Review Questions


1. 

You’ve been tasked with writing a standard for package security. You were able to gather the following background information: packages will be deployed to the file system, only sensitive data within the packages needs to be secured, and packages might be executed by multiple users. Which security option would you select from the following?

  1. Do Not Save Sensitive

  2. Encrypt All with Password

  3. Encrypt All with User Key

  4. Encrypt Sensitive with Password

  5. Encrypt Sensitive with User Key

  6. Rely on Server Storage for Encryption

image from book

2. 

Your packages need to be able to resume at the point they failed. Select all of the options that need to be enabled.

  1. Set the CheckPointFileName to any folder and filename.

  2. Set CheckPointShouldBeUsed to True.

  3. Set CheckPointSave to True.

  4. Set CheckPointUsage to Never.

  5. Set ForcedExecutionResult to Failed.

  6. Set CheckPointUsage to IfExists.

  7. Set CheckPointFileName to restart.xml.

  8. Set SaveCheckPoint to True.

image from book

3. 

You’re trying to set up a checkpoint on a conditional split, but you can’t find the properties you need. What is the most likely problem?

  1. You need to right-click the green line.

  2. Checkpoints are available only in the Enterprise Edition.

  3. Checkpoints can be set only on the control flow.

  4. Checkpoints can be set only on the data flow.

image from book

4. 

Which two of the following are valid techniques for scheduling execution of an SSIS package?

  1. Click the Scheduling tab of the deployment wizard, and set up a custom schedule.

  2. Create a job in SQL Agent with the type set to SSIS Package.

  3. Create a job under the legacy node of SSMS.

  4. Execute the package using DTExec.exe with a command-line parameter of /SCHEDULE.

  5. Create a task in the Windows Task Scheduler that uses DTExec.exe to execute the package.

image from book

5. 

You’ve been tasked with selecting a security mechanism that will allow your company to guarantee that you can detect whether a deployed package has changed. Which one of the following options would be the best solution?

  1. Enable the Rely on Server Storage for Encryption setting.

  2. Enable the Encrypt All with User Key setting.

  3. Enable the Encrypt All with User Key of the DBA setting.

  4. Digitally sign the package.

  5. There is no way to tell whether a package has been changed.

image from book

6. 

You have a package that has checkpoints enabled. You have a production package that failed last night that you want to run from step 1 rather than from the checkpoint. Which of the following is the best way to achieve that?

  1. Edit the package, and set SaveCheckPoint to False.

  2. Edit the package, and set CheckPointFileName to an empty string.

  3. Edit the package, set SaveCheckPoint to False, and then set CheckPointFileName to an empty string.

  4. Look up the name and path of the CheckPointFileName property in the package, and then delete that file.

  5. It is not possible to bypass the checkpoint recovery.

image from book

7. 

What action do you need to take to create a deployment manifest?

  1. No action is required. It is created automatically when you build the package.

  2. Set the CreateDeploymentUtility property of the deployment task to True.

  3. Set the CreateDeploymentUtility property of the project to True.

  4. Change the deployment output path.

image from book

8. 

Package configurations can be stored in which of the following ways? (Choose five.)

  1. Registry

  2. XML file

  3. Environmental variable

  4. Parent package variable

  5. SQL Server

  6. Inside the package

  7. Remotely using the MS.Config web service

image from book

9. 

Which of the following items can be changed using the Execute Package Utility?

  1. Configurations

  2. Connection managers

  3. Verification options

  4. Logging

  5. All of the above

  6. None of the above

image from book

10. 

You need to process all the files in a folder with the extension of .csv. For each file you process, you will need to look up the correct city name based on the ZIP code and then write the results to a file that will be used by a different SSIS package. Which of the following would best accomplish that?

  1. Use a ForEach loop container set to Process Only *.csv Files. Add a data flow task inside the loop. On the data flow, add a Flat File source, a lookup task, and a Raw File output.

  2. Use a For loop container set to Process Only *.csv Files. Add a Data Flow task inside the loop. On the data flow, add a Flat File source, a lookup task, and a Raw File output.

  3. Use the File System task to retrieve all *.csv files, use the Union All transform to concatenate into one big file, and then write that file to disk using an SSIS TempFile destination.

  4. Use the Script task to loop through the files in the folder, and then loop through each of the files writing a new temp.csv file line by line. No other tasks or transforms are needed to accomplish this task.

image from book

11. 

Your manager has asked you to integrate some existing DTS packages into a new project you’ll be starting on. Which of the following would be the best way to proceed, given that you are on a tight deadline?

  1. Use the Execute Process task.

  2. Use the Execute SQL task to call the package directly.

  3. Use the Execute Package task.

  4. Rewrite the package in SSIS, because SSIS cannot call DTS packages.

  5. Rewrite the package in SSIS, because it will be a cleaner solution.

image from book

12. 

A number of tasks can start with Transfer: Transfer Logins, Transfer Jobs, and Transfer Databases. What are these tasks most commonly used for?

  1. They automate installs of SQL Server.

  2. They are not used; they are legacy items from DTS.

  3. They are used when the cluster fails over.

  4. They are used by maintenance plans.

image from book

13. 

If you were working on a package that would access SQL Server only and needed to add a column to the data set, which of the following options would work? (Choose two.)

  1. Use the Import Column transform.

  2. Use the Export Column transform.

  3. Build the derived column in the SELECT statement.

  4. Use the Derived Column transform.

image from book

14. 

A co-worker has completed a package and sent to you for deployment. The files include new-employees.dtsconfig, newemployees.SSISDeploymentManifest, and newemployees.dtsx. Based on those files, which of the following are true? (Choose three.)

  1. Your co-worker has specified a configuration file (newemployees.dtsconfig).

  2. You are missing the security.ini file.

  3. The SSIS deployment manifest can be used to deploy the package without having to reopen it in BIDS.

  4. Your co-worker has created the package using DTS compatibility mode; otherwise, the package would be named newemployees.ssis.

  5. You can view all of these views by opening them in Notepad because they are all XML files.

image from book

15. 

Which of the following will make it easier for someone else to maintain a package you created?

  1. All task and transforms relabeled with meaningful names

  2. Transactions used if appropriate

  3. Checkpoints used to allow restarting the package

  4. Checkpoints used after each control flow step

  5. Additional text annotations used to explain key pieces of logic

  6. Checkpoints used to allow restarting the package after steps that are resource intensive

image from book

16. 

A new employee has asked you to give him a very high-level overview of the differences between DTS and SSIS because he has some experience with DTS. Which of the following statements would help him understand? (Choose four.)

  1. DTS packages can be executed by themselves or as part of an SSIS package with no changes on a SQL Server 2005 server.

  2. DTS packages have to be converted using the SSIS DTS Wizard before they will run on SQL Server 2005.

  3. DTS used Enterprise Manager to create and administer packages; in SQL Server 2005, you use BIDS for design and Enterprise Manager for deployment.

  4. DTS used Enterprise Manager to create and administer packages; in SQL Server 2005, you use BIDS for design, SSMS for administration, and the DTExec.exe utility for deployment.

  5. SSIS does not require SQL Server to be installed to work, and it runs as a service.

  6. SSIS requires SQL Server to be installed on the same machine, and packages are executed by the SQL Server service.

  7. SSIS packages cannot be saved to Visual Basic code, but C# is OK.

  8. SSIS packages are saved as XML files and cannot be saved as code.

  9. Enterprise Manager must be loaded to edit a DTS package.

image from book

17. 

Which control lets you send its output to more than one destination?

  1. Data Conversion

  2. Merge Join

  3. Multicast

  4. Conditional Split

image from book

18. 

A talented co-worker has written some script for you that has been placed into a Script task that you have added to your package, but now the package is failing. Which of the following debugging steps listed are worth trying? (Choose two.)

  1. Remove the Script task from the package, and reexecute.

  2. Set a breakpoint on the first line of script, and then step through the code in the Visual Studio environment until you reach an error or the entire script has been executed.

  3. Set the Break on All Errors property of the project, and then run the package.

  4. Roll back to the previously saved version, and add the Script task again; sometimes it fails on the first attempt.

image from book

19. 

Your manager has asked you to schedule a package to run once per day and to automatically notify her if the package fails. All packages at your company are stored in SQL Server and executed by the SQL Agent. What would be the easiest way to notify her of a failure?

  1. Add a Send Mail task to the end of the data flow.

  2. Add a Send Mail task to the end of the control flow.

  3. Set the SQL job to notify your manager on failure only.

  4. Build a second job that checks the error log and emails the manager if “FAILURE” is included in the error log.

image from book

20. 

You have selected the Rely on Server Storage for Encryption option for security. Which of the following are true? (Choose three.)

  1. There is no such setting; you have to specify either user key or password encryption for securing packages.

  2. The package will be encrypted and stored in the sysdtspackages90 table.

  3. The package will be stored in the sysdtspackages90 table, but it will not be encrypted.

  4. Access to the package will be controlled by roles, which by default have db_dtsadmin, db_dtsoperator, and the package creator in the reader role and have db_dtsadmin and the package creator in the writer role.

  5. Access to the package will be controlled by roles, which by default have db_dtsadmin, db_dtsexecute, and the package creator in the execute role and have db_dtsadmin and the package creator in the admin role.

  6. SQL roles do not apply to packages stored in the file system.

  7. SQL roles do not apply to any packages.

image from book

Answers

1. 

D. Option A would not help because it would remove all the sensitive data that would most likely be needed to execute the package. Options C and E would work only for the user that saved the package, and option F does not work for the file system. That leaves you with options B and D, with D being the better choice in this case because you want to encrypt only the sensitive portions of the package.

2. 

A, F, H. For checkpoints to work, you need to set a CheckPointFileName property (it’s blank by default), set SaveCheckPoint to true, and set CheckPointUsage to IfExists. Combined, they tell SSIS that the checkpoint is enabled and to use the file if it is present on disk. Checkpoint files can be named anything, but an .xml extension is common.

3. 

C. This is one to watch out for: checkpoints work only in the control flow. If you want to have checkpoints in the data flow, break up the data flow into two or more different data flows, which allows you to put a checkpoint between them on the control flow.

4. 

B, E. There are only two standard ways to schedule a job of any kind-using SQL Agent or using Task Scheduler. Neither the deployment wizard nor DTExec.exe allows you to set a schedule.

5. 

D. Digital signatures when combined with setting the verification option of the package to require them are the only guaranteed way to detect whether a package has changed. Note that you could certainly do a diff between two versions of a DTSX file to see any changes, but that would not enforce the rule that it cannot run if changed.

6. 

D. Deleting the checkpoint file is the best way because it requires no changes to the package, which is handy if it was built with a digital signature, for example; however, even without that change, the package introduces the chance that once you’ve recovered from the problem, you might not restore the package to its original state.

7. 

C. Deployment manifests are not created by default; you have to enable them by setting the CreateDeploymentUtility property to True. Changing the deployment path would change where you would find the manifest, but it doesn’t control whether it’s created.

8. 

A, B, C, D, E. You get a rich set of options for saving package configurations. Configurations sit outside the package so that you can change them, or they swap between two or more configurations, without actually changing the code flow in the package. There is no option to store the configuration inside the package, and there is no option called MS.Config.

9. 

E. The Execute Package Utility lets you manage configurations, connection managers (directly, without even needing to set up a configuration), verification options such as requiring the digital signature to match, and logging.

10. 

A. The ForEach loop container is the best choice because it natively supports processing the file system, and then in the data flow you need a Flat File source, a lookup task (to get the city name), and a Raw File destination. Raw files are a native format used by SSIS that avoids the logging overhead of writing staging data to a SQL Server table.

11. 

C. The best and quickest way is via the Execute Package task. SSIS can execute DTS packages without any changes (but remember you can modify them only if you have a SQL Server 2000 instance installed or you installed the designer separately).

12. 

D. It is certainly possible to use them for automating installs (or more accurately, post-install configuration), but the most common use is for maintenance plans generated by the Maintenance Plan Wizard. This is a big change from SQL Server 2000, and this finally gives the DBA a chance to truly customize maintenance plans without having to write entirely custom solutions.

13. 

C, D. It’s usually going to be faster and cleaner to create the derived column in your SELECT statement, but it’s certainly valid to do it with the Derived Column transform. Import and Export Columns transforms are specialized transforms that work with files that are associated with rows of data.

14. 

A, C, E. Configuration files typically have the .dtsconfig extension (but you could use something different), and manifests have the SSISDeploymentManifest extension. All three types (configuration, manifest, and package definition) are stored on disk as XML files. There is no DTS compatibility mode.

15. 

A, E. Documenting how and why a package works is the best way to make it easier for someone else to maintain a package. In SSIS, you best accomplish this by renaming tasks and transforms and adding text annotations. Transactions and checkpoints should be when used if the project requires them but do not directly help another person understand the implementation of the package.

16. 

A, D, E, H. A key part of upgrading to SQL Server 2005 is that very little breaks; in particular, you know that DTS packages will continue to execute as before. A big change was splitting the DTS functionality of Enterprise Manager into multiple applications: BIDS, SSMS, and DTExec.exe. It’s all XML now, with no saving to language files of any type. And finally, there is no requirement to load Enterprise Manager to edit DTS (but you do need either a SQL Server 2000 instance or the DTS Designer installed).

17. 

C. The Multicast transform is the unusual one; the other transforms have one output. Although it’s not part of the question, remember that the Union All transform takes multiple inputs (but has a single output).

18. 

A, B. If you can do it and still have a working package, option A is the quickest way to prove the problem is in the Script task. Answer B will work but assumes that it was the talented co-worker who erred rather than you! Using the breakpoint in the Visual Studio environment should take you to the exact point of the problem.

19. 

C. You could use a Send Mail task, but you would have to make it conditional on something to work only on failure-so either an error generated from the task or transform or a value you could look up. Building a second job would be a lot more work and not as good as just relying on the built-in functionality of the SQL Agent (which can always notify, notify on success, or notify on failure).

20. 

C, D, F. Server storage is not usually encrypted. Instead, you secure it with SQL permissions, and the default settings use the built-in roles (db_dtsadmin, db_dtsoperator), but you can build other roles if needed. Option F is correct but doesn’t really apply here since you know you’re not storing packages in the file system. Option E is incorrect because there is not a role called db_dtsexecute



MCITP Administrator. Microsoft SQL Server 2005 Optimization and Maintenance Study Guide (70-444)
MCITP Administrator: Microsoft SQL Server 2005 Optimization and Maintenance (Exam 70-444) Study Guide
ISBN: 0470127457
EAN: 2147483647
Year: 2004
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net