MCQOPTIONS
Saved Bookmarks
This section includes 424 Mcqs, each offering curated multiple-choice questions to sharpen your Structured Query Language (SQL) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
Which of the following field in cdc.lsn_time_mapping has varbinary data type ? |
| A. | tran_begin_time |
| B. | tran_id |
| C. | start_lsn |
| D. | All of the mentioned |
| Answer» C. start_lsn | |
| 152. |
______ gives DBAs an option to shut down the server in case of an audit log failure. |
| A. | Shut down server on partial failure |
| B. | Shut down server on audit log failure |
| C. | Shut down server on complete failure |
| D. | None of the mentioned |
| Answer» C. Shut down server on complete failure | |
| 153. |
Which of the following query returns the average latency for the most recent sessions ? |
| A. | SELECT latency FROM sys.dm_cdc_log_audit_sessions WHERE session_id = 0 |
| B. | SELECT latency FROM sys.dm_cdc_log_scan_ WHERE session_id = 0 |
| C. | SELECT latency FROM sys.dm_cdc_audit_scan_sessions WHERE session_id = 0 |
| D. | SELECT latency FROM sys.dm_cdc_log_scan_sessions WHERE session_id = 0 |
| Answer» E. | |
| 154. |
The cleanup job is initiated by running the parameterless stored procedure : |
| A. | sp_MScdc_cleanup_job |
| B. | sp_cdc_cleanup_change_job |
| C. | sp_cdc_cleanup_change_tables |
| D. | None of the mentioned |
| Answer» B. sp_cdc_cleanup_change_job | |
| 155. |
The commit time of each transaction with an associated entry in a database change table is available in the table ______ |
| A. | cdc.log_time_mapping |
| B. | cdc.lsn_time_mapping |
| C. | cdc.lsn_time_audit |
| D. | All of the mentioned |
| Answer» C. cdc.lsn_time_audit | |
| 156. |
Upper bound on expected throughput of the capture job is calculated using the following computation: |
| A. | (maxtrans * maxscans) / number of seconds between scans |
| B. | (maxtrans * maxscans) * number of seconds between scans |
| C. | (maxtrans * maxscans) – number of seconds between scans |
| D. | None of the mentioned |
| Answer» B. (maxtrans * maxscans) * number of seconds between scans | |
| 157. |
Which of the following query determine sessions that had an empty scan ? |
| A. | SELECT * from sys.dm_cdc_log_scan_sessions where empty_scan_count <> 0 |
| B. | SELECT * from sys.dm_cdc_log_scan_sessions where empty_scan_count = 0 |
| C. | SELECT * from sys.dm_cdc_log_scan_sessions where empty_scan_count < 0 |
| D. | SELECT * from sys.dm_cdc_log_scan_sessions where empty_scan_count > 0 |
| Answer» B. SELECT * from sys.dm_cdc_log_scan_sessions where empty_scan_count = 0 | |
| 158. |
Which of the following is catalog view used for change tracking ? |
| A. | sys.change_tracking_tables |
| B. | sys.change_tracking_views |
| C. | sys.change_tracking_columns |
| D. | None of the mentioned |
| Answer» B. sys.change_tracking_views | |
| 159. |
Which of the following feature distinguishes change data capture from change tracking ? |
| A. | Historical data |
| B. | DML |
| C. | DML type |
| D. | Whether column was changed |
| Answer» B. DML | |
| 160. |
__________ obtains tracking information for all changes to a table that have occurred since a specific version. |
| A. | CHANGETABLE_CONTEXT |
| B. | CHANGETABLE |
| C. | CHANGE_TRACKING_IS_COLUMN_IN_MASK |
| D. | All of the mentioned |
| Answer» C. CHANGE_TRACKING_IS_COLUMN_IN_MASK | |
| 161. |
Which of the following code snippet returns a version integer that is associated with the last committed transaction that was tracked by change tracking ? |
| A. | SELECT @sync_new_received_anchor = change_tracking_cur_version() |
| B. | SELECT @sync_new_received_anchor = change_tracking_current_ver() |
| C. | SELECT @sync_new_received_anchor = change_tracking_current_version() |
| D. | SELECT @sync_new_received_anchor = change_track_current_version() |
| Answer» D. SELECT @sync_new_received_anchor = change_track_current_version() | |
| 162. |
Which of the following format output events in an Event Tracing for Windows ? |
| A. | event_file |
| B. | ring_buffer |
| C. | histogram |
| D. | etw_classic_sync_target |
| Answer» E. | |
| 163. |
______ returns a row for each customizable column that was explicitly set on events and targets. |
| A. | sys.server_event_session_targets |
| B. | sys.server_event_session_targets |
| C. | Returns a row for each event in an event session |
| D. | All of the mentioned |
| Answer» C. Returns a row for each event in an event session | |
| 164. |
___ can be applied to the metadata or to an active session and the metadata. |
| A. | DROP EVENT SESSION |
| B. | ALTER EVENT SESSION,STATE=STOP |
| C. | ALTER EVENT SESSION,STATE=START |
| D. | All of the mentioned |
| Answer» E. | |
| 165. |
__________ wait type applies to SQL Server 2014 only. |
| A. | LCK_M_U_ABORT_BLOCKERS |
| B. | HADR_WORK_QUEUE |
| C. | HADR_XRF_STACK_ACCESS |
| D. | HADR_WORK_POOL |
| Answer» B. HADR_WORK_QUEUE | |
| 166. |
Which of the following wait type is for internal use only ? |
| A. | ASYNC_NETWORK_IO |
| B. | AUDIT_LOGINCACHE_LOCK |
| C. | HADR_DBR_SUBSCRIBER_FILTER_LIST |
| D. | AUDIT_XE_SESSION_MGR |
| Answer» D. AUDIT_XE_SESSION_MGR | |
| 167. |
_____ waits occur when a worker requests access to a resource that is not available because the resource is being used by some other worker or is not yet available. |
| A. | Resource |
| B. | Queue |
| C. | Lock |
| D. | External |
| Answer» B. Queue | |
| 168. |
Which of the following event has event number 15 in the trace ? |
| A. | DTCTransaction |
| B. | ErrorLog |
| C. | SQL:BatchStarting |
| D. | Lock:Cancel |
| Answer» D. Lock:Cancel | |
| 169. |
TRACE_PRODUCE_BLACKBOX file can be saved in the following location : |
| A. | N’%SQLDIR%\MSSQL\DATA\blackbox.trc |
| B. | N’%SQLDIR%\MSSQL\DATA\black.trc |
| C. | N’%SQLDIR%\MSSQL\DATA\box.trc |
| D. | None of the mentioned |
| Answer» B. N’%SQLDIR%\MSSQL\DATA\black.trc | |
| 170. |
Which of the following events and their columns are contained in the trace: |
| A. | Attention |
| B. | Batch starting |
| C. | Exception |
| D. | All of the mentioned |
| Answer» E. | |
| 171. |
Which of the following argument has option value 2 in sp_trace_create procedure ? |
| A. | TRACE_PRODUCE_BLACKBOX |
| B. | SHUTDOWN_ON_ERROR |
| C. | TRACE_FILE_ROLLOVER |
| D. | All of the mentioned |
| Answer» D. All of the mentioned | |
| 172. |
Which of the following stored procedure will stop the trace |
| A. | sp_trace_create. |
| B. | sp_trace_setfilter |
| C. | sp_trace_setstatus |
| D. | sp_stop_status |
| Answer» D. sp_stop_status | |
| 173. |
The Activity Monitor in SQL Server Management Studio graphically displays information about : |
| A. | User activity |
| B. | Blocked processes |
| C. | Locks |
| D. | All of the mentioned |
| Answer» E. | |
| 174. |
Which of the following determines type or resource to which the lock applies ? |
| A. | sp_lock |
| B. | sp_who |
| C. | sp_monitor |
| D. | sp_spaceused |
| Answer» B. sp_who | |
| 175. |
_______ reports the total processor time with respect to the available capacity of the server. |
| A. | Disk Read Bytes/sec |
| B. | Avg.Disk Queue Length |
| C. | Processor time |
| D. | Response time |
| Answer» D. Response time | |
| 176. |
Which of the following database level event si raised whenever a REFERENCES permission is checked. |
| A. | EXECUTE |
| B. | REFERENCES |
| C. | UPDATE |
| D. | SELECT |
| Answer» C. UPDATE | |
| 177. |
DDL Trigger can capture the information about the EVENT that fired it by using __________ function. |
| A. | EVENTDATA() |
| B. | EVENTDATA() |
| C. | EVENTS() |
| D. | None of the mentioned |
| Answer» B. EVENTDATA() | |
| 178. |
You can use the handy event name of __________ to make sure your trigger covers all DDL events. |
| A. | DDL_DATABASE_EVENTS |
| B. | DDL_DATABASE_LEVEL_EVENTS |
| C. | DDL_DATABASE_LEVEL |
| D. | All of the mentioned |
| Answer» C. DDL_DATABASE_LEVEL | |
| 179. |
____ could potentially lead to large audit records. |
| A. | DATABASE_OBJECT_ACCESS_GROUP |
| B. | DATABASE_MIRRORING_LOGIN_GROUP |
| C. | DATABASE_OBJECT_OWNERSHIP_CHANGE_GROUP |
| D. | DATABASE_OBJECT_PERMISSION_CHANGE_GROUP |
| Answer» B. DATABASE_MIRRORING_LOGIN_GROUP | |
| 180. |
Which of the following statement is used to enable auditing from SQL Server ? |
| A. | auditpol /set /subcategory:”application generated” /success:enable /failure:enable |
| B. | polaudit /set /subcategory:”application generated” /success:enable /failure:enable |
| C. | auditpolenable /set /subcategory:”application generated” /success:enable /failure:enable |
| D. | auditenable /set /subcategory:”application generated” /success:enable /failure:enable |
| Answer» B. polaudit /set /subcategory:”application generated” /success:enable /failure:enable | |
| 181. |
Which of the following views log from a file that is named \\serverName\Audit\HIPPA_AUDIT.sqlaudit ? |
| A. | SELECT * FROM sys.fn_audit_file (‘\\serverName\Audit\HIPPA_AUDIT.sqlaudit’, default,default); |
| B. | SELECT * FROM sys.fn_get_audit_file (‘\\serverName\Audit\HIPPA_AUDIT.sqlaudit’, default,default); |
| C. | SELECT * FROM sys.fn_get_audit(‘\\serverName\Audit\HIPPA_AUDIT.sqlaudit’, default,default); |
| D. | None of the mentioned |
| Answer» C. SELECT * FROM sys.fn_get_audit(‘\\serverName\Audit\HIPPA_AUDIT.sqlaudit’, default,default); | |
| 182. |
Grant ________ permission on the stored procedures to database roles for implementing call level security. |
| A. | EXECUTE |
| B. | EXEC |
| C. | READ |
| D. | WRITE |
| Answer» B. EXEC | |
| 183. |
Which of the following will not return user name of current session? |
| A. | CUURENT_USER() |
| B. | USER_NAME() |
| C. | CUSER_NAME() |
| D. | None of the mentioned |
| Answer» E. | |
| 184. |
Return type of CertName field in vwVisibleLabels is: |
| A. | XML |
| B. | INT |
| C. | NVARCHAR(256) |
| D. | VARCHAR(256) |
| Answer» D. VARCHAR(256) | |
| 185. |
Which of the following functions decrypts data by using a symmetric key? |
| A. | DECRYPTBYSYMKEY |
| B. | DECRYPTBYKEYAUTOASYMKEY |
| C. | DECRYPTBYASYMKEY |
| D. | DECRYPTBYKEYAUTOCERT |
| Answer» C. DECRYPTBYASYMKEY | |
| 186. |
__________ encryption was introduced in SQL Server 2005 and is available in all editions of SQL Server. |
| A. | Column-level Encryption |
| B. | Transparent Data Encryption |
| C. | BitLocker |
| D. | None of the mentioned |
| Answer» B. Transparent Data Encryption | |
| 187. |
Like data compression, TDE database encryption is performed at the ______ level. |
| A. | Page |
| B. | Domain |
| C. | Column |
| D. | Row |
| Answer» B. Domain | |
| 188. |
Which of the following catalog view is used to monitor TDE? |
| A. | sys.certificates |
| B. | sys.certificate |
| C. | DMVs |
| D. | All of the mentioned |
| Answer» B. sys.certificate | |
| 189. |
To add or remove server role membership use : |
| A. | ALTER ROLE |
| B. | ALTER ANY LOGIN |
| C. | ALTER SERVER ROLE |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 190. |
Any SQL Server authentication login can see ________ login name. |
| A. | Own and sa |
| B. | sa |
| C. | Own |
| D. | None of the mentioned |
| Answer» B. sa | |
| 191. |
Which of the following returns a row for each security principal in a SQL Server database ? |
| A. | sys.database_role_members |
| B. | sys.sql_logins |
| C. | sys.database_principals |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 192. |
The schema securable scope contains the following securables: |
| A. | Contract |
| B. | Asymmetric key |
| C. | Schema |
| D. | Object |
| Answer» E. | |
| 193. |
The Windows password policies enforced for SQL Server logins depends upon _____________________ API. |
| A. | NetValidate |
| B. | NetValidatePasswordPolicy |
| C. | NetValidatePolicy |
| D. | ValidatePasswordPolicy |
| Answer» C. NetValidatePolicy | |
| 194. |
________ returns a list of the permissions effectively granted to the principal on a securable. |
| A. | HAS_PERMS_BY_NAME |
| B. | sys.fn_my_permissions |
| C. | sys.fn_permissions |
| D. | All of the mentioned |
| Answer» C. sys.fn_permissions | |
| 195. |
Which of the following is the biggest disadvantage of SQL Server Authentication mode ? |
| A. | SQL Server Authentication cannot use Kerberos security protocol |
| B. | Allows SQL Server to support Web-based applications where users create their own identities |
| C. | Allows SQL Server to support older applications and applications provided by third parties that require SQL Server Authentication |
| D. | None of the mentioned |
| Answer» B. Allows SQL Server to support Web-based applications where users create their own identities | |
| 196. |
______ optional password policies are available for SQL Server logins. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | All of the mentioned |
| Answer» C. 4 | |
| 197. |
By using Windows Authentication, Windows groups can be created at the _________ level. |
| A. | Login |
| B. | Domain |
| C. | User |
| D. | None of the mentioned |
| Answer» C. User | |
| 198. |
Which of the following authentication modes is more secure ? |
| A. | SQL Server Authentication |
| B. | Windows Authentication |
| C. | Mixed Mode |
| D. | All of the mentioned |
| Answer» C. Mixed Mode | |
| 199. |
An exciting new feature in SQL Server 2014 is the support for the deployment of a Failover Cluster Instance (FCI) with : |
| A. | Cluster Shared Volumes (CSV) |
| B. | In memory database |
| C. | Column oriented database |
| D. | All of the mentioned |
| Answer» B. In memory database | |
| 200. |
A Windows Failover Cluster can support up to _______ nodes. |
| A. | 12 |
| B. | 14 |
| C. | 16 |
| D. | 18 |
| Answer» D. 18 | |