单项选择题
A. Back up the current transaction log. Restore the database with a different name and stop at the point just before the data loss. Copy the table back into the original database.
B. Back up the current transaction log. Restore the database to the point just before the data loss.
C. Restore the database from the existing backup files to a time just before the data loss.
D. Restore the database to the point of the last full backup.
单项选择题 YouconfigureanewSQLServer2005computertouseTCP/IPwithalldefaultsettings.Yourcorporatepolicyrequiresthateachserveruseafirewall.YoufindthatyoucanconnecttotheSQLServerinstancefromthelocalcomputer.However,clientcomputerscannotconnecttotheSQLServerinstance.Youneedtoidentifythemostlikelycauseoftheconnectionissues.Whatshouldyoudofirst?()
单项选择题 YourcompanyhastwoSQLServer2005computersnamedSQL1andSQL2.AuserinyourcompanynamedEricwritesmanyadhocqueriesagainstthecompanydatabases.ErichasaccesstotheCustomerdatabaseonSQL1.HedoesnothaveaccesstotheSalesdatabaseonSQL2.YouneedtoensurethatEriccanwritequeriesthatjoininformationfrombothservers.Whatshouldyoudofirst?()
单项选择题 Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use? ()