NAME

Question types


Start with


Question limit

of 141 available terms

Print test

141 Multiple choice questions

  1. There ____ be more than one ____ defined on the LOGON event.
  2. More than a ____ instance of SQL server ____ installed at a time.
  3. The max ____ percentage cannot be lower than the min ____ percentage.
  4. Disallows the use of Windows application log to record events.
  5. The ____ statement, practically, marks the end of a successful implicit or explicit transaction.
  6. You need ____ SQL Server ____ for all SQL Server instances installed on the same server.
  7. You ____ create ____ server level roles.
  8. Statements cannot read data that has been changed but not yet committed.
  9. ____ is the default state of READ_COMMITTED ____.
  10. Used to instruct SQL Server Agent to execute a job immediately
  11. Tell whether password expiration policy should be enforced on that login
  12. Provides a basic editor to write T-SQL statements/scripts
  13. In the ____, in files, and often group into ____ is how databases are stored
  14. The ____ or ____ is how you change memory options manually.
  15. The ____ is how you update current configured values that have been changed with sp_configure.
  16. A Windows service that executes scheduled administrative tasks.
  17. Used to find out further information on the various jobs
  18. The primary interface for managing the databases.
  19. ____ and ____ are the two statements that can end Autocommit mode.
  20. Permissions ____ be changed for fixed Server Level Roles.
  21. You ____ remove someone from the ____ server role.
  22. ____ instances that you can monitor in the ____ process are what captured events in the Database Engine become.
  23. There are ____ fixed Server Level Roles in SQL Server
  24. Granted the permission to add or removed linked servers
  25. Used to specify the size of memory that SQL Server can leave available for allocations within the process outside of the Server memory pool
  26. Are containers for session requests with similar or identical classification criteria.
  27. SQL Server ____ be allowed to adjust and use memory ____.
  28. ____ is the biggest advantage of SQL Server Authentication
  29. The CPU and I/O affinities ____ exclusive.
  30. You can use ____ to apply locks when you select, modify or insert rows.
  31. ____ is the SQL Server default transaction isolation level.
  32. You can query ____ to find out if there are many locks outstanding.
  33. The ____ is how you make changes to the current user session only.
  34. Used to configure and manage the reporting services.
  35. Definitions of the types of locks that can be acquired on read operations.
  36. A mode that means every T-SQL statement will be committed or rolled back when it is completed.
  37. After ____ is finished and before the ____ is established is when logon triggers fire.
  38. A Windows service that listens for incoming requests.
  39. ____ and ____ are the two T-SQL statements that are needed to make a new workload group,
  40. Captures all the stored procedures and T-SQL batches that are run. Used to monitor the general database server activities
  41. The ____ is how you change Database level settings.
  42. You would use ____ for database ____. Designed for processing alerts, and running scheduled jobs. Can also send out relevant alerts and notifications through email
  43. When there a is particular ____ preventing the server from starting is when you most often use the ____ option.
  44. READ COMMITTED is ____ than READ UNCOMMITTED.
  45. ____ statement or ____ are two ways to set up credentials.
  46. ____ are the predefined templates for SQL Server Profiler (5)
  47. You can reconfigure Resource Governor in Management Studio Under ____ - Template Explorer - ____ - Configure Resource Governor.
  48. Granted the permission to manage disk files.
  49. The '____' should be included with the -m option.
  50. Used to manage the SQL server instances and set up the clients/client protocols.
  51. ____ is the ____ state for the CHECK-EXPIRATION option.
  52. ____ the Database Engine service ____ remove users currently connected.
  53. Used to produce a count on how many jobs a schedule is tied to.
  54. Granted the permission to create, alter, drop and restore any database. They cannot alter others databases.
  55. An affinity mask is used for ____ controlling ____ affinity.
  56. You can configure processor affinity options in SQL Server 2012 by using the ____ statement and then the ____ argument.
  57. Will not issue shared locks. They are not blocked by exclusive locks, and it means dirty reads.
  58. The affinity mask can be configured without a restart with the ____.
  59. The max CPU percentage cannot be ____ than the min CPU percentage.
  60. The ____ email system is depreciated.
  61. You would use workload groups to ____.
  62. ____ are the fixed Server Level Roles provided by SQL Server. (9)
  63. Every log in belongs to the ____ server role.
  64. You ____ pause the SQL Server ____.
  65. Used to produce information on the status of a job run
  66. Object ownership groups
  67. ____ is the statement that will end implicit transaction mode.
  68. Says the Windows password policies of the local server computer should be enforced on this particular login.
  69. The difference between the Management Studio GUI and sp_configure is while ____ allows access to ____ options the ____ contains the ____ used server configuration options.
  70. ____ is the ____ state for CHECK_POLICY.
  71. ____ is the default template for SQL Server Profiler.
  72. You can reconfigure the ____ while configuring the Resource Governor.
  73. ____ is what is started with the SET IMPLICIT_TRANSACTIONS statement.
  74. To set up ____ Mail you would configure one or more databases as mail hosts and then define client settings so SQL Server Agent can send message via ____ mail server
  75. Statements cannot read data modified but not yet committed and no other transactions can modify data that has been read until current transaction is completed.
  76. Multiple logins ____ be mapped to a ____.
  77. 1433
  78. The sums of the minimum CPU and minimum memory percentages for all available resource polls cannot go over ____ percent.
  79. Allows you to limit connections to a specified client application
  80. Minimizing locks will ____.
  81. Applies exclusive locks
  82. Captures detailed information about the executing stored procedures. Used to get information about stored procedures that are executed.
  83. A transaction can only recognize data modifications committed prior to the start of the transaction. Modifications made after the start will be invisible.
  84. Removes all data modifications made and rolls back to the beginning of the transaction
  85. Locks commonly cause ____.
  86. The file extension of trace files
  87. Provides an identity outside of the SQL Server. Can be mapped to more than one login.
  88. Produces the same effect as setting HOLDLOCK on all tables in the SELECT statement.
  89. ____ is the kind of transaction started with the BEGIN TRANSACTION statement.
  90. Internal SQL Server resource locks related to user activity and resource usage.
  91. Workload groups located under the ____ node - ____ in Management Studio.
  92. Captures all statements submitted with information grouped by the client that submitted it. Use it to investigate queries from specific clients.
  93. Used to utilize captured traces, and capture and save data to analyze later. Can also create templates to define event classes and data columns
  94. Used to instruct SQL Server Agent to make changes to a job
  95. ____ and ____ are the two affinity mask options.
  96. Used for starting an instance with minimal configuration.
  97. A feature you can use to specify limits on resource consumption by incoming requests
  98. You will prevent new users from connecting to the Database Engine if you ____ it.
  99. The HASHED argument should be used only when ____ databases from one ____ to another.
  100. ____ is the T-SQL statement used for transaction isolation levels.
  101. Update locks that are held in place until a transaction is completed.
  102. The acquired lock is to be applied at the table level
  103. Granted the permission to change server-wide configuration options and shut down the server
  104. Used for directly affecting the I/O affinity mask.
  105. Allows you to start only a named instance of SQL Server
  106. You ____ to use the Query Window in order to write T-SQL.
  107. Another statement ____ need to be written to mark the start of a new ____ transaction.
  108. Granted the permission to end processes that are running.
  109. ____ then ____ are the two T-SQL statements that are needed for creating resource pools.
  110. ____ is the default transaction management mode.
  111. If you need to provide support for ____, ____ applications, or if you have ____ in place is when you would use SQL Server Authentication.
  112. Specifies that the login is to be mapped to a Windows login
  113. ____ are the two email systems SQL Server Agent can use to send emails.
  114. Granted the permission to manage logins and their properties, as well as GRANT, DENY, and REVOKE permissions at server-level, and if they have access to database-level permissions. They can reset passwords
  115. Used to extract and read the job schedule.
  116. The ____ or ____ statement are two ways to configure logins and their passwords.
  117. Granted the permission to execute the BULK INSERT statement
  118. Allows you to increase the number of extents allocated for each file in a filegroup.
  119. You create a logon trigger with the ____.
  120. The ____ can be used in real time.
  121. There can be ____ transaction ____ levels set at a time.
  122. Triggers that can fire stored procedures when a LOGON event is raised.
  123. ____ are the optional password policies available. (3)
  124. The ____ password policies are enforced for ____ logins.
  125. Using the ____ statement or Right-clicking on it in the ____ of the Management Studio and selecting Enable are the two ways can you enable the Resource Governor.
  126. ____ on the object and select ____ to get information about an objects properties in Management Studio.
  127. Used to show or change server-level settings
  128. Has the server prompt the user for a new password on their first login with that password
  129. Used for assigning processors to specific threads.
  130. ____ are the hints that XLOCK can be specified with.
  131. Specifics that the password that follows the PASSWORD argument is already hashed
  132. Captures all T-SQL statements submitted by clients and the time issued. Used for debugging client applications.
  133. The row locks are to be taken
  134. There are ____ predefined templates for SQL Server Profiler.
  135. Used to prevent concurrent use of a resource by multiple different transactions
  136. The executable process of the SQL Server Database Engine.
  137. An option in Management Studio, allows you to script a login
  138. Capture statements submitted and their execution time. Used to identify the slower queries.
  139. Refers to an exclusive lock on the table
  140. Used for shortening the startup time when starting SQL Server from the command prompt
  141. Granted the permission to preform any activity in the server