Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
58 Cards in this Set
- Front
- Back
Because the backup process is not concerned with the ordering of pages, _______ can be used
to write pages to your backup device. |
multiple threads
|
|
The only operations that are not allowed during a full backup are:
|
- Adding or removing a database fi
- Shrinking a database |
|
The only two parameters required for a backup are the _________ and the ________.
|
- name of the database
- backup device |
|
When you specify more than one backup device, SQL Server _________ the backup across each of the devices specified. You can have up to _______ of these devices.
|
stripes
64 |
|
The MIRROR TO clause provides a built-in capability to create up to _______copies of a backup in a single operation
|
four
|
|
You can’t back up to tape and mirror to _______ or vice versa
|
disk,
|
|
The overhead of compression is always worth it. The amount of time saved for a ______ backup far exceeds the overhead associated with the _________operation.
|
compressed
compression |
|
When you specify ________ and you are backing up to a file that already exists, SQL Server appends the new backup to the end of the file. If you specify ______and the file already exists, SQL Server overwrites the file with the contents of the new backup
|
NOINIT
INIT |
|
It is recommended that you specify the ______ option to catch bad pages as early as possible.
|
CHECKSUM
|
|
Essentially, an ____ provides a sequence number for every change made to a database
|
LSN
|
|
As soon as SQL Server reaches the fi rst LSN that has not yet been ________ (that is, the oldest open transaction), the transaction log backup completes
|
committed
|
|
A _______ backup captures all extents that have changed since the last full backup.
|
differential
|
|
The primary purpose of a differential backup is to reduce the number of __________ backups
that need to be restored |
transaction log
|
|
SQL Server tracks each extent that has been changed following a full backup using a special page in the header of a database called the _________.
|
Differential Change Map (DCM)
|
|
A ______backup zeroes out the contents of the DCM.
|
full
|
|
A transaction log backup is an incremental backup because it captures any changes that have occurred since the last _______backup.
|
transaction log
|
|
The ___________ option allows you to create a backup that can be used to create the development or test environment, but it does not affect the database state or set of backups in production.
|
COPY_ONLY
|
|
A full backup with the COPY_ONLY option does not reset the ______ page and therefore has no impact on differential backups.
|
differential change map
|
|
A transaction log backup with the COPY_ONLY option does not remove ______ from the transaction log.
|
transactions
|
|
When a partial backup is executed, SQL Server backs up the ________ filegroup, all ____ filegroups, and any explicitly specified _____ filegroups.
|
primary
read/write read-only |
|
To reduce the size of a backup to only the filegroups that can change, you can perform a _______backup.
|
partial
|
|
When you enable page verification, each time a page is read from disk, SQL Server computes a new _____ and compares it to the checksum stored on the _____. If the checksums do not match, SQL Server returns an error and logs the page into a table in the ____database.
|
checksum
page msdb |
|
Tasks that are supported by maintenance plans are:
|
- backup up dbs
- shrinking dbs - re-indexing - updating stats - consistency checks |
|
Maintenance plans are based upon the tasks within _________.
|
SQL Server Integration Services (SSIS)
|
|
A service master key is created automatically the first time that an ______ is started.
|
instance
|
|
The _______is regenerated each time that you change the SQL Server service account or service account password.
|
service master key
|
|
By default, a DMK is encrypted with the _________.
|
service master key
|
|
If someone were to steal the backup of a database that contained encrypted data, he or she would not be able to access the encrypted data without also having access to the _____ and ____ .
|
master keys
certificates |
|
To validate a backup, execute the following command:
|
RESTORE VERIFYONLY FROM <backup device>
|
|
When a backup is validated, SQL Server performs the following checks:
|
- Calculates a checksum
- Verifies that the header of the backup - Transits the page chain to ensure that all pages are contained in the database |
|
What are the four types of backups?
|
full, differential, transaction log, and file/filegroup backups
|
|
How can you detect and log corrupt pages?
|
ALTER DATABASE <database name> SET PAGE_VERIFY CHECKSUM
|
|
A _______backup contains only the pages within the database that have been used.
|
full
|
|
________ backups contain all pages that have changed since the last full backup and are used to reduce the number of transaction log backups that need to be applied.
|
Differential
|
|
Transaction log backups contain all the changes that have occurred since the last ___________ backup.
|
transaction log
|
|
At a database level, the LSN of the last change in the database is stored in the header of the _________
|
master data file
|
|
At a data file level, the LSN of the last change to a page
within the file is stored in the header of the ________. Each data page within a database also records the LSN of the last change for the _________. |
data file
data page |
|
During the checkpoint process, SQL Server compares the LSN of the ______in the buffer pool to the LSN of the _______ on disk
|
dirty page
data page |
|
During the REDO phase, all committed transactions in the transaction log are ________.
|
flushed to disk
|
|
The UNDO phase moves through the transaction log and invalidates any transaction in the log that is still open, ensuring that an _______ transaction cannot be written out to disk.
|
uncommitted
|
|
When a RESTORE is issued with the _______ option, the restore completes, but the database is left in a
RECOVERING state such that subsequent differential and/or transaction log backups can be applied. |
NORECOVERY
|
|
The ________ option can be used to allow you to issue SELECT statements against the database while still issuing additional differential and/or transaction log restores
|
STANDBY
|
|
The ______option provides the ability to change the location of one or more data fi les when the database is restored.
|
MOVE
|
|
The step in the restore process where you first take a final transaction log backup is referred to as backing up the _______.
|
tail of the log
|
|
To provide the greatest flexibility for a restore, the first step in any restore operation is to issue a _______backup against the original database
|
transaction log
|
|
The ______ and ______ options allow you to specify either an LSN or a transaction log MARK to use for the stopping point in the restore operation.
|
STOPATMARK
STOPBEFOREMARK |
|
The state of the database equals the state of the filegroup designated as ________.
|
PRIMARY
|
|
Page corruption usually occurs where a ______ begins to fail.
|
disk controller
|
|
Page restore has several requirements:
|
- must be in either the Full or Bulked-logged recovery model
- must be able to create a transaction log backup - can apply only to a read/write filegroup. - must have a valid full, file, or filegroup backup - page restore cannot be executed at the same time as any other restore operation. |
|
procedure to restore a corrupt page
|
1. retrieve PageID of damaged page
2. Restore database page from full backup with NORECOVERY 3. Restore differential backups with NORECOVERY 4. Restore transaction log backups with NORECOVERY 5. Create a transaction log backup 6. Restore transaction log backup from step #5 with RECOVERY |
|
To restore from backup media that has been damaged, you need to specify the _______ option for a RESTORE DATABASE or RESTORE LOG command
|
CONTINUE_AFTER_ERROR
|
|
Which recovery model always allows you to restore to the point of failure so long as you can back up the tail of the log?
|
The Full recovery model.
|
|
What is the first operation that should be performed for any restore operation?
|
Back up the tail of the log.
|
|
If you create a Database Snapshot against a database with FILESTREAM data, the FILESTREAM filegroup is ______.
|
disabled
|
|
Which two features are incompatible with Database Snapshots?
|
FILESTREAM and full text indexes
|
|
Prior to reverting a database using a Database Snapshot, what must you do?
|
You must drop all Database Snapshots except the Database Snapshot being used as the source for the RESTORE command
|
|
A Database _______ is a point-in-time, read-only, copy of a database.
|
Snapshot
|
|
You can revert a database from a Database _______.
|
Snapshot
|