READ Free Dumps For Microsoft- 70-462
Question ID 18853 | You are a database administrator of a Microsoft SQL Server 2012 environment. The
environment contains two servers named SQLServer01 and SQLServer02. The database
Contoso exists on SQLServer01.
You plan to mirror the Contoso database between SQLServer01 and SQLServer02 by
using database mirroring.
You need to prepare the Contoso database for database mirroring.
Which three actions should you perform in sequence? (To answer, move the appropriate
actions from the list of actions to the answer area and arrange them in the correct order.)
|
Option A | Answer :
|
Correct Answer | A |
Explanation
Question ID 18854 | You administer a Microsoft SQL Server database named Sales. The database is 3
terabytes in size.
The Sales database is configured as shown in the following table.
You discover that all files except Sales_2.ndf are corrupt.
You need to recover the corrupted data in the minimum amount of time.
What should you do?
|
Option A | Perform a restore from a full backup.
|
Option B | Perform a transaction log restore.
|
Option C | Perform a file restore.
|
Option D | Perform a filegroup restore.
|
Correct Answer | C |
Explanation Explanation: Explanation/Reference: According to these references, this answer looks correct. http://technet.microsoft.com/en-us/library/ms187048.aspx http://msdn.microsoft.com/en-us/library/aa337540.aspx Under the simple recovery model, the file must belong to a read-only filegroup. Under the full or bulk-logged recovery model, before you can restore files, you must back up the active transaction log (known as the tail of the log). For more information, see Back Up a Transaction Log (SQL Server). To restore a database that is encrypted, you must have access to the certificate or asymmetric key that was used to encrypt the database. Without the certificate or asymmetric key, the database cannot be restored. As a result, the certificate that is used to encrypt the database encryption key must be retained as long as the backup is needed. For more information, see SQL Server Certificates and Asymmetric Keys.