DBA > Interview Resource

Microsoft SQL Server FAQs

Part:   1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41 

(Continued from previous part...)

To recover an instance of Notification Services in 2005 on another server, what information would you need?

Answer
A backup of the database holding Notification Services and the XSD and XSLT files as well as the name and password for the service account.
Explanation
To recover SSNS, you need the database backup as well as the operational files, XSD and XSLT files, stored on the file system and the account information used for the service account. Since SSNS usually works with data outside of the SQL Server, a domain account is usually used to ensure proper permissions.


What type of connectivity does the readpipe/makepipe utility test?

Answer
Named Pipes
Explanation
The readpipe and makepipe utility combination will test named pipe connectivity.


In SQL Server 2005, which of the following schema changes are supported for the publication objects of a replicated database?

Answer
All of the above.
Explanation
SQL Server 2005 replicated databases support the following schema changes for objects:
* ALTER TABLE
* ALTER VIEW
* ALTER PROCEDURE
* ALTER FUNCTION
* ALTER TRIGGER (DML only)


You want to disable the receipt of messages in one of your databases by the Service Broken. How should you do this?

Answer
ALTER DATABASE Sales SET DISABLE_BROKER
Explanation
To disable the receipt of messages, you can disable the Service Broker by disabling it with the ALTER DATABASE command. The SET command is "DISABLE_BROKER".


You are building a .NET assembly that will access the registry of the local machine for a factor used in a computer column. What permission set should you assign it?

Answer
EXTERNAL_ACCESS
Explanation
The most restrictive permission set should always be used for .NET assemblies in keeping with a secure SQL Server environment. Only the EXTERNAL_ACCESS and UNSAFE permission sets will allow registry access and UNSAFE permissions are not required.


(Continued on next part...)

Part:   1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41