Set - 8

Question 6 :

You have tightly secured access to your SQL Server 2005 server by placing it behind a firewall and limited ports 1433 to those clients that need to directly access the SQL Server. One of your developers complains about connecting to the Integration Services esrvice on your server. What could be the problem if you know the service is working properly?

Answer :

The firewall needs to allow port 135 through for Integration Services
Integration Services requires access to both DCOM and port 135. You need to open this port to allow the developer to communicate with SSIS.


Question 7 :

In SQL Server 2005, which network protocols use endpoints?

Answer :

All of the above
All communication points with SQL Server using network protocols use an endpoint. SQL Server creates defaults for each protocol that you enable.


Question 8 :

You have a SQL Server 2005 cluster and need to add anti-virus software as per your corporate standards. What should you exclude from scans?

Answer :

Log and data files for your databases as well as the Quorum drive and the backup folders.
Anti-virus programs can exist on the same server as SQL Server without an issue if you exclude certain items. The database data and log files, backup files and folders, the quorum drive for clusters, temporary replication files, the SQL Server log files, and Log Shipping folders/files. You do not need to exclude that SQL Server executables and probably do not want to so that they are protected.


Question 9 :

What port do you need to open on your server firewall to enable named pipes connections?

Answer :

Port 445
Named pipes communicates across TCP port 445.


Question 10 :

When the network service built-in account connects to a network resource, what is the context?

Answer :

The computer account of the Windows installation.
The network service account connects to network resources as the computer account for the Windows installation.