Deck 8: Backup and Recovery
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
Match between columns
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/36
العب
ملء الشاشة (f)
Deck 8: Backup and Recovery
1
Which category of risk has the highest probability of occurrence?
A)user error
B)hardware failure
C)system software failure
D)environmental events
A)user error
B)hardware failure
C)system software failure
D)environmental events
A
2
Which of the following is true about backup sets?
A)backup sets are usually stored to the same media as the database log
B)when the expiration date on a backup set passes, the data is no longer usable
C)backups made to tape are preferable to using disks due to better performance
D)a backup device references a physical location where backup sets are stored
A)backup sets are usually stored to the same media as the database log
B)when the expiration date on a backup set passes, the data is no longer usable
C)backups made to tape are preferable to using disks due to better performance
D)a backup device references a physical location where backup sets are stored
D
3
If you experience database corruption, what should you do before performing a restore operation?
A)backup the transaction log tail
B)restore the head of the transaction log
C)perform a fresh full backup
D)check the physical integrity of the database
A)backup the transaction log tail
B)restore the head of the transaction log
C)perform a fresh full backup
D)check the physical integrity of the database
A
4
How are full and differential database backups used?
A)a differential backup is followed by one or more full backups
B)full backups copy data that has changed since the last differential backup
C)differential backups are usually performed more often than full backups
D)differential backups are more resource intensive than full backups
A)a differential backup is followed by one or more full backups
B)full backups copy data that has changed since the last differential backup
C)differential backups are usually performed more often than full backups
D)differential backups are more resource intensive than full backups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
5
The AwlaysOn capabilities of SQL Server 2012 effectively replace the need to perform traditional backups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is NOT a commonly used type of backup plan?
A)Full database backup, simple recovery model
B)Single transaction log backup plus simple recovery model
C)Single transaction log backup plus full database backup
D)Full database backup plus multiple transaction log backups
A)Full database backup, simple recovery model
B)Single transaction log backup plus simple recovery model
C)Single transaction log backup plus full database backup
D)Full database backup plus multiple transaction log backups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
7
What SQL command do you use when restoring transaction logs if you want to do a point-in-time restore?
A)TIMELOG
B)TRANSACT
C)STOPAT
D)NOTAFTER
A)TIMELOG
B)TRANSACT
C)STOPAT
D)NOTAFTER
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following SQL commands should you perform in a database recovery operation right before you check the logical and physical integrity of the database?
A)RESTORE DATABASE FROM WITH NORECOVERY;
B)RESTORE LOG FROM WITH FILE = n WITH NORECOVERY;
C)RESTORE DATABASE FROM WITH NORECOVERY;
D)RESTORE DATABASE WITH RECOVERY;
A)RESTORE DATABASE FROM WITH NORECOVERY;
B)RESTORE LOG FROM WITH FILE = n WITH NORECOVERY;
C)RESTORE DATABASE FROM WITH NORECOVERY;
D)RESTORE DATABASE WITH RECOVERY;
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
9
Transaction logs are required in the event that a database needs to be restored back to a specific point in time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which recovery model causes all changes to the database to be written to the transaction log?
A)simple recovery model
B)full recovery model
C)bulk logged recovery model
D)truncated recovery model
A)simple recovery model
B)full recovery model
C)bulk logged recovery model
D)truncated recovery model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which backup scheme reduces the amount of downtime to perform a restore but creates additional IT management and physical resource overhead?
A)Full database backup plus differential database backup plus multiple transaction log backups
B)Single transaction log backup plus full database backup
C)Full database backup plus multiple transaction log backups
D)Single transaction log backup plus simple recovery model
A)Full database backup plus differential database backup plus multiple transaction log backups
B)Single transaction log backup plus full database backup
C)Full database backup plus multiple transaction log backups
D)Single transaction log backup plus simple recovery model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is true about the factors that should be considered when evaluating database business requirements and the associated risk assessments?
A)mission-critical systems provide administrators with a large time window for performing maintenance
B)databases that have a high change rate require more frequent backups
C)for best performance, backups should be done when the system is under peak load
D)a single large database is usually easier to maintain than several smaller databases
A)mission-critical systems provide administrators with a large time window for performing maintenance
B)databases that have a high change rate require more frequent backups
C)for best performance, backups should be done when the system is under peak load
D)a single large database is usually easier to maintain than several smaller databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is true about recovery objectives?
A)they should be the same for each database
B)the RTO is usually the same whether the recovery scenario involves one or many databases
C)the RTO is the maximum amount of data that may be lost
D)the recovery point objective is expressed as a time frame
A)they should be the same for each database
B)the RTO is usually the same whether the recovery scenario involves one or many databases
C)the RTO is the maximum amount of data that may be lost
D)the recovery point objective is expressed as a time frame
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
14
After you devise a backup plan, you should do a risk assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is a reason that transaction logs must be backed up frequently?
A)so you don't have to spend time backing up data files
B)frequent backups increase the likelihood of a corrupt active transaction log
C)when the log is backed up, it is truncated
D)the tail of the log increases each time the log is backed up
A)so you don't have to spend time backing up data files
B)frequent backups increase the likelihood of a corrupt active transaction log
C)when the log is backed up, it is truncated
D)the tail of the log increases each time the log is backed up
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
16
In which risk category would an incompatibility between SQL Server and Windows be considered?
A)user error
B)hardware failure
C)system software failure
D)environmental events
A)user error
B)hardware failure
C)system software failure
D)environmental events
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
17
Data loss caused by environmental events has the greatest possibility of occurrence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is NOT among the three primary factors that should be considered for each risk scenario identified?
A)probability of occurrence
B)personnel involved in the scenario
C)magnitude of the impact
D)difficulty of timely detection
A)probability of occurrence
B)personnel involved in the scenario
C)magnitude of the impact
D)difficulty of timely detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is true about database backup types?
A)backups can be performed when a database is offline
B)backups cannot be performed when a database is online
C)SQL Server 2012 databases can only be backed up using Object Explorer
D)incremental backups can be performed using the BackUp Database dialog box
A)backups can be performed when a database is offline
B)backups cannot be performed when a database is online
C)SQL Server 2012 databases can only be backed up using Object Explorer
D)incremental backups can be performed using the BackUp Database dialog box
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
20
SQL Server 2012 can back up database files to physical disk media or to tape.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
21
List four business requirements factors that should be evaluated for each production user and system database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe the two types of recovery objectives you should build for each production database under different risk scenarios.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is a differential database backup?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
25
_____________ logs record changes that occur to the data in a database over time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
26
What is a full database backup?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is a checksum and how is it used with a database backup?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which category of risk has the highest probability of occurrence? Explain your answer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
29
Backup sets can be assigned a(n)____________ date, which helps to ensure that existing backups on the media will not be overwritten until a specified time in the future.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
30
The rate at which a database changes will determine the ___________ with which backups must occur in order to minimize data loss
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
31
The output of a __________ assessment is used to prioritize the allocation of resources in the most effective manner possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
32
List the sequence of tasks you should perform to recover a database using backups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
33
By undertaking an assessment of the risk factors and business requirements, you can build a set of ____________ objectives for each production database under different risk scenarios.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
34
List the four commonly used types of backup plans.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is the bulk logged recovery model an what type of restores does it support?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the importance of the transaction log tail in transaction log backups?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 36 في هذه المجموعة.
فتح الحزمة
k this deck