DBA > Interview Resource

Microsoft SQL Server FAQs

Part:   1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41 

(Continued from previous part...)

What is the scope of the control permission in SQL Server 2005?

Answer
It allows the grantee the equivalent of ownership in that they have all permissions and can grant them to others.
Explanation
The Control permission is equivalent to assigning ownership of the securables. All available permissions are granted to the principal, and they the principal in turn can grant those permissions to others.


When testing connectivity in SQL Server, you use which utility in conjunction with the readpipe utility to establish a connection?

Answer
makepipe
Explanation
The makepipe utility is used with the readpipe utility to test connectivity only for named pipes connections. This utility has been deprecated in SQL Server 2005.


In replication, what is each set of the source data that is replicated from the source server called?

Answer
Article
Explanation
Each set of source data that is replicated is called an article.


In SSIS, what is the difference between output columns and external columns?

Answer
External columns represent the meta data of external data sources and output columns are used be data flow source adapters.
Explanation
Output columns are used by all data-flow source adapters and transformations. They are not used by destination adapters. Put simply, they represent the metadata of the data flowing out of the component. External columns represent the metadata of external data sources and destinations. As such, only source & destination adapters have external columns because these are the only components whose buffered pipeline data interacts with these external sources and destinations.


You want to be sure your database server if properly secured. You have two instances, a default instance and a named instance installed. Which ports do you need to open?

Answer
1433 and a specific port after configuring the named instance to use that specific port
Explanation
Named instances must be configured to use a specific port and that port then opened in the firewall.

(Continued on next part...)

Part:   1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41