Correct Answer is : ALTER RESOURCE GOVERNOR DISABLE;
6. ____________ is a hard cap limit on the CPU bandwidth for all requests in the resource pool.
Correct Answer is : CAP_CPU_PERCENT
7. ___________ lets you affinitize a resource pool to one or more schedulers or NUMA nodes for greater isolation of CPU resources.
Correct Answer is : AFFINITY
8. Which of the following formula is used for calculating the effective MAX% ?
Correct Answer is : min(X,Y)
9. Which of the following condition in the where clause will return the login identification name of the user?
Correct Answer is : UserName = SUSER_SNAME()
10. Point out the correct statement:
Correct Answer is : Row-level permissions are used for applications that store information in a single table
11. View that contains the list of all the security labels present in the database:
Correct Answer is : vwVisibleLabels
12. Which of the following retrieves a SecurityLabel instance describing the subject label of the current database user?
Correct Answer is : usp_GetCurrentUserLabel
13. Point out the wrong statement :
Correct Answer is : usp_DisableCellVisibility opens all the symmetric keys that were previously opened
14. What will the fn_Dominates return if A dominates B where A and B both are security label?
15. The major components of the Label Security Toolkit are:
Correct Answer is : All of the mentioned
16. Return type of CertName field in vwVisibleLabels is:
Correct Answer is : NVARCHAR(256)
17. Which of the following will not return user name of current session?
Correct Answer is : None of the mentioned
18. Grant ________ permission on the stored procedures to database roles for implementing call level security.
Correct Answer is : EXECUTE
19. Point out the correct statement :
Correct Answer is : You can use Source control to audit schema changes
20. Which of the following event is not intrinsically audited?
Correct Answer is : All of the mentioned