JOBSEEKERS
Login
Sign Up
Jobseeker
Employer
Staffing Firm
Direct Client
SQL Server interview questions part 28
SQL Server interview questions part 28
Back
Take as many assements as you can to improve your validate your skill rating
Total Questions: 20
1. Point out the wrong statement related to SQL Server 2014 :
A. SQL Server 2014 CTP 1 is pre-release software and should be installed only on a clean machine
B. SQL Server 2014 CTP 1 is a non-production release and should be installed and used in production environments
C. SQL Server 2014 CTP 1 is only available in the English language
D. None of the mentioned
Show Correct Answer
Correct Answer is :
SQL Server 2014 CTP 1 is a non-production release and should be installed and used in production environments
2. Which of the following is a feature of SQL Server 2012 R2 Enterprise ?
A. In memory database
B. Hot-add RAM
C. Database partitioning
D. All of the mentioned
Show Correct Answer
Correct Answer is :
All of the mentioned
3. Which of the following operating system is supported by SQL Server 2014?
A. Windows Server 2012
B. Windows 8 RTM
C. Windows Vista SP2
D. All of the mentioned
Show Correct Answer
Correct Answer is :
All of the mentioned
4. Which of the following component is not installed by SQL Server setup 2012 required by the product ?
A. .NET Framework 3.5 SP11
B. Named Pipes
C. SQL Server Setup support files
D. All of the mentioned
Show Correct Answer
Correct Answer is :
Named Pipes
5. Which is minimum processor speed for SQL Server 2012 ?
A. 1.4 GHz
B. 2.4 GHz
C. 3.4 GHz
D. 4.4 GHz
Show Correct Answer
Correct Answer is :
1.4 GHz
6. The supported storage types for data files are :
A. RAM
B. Hard Storage
C. SMB File Share
D. None of the mentioned
Show Correct Answer
Correct Answer is :
SMB File Share
7. Which of the following error is returned for a query for all changes when a parameter that is used to define the query interval is not valid ?
A. An insufficient number of arguments were supplied for the procedure or function cdc.fn_cdc_get_partial_changes_
B. An insufficient number of arguments were supplied for the procedure or function cdc.fn_cdc_get_all_changes_
C. An insufficient number of arguments were supplied for the procedure or function cdc.fn_cdc_get_net_changes_
D. None of the mentioned
Show Correct Answer
Correct Answer is :
An insufficient number of arguments were supplied for the procedure or function cdc.fn_cdc_get_all_changes_
8. Point out the correct statement :
A. The function cdc.fn_cdc_get_all_changes_ returns all changes that occurred for the specified interval
B. The update mask that is returned from a query function is a compact representation that identifies few columns that changed in a row of change data
C. A typical application scenario for querying for change data is to periodically request change data by using a receiver window bounded by timestamp values
D. None of the mentioned
Show Correct Answer
Correct Answer is :
The function cdc.fn_cdc_get_all_changes_ returns all changes that occurred for the specified interval
9. The commit time of each transaction with an associated entry in a database change table is available in the table __________
A. cdc.log_time_mapping
B. cdc.lsn_time_mapping
C. cdc.lsn_time_audit
D. All of the mentioned
Show Correct Answer
Correct Answer is :
cdc.lsn_time_mapping
10. Point out the wrong statement :
A. cdc.lsn_time_mapping applies to SQL Server 2014
B. Datetime wrappers are owned by the user, and not are created in the default schema of the caller
C. Change data capture supports up to two capture instances for a single tracked source table
D. The name of the function to wrap the all changes query is fn_all_changes_ followed by the capture instance name.
Show Correct Answer
Correct Answer is :
cdc.lsn_time_mapping applies to SQL Server 2014
11. Which of the following query returns the average latency for the most recent sessions ?
A. SELECT latency FROM sys.dm_cdc_log_audit_sessions WHERE session_id = 0
B. SELECT latency FROM sys.dm_cdc_log_scan_ WHERE session_id = 0
C. SELECT latency FROM sys.dm_cdc_audit_scan_sessions WHERE session_id = 0
D. SELECT latency FROM sys.dm_cdc_log_scan_sessions WHERE session_id = 0
Show Correct Answer
Correct Answer is :
SELECT latency FROM sys.dm_cdc_log_scan_sessions WHERE session_id = 0
12. __________ gives DBAs an option to shut down the server in case of an audit log failure.
A. Shut down server on partial failure
B. Shut down server on audit log failure
C. Shut down server on complete failure
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Shut down server on audit log failure
13. Which of the following field in cdc.lsn_time_mapping has varbinary data type ?
A. tran_begin_time
B. tran_id
C. start_lsn
D. All of the mentioned
Show Correct Answer
Correct Answer is :
tran_id
14. Which of the following query returns the average throughput for the most recent sessions ?
A. SELECT command_count*duration AS [Throughput] FROM sys.dm_cdc_log_scan_sessions WHERE session_id = 0
B. SELECT command_count/duration AS [Throughput] FROM sys.dm_cdc_log_scan_sessions WHERE session_id = 0
C. SELECT command_count/duration AS [Throughput] FROM sys.dm_cdc_log_scan_sesss WHERE session_id = 0
D. None of the mentioned
Show Correct Answer
Correct Answer is :
SELECT command_count/duration AS [Throughput] FROM sys.dm_cdc_log_scan_sessions WHERE session_id = 0
15. sys.fn_cdc_map_time_to_lsn returns ________ value from the start_lsn column in the cdc.lsn_time_mapping system table for the specified time.
A. LSN
B. LNS
C. SLN
D. None of the mentioned
Show Correct Answer
Correct Answer is :
LSN
16. SQL injection is an attack in which _________ code is inserted into strings that are later passed to an instance of SQL Server.
A. malicious
B. redundant
C. clean
D. non malicious
Show Correct Answer
Correct Answer is :
malicious
17. Point out the correct statement :
A. Parameterized data cannot be manipulated by a skilled and determined attacker
B. Procedure that constructs SQL statements should be reviewed for injection vulnerabilities
C. The primary form of SQL injection consists of indirect insertion of code
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Procedure that constructs SQL statements should be reviewed for injection vulnerabilities
18. Any user-controlled parameter that gets processed by the application includes vulnerabilities like :
A. Host-related information
B. Browser-related information
C. Application parameters included as part of the body of a POST request
D. All of the mentioned
Show Correct Answer
Correct Answer is :
All of the mentioned
19. Point out the wrong statement :
A. SQL injection vulnerabilities occur whenever input is used in the construction of an SQL query without being adequately constrained or sanitized
B. SQL injection allows an attacker to access the SQL servers and execute SQL code under the privileges of the user used to connect to the database
C. The use of PL-SQL opens the door to these vulnerabilities
D. None of the mentioned
Show Correct Answer
Correct Answer is :
The use of PL-SQL opens the door to these vulnerabilities
20. Which of the stored procedure is used to test SQL injection attack ?
A. xp_write
B. xp_regwrite
C. xp_reg
D. All of the mentioned
Show Correct Answer
Correct Answer is :
xp_regwrite
Similar Interview Questions
Search for latest jobs
Find Jobs