You need to recover the corrupted data in the minimum a…

You administer a Microsoft SQL Server database named Sales. The database is 3 terabytes in size.
The Sales database is configured as shown in the following table.

You discover that all files except Sales_2.ndf are corrupt.
You need to recover the corrupted data in the minimum amount of time.
What should you do?

You administer a Microsoft SQL Server database named Sales. The database is 3 terabytes in size.
The Sales database is configured as shown in the following table.

You discover that all files except Sales_2.ndf are corrupt.
You need to recover the corrupted data in the minimum amount of time.
What should you do?

A.
Perform a file restore.

B.
Perform a transaction log restore.

C.
Perform a restore from a full backup.

D.
Perform a filegroup restore.

Explanation:
Reference: http://technet.microsoft.com/en-us/library/ms187048.aspx Reference: http://msdn.microsoft.com/en-us/library/aa337540.aspx
Under the simple recovery model, the file must belong to a read-only filegroup. Under the full or bulk-logged recovery model, before you can restore files, you must
back up the active transaction log (known as the tail of the log). For more information, see Back Up a Transaction Log (SQL Server).
To restore a database that is encrypted, you must have access to the certificate or asymmetric key that was used to encrypt the database. Without the certificate or
asymmetric key, the database cannot be restored. As a result, the certificate that is used to encrypt the database encryption key must be retained as long as the
backup is needed. For more information, see SQL Server Certificates and Asymmetric Keys.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Sarx

Sarx

While A will be the most probable answer based on the question about file corruption, in practice C could be quicker. We have no information on file sizes (archive files could be much larger, we don’t know).

Andrzej Konopka

Andrzej Konopka

New 70-764 Exam Questions and Answers Updated Recently (22/June/2017):

NEW QUESTION 1
You manage a Microsoft SQL Server environment. You implement Transparent Data Encryption (TDE). A user will assist in managing TDE. You need to ensure that the user can view the TDE metadata while following the principle of lease privilege. Which permission should you grant?

A. DDLAdmin
B. db_datawriter
C. dbcreator
D. dbo
E. View Database State
F. View Server State
G. View Definition
H. sysadmin

Answer: G
Explanation:
Viewing the metadata involved with TDE requires the VIEW DEFINITION permission on the certificate.

NEW QUESTION 2
You are the database administrator for a company that hosts Microsoft SQL Server. You manage both on-premises and Microsoft Azure SQL Database environments. You have a user database named HRDB that contains sensitive human resources data. The HRDB backup files must be encrypted. You need to grant the correct permission to the service account that backs up the HRDB database. Which permission should you grant?

A. DDLAdmin
B. db_datawriter
C. dbcreator
D. dbo
E. View Database State
F. View Server State
G. View Definition
H. sysadmin

Answer: G
Explanation:
Restoring the encrypted backup: SQL Server restore does not require any encryption parameters to be specified during restores. It does require that the certificate or the asymmetric key used to encrypt the backup file be available on the instance that you are restoring to. The user account performing the restore must have VIEW DEFINITION permissions on the certificate or key.

NEW QUESTION 3
You are the database administrator for a company that hosts Microsoft SQL Server. You manage both on-premises and Microsoft Azure SQL Database environments. You plan to delegate encryption operations to a user. You need to grant the user permission to implement cell-level encryption while following the principle of least privilege. Which permission should you grant?

A. DDLAdmin
B. db_datawriter
C. dbcreator
D. dbo
E. View Database State
F. View ServerState
G. View Definition
H. sysadmin

Answer: G
Explanation:
The following permissions are necessary to perform column-level encryption, or cell-level encryption:
– CONTROL permission on the database.
– CREATE CERTIFICATE permission on the database. Only Windows logins, SQL Server logins, and application roles can own certificates. Groups and roles cannot own certificates.
– ALTER permission on the table.
– Some permission on the key and must not have been denied VIEW DEFINITION permission.

NEW QUESTION 4
A company has an on-premises Microsoft SQL Server environment and Microsoft Azure SQL Database instances. The environment hosts a customer database named DB1. Customers connect to hosted database instances by using line-of-business applications. Developers connect by using SQL Server Management Studio (SSMS). You need to grant the developers permission to alter views for DB1 while following the principle of least privilege. Which permission should you grant?

A. DDLAdmin
B. db_datawriter
C. dbcreator
D. dbo
E. View Database State
F. View Server State
G. View Definition
H. sysadmin

Answer: A
Explanation:
To execute ALTER VIEW, at a minimum, ALTER permission on OBJECT is required. Members of the db_ddladmin fixed database role can run any Data Definition Language (DDL) command in a database.

NEW QUESTION 5
You have an on-premises server that runs Microsoft SQL Server 2016 Standard Edition. You need to identify missing indexes. What should you use?

A. Activity Monitor
B. Sp_who3
C. SQL Server Management Studio (SSMS) Object Explorer
D. SQL Server Data Collector
E. SQL Server Data Tools (SSDT)
F. SQL Server Configuration Manager

Answer: D
Explanation:
Data Collector can gather performance information from multiple SQL Server instances and store it in a single repository. It has three built-in data collecting specifications (data collectors) designed to collect the most important performance metrics. The information collected by default is about disk usage, query statistics, and server activity. The Query Statistics data collection set collects information about query statistics, activity, execution plans and text on the SQL Server instance. Missing indexes can be found with the execution plans.

NEW QUESTION 6
You have a database named DB1 that stores more than 700 gigabyte (GB) of data and serves millions of requests per hour. Queries on DB1 are taking longer than normal to complete. You run the following Transact-SOL statement:
SELECT* FROM sys.database_query_store_options
You determine that the Query Store is in Read-Only mode. You need to maximize the time that the Query Store is in Read-Write mode. Which Transact-SOL statement should you run?

A. ALTER DATABASE DB1SET QUERY_STORE (QUERY_CAPTURE_MODE = ALL)
B. ALTER DATABASE DB1SET QUERY_STORE (MAX_STORAGE_SIZE_MB = SO)
C. ALTER DATABASE DB1SET QUERY_STORE (CLEANUP _POLICY = (STALE_QUERY_THRESHOLD_DAYS = 14));
D. ALTER DATABASE DB1SET QUERY_STORE (QUERY_CAPTURE_MODE = NONE)

Answer: C
Explanation:
Stale Query Threshold (Days): Time-based cleanup policy that controls the retention period of persisted runtime statistics and inactive queries. By default, Query Store is configured to keep the data for 30 days which may be unnecessarily long for your scenario. Avoid keeping historical data that you do not plan to use. This will reduce changes to read-only status. The size of Query Store data as well as the time to detect and mitigate the issue will be more predictable. Use Management Studio or the following script to configure time-based cleanup policy:
ALTER DATABASE [QueryStoreDB]
SET QUERY_STORE (CLEANUP_POLICY = (STALE_QUERY_THRESHOLD_DAYS = 14));

NEW QUESTION 7
……

P.S. Get The Newest 70-764 Dumps In PDF And VCE From — http://www.passleader.com/70-764.html (65q VCE and PDF)

Good Luck!