Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Sybase 510-405 Exam - Cheat-Test.com

Free 510-405 Sample Questions:

Q: 1
Which of the following statements is TRUE about database files?
A. They are divided into pages.
B. They can be directly read by Interactive SQL.
C. You must unload and reload them to change operating systems.
D. You must have RESOURCE permission to create one.
Answer: A

Q: 2
After shutting your database server down cleanly, you have just deleted the existing database transaction log. How do you create a new transaction log for this non-replicating database?
A. Start the DBTRAN command with the -n command line option.
B. Start the DBBACKUP utility with the -t command line option.
C. Start the database server using the existing database file.
D. Start the Change Log File Information utility in Sybase Central.
Answer: C

Q: 3
When trying to connect from your application to the personal database server you receive the error "Database server connection limit exceeded". What is the problem?
A. The personal database server license has expired.
B. You have exceeded the personal database server limit of ten local connections.
C. The personal database server licensing information has been deleted.
D. You have exceeded the personal database server limit of five local connections.
E. You have exceeded the maximum number of connections for which you have licensed your personal database server.
Answer: B

Q: 4
Given the following stored procedure definition:
What is the result of the dba user executing the statement CALL my_proc(3)?
A. The value '3' is inserted into table_0.
B. The value '3' is inserted into table_1.
C. The value '3' is inserted into table_2.
D. The value '3' is inserted intoerr_table.
E. SQL Error -690, Return value cannot be set, will be issued.
Answer: D

Q: 5
Which two options are used for Transact-SQL compatibility?
A. BLOB_THRESHOLD
B. QUOTED_IDENTIFIER
C. DIVIDE_BY_ZERO
D. BLOCKING
E. ALLOW_NULLS_BY_DEFAULT
Answer: B, E

Q: 6
Which two are valid row-level trigger times?
A. DURING UPDATE
B. BEFORE INSERT
C. AFTER CONNECT
D. BEFORE SELECT
E. AFTER DELETE
Answer: B, E

Q: 7
Which encryption technology can secure ASA client-server communications?
A. AES
B. C2
C. Certicom TLS/SSL
D. DES
E. S/MIME
F. TDS
Answer: C

Q: 8
Using the following SQL statements, the DBA user creates a table called Customer and gives permission to the new user jsmith to view the data in the table:
When the user jsmith connects to the database the SQL statement SELECT * FROM
Customer returns the error "Table Customer not found", but the select statement SELECT *
FROM dba.Customer returns the proper result set. Which of the following should DBA execute so that jsmith could execute SELECT * FROM Customer and still have the data returned from the Customer table owned by DBA?
A. GRANT DBA TOjsmith;
B. GRANT SELECT ON Customer TOjsmith WITH GRANT OPTION;
C. REVOKE SELECT ON Customer TOjsmith;
GRANT ALL ON Customer TO jsmith;
D. GRANT GROUP TO Customer;
GRANT MEMBERSHIP IN GROUP Customer TO jsmith;
E. GRANT GROUP TO DBA;
GRANT MEMBERSHIP IN GROUP DBA TO jsmith;
Answer: E

Q: 9
Your non-replicating database file and transaction log file are corrupted. When you try to start the database server, you get an assertion failure. You are keeping a live backup of the database transaction log and you do a full on-line backup every night. What should you do to recover the most transactions after copying the backup database into your recovery directory?
A. Unload and reload the corrupted database.
B. Apply the backup log and the live backup log to the backup of the database file and restart the server.
C. Copy the live backup log over top of the corrupt transaction log and restart the server with the backup database.
D. Start the server on the corrupt database with the -f recovery switch,then apply the live backup of the transaction log to the corrupt database.
Answer: B

Q: 10
The default isolation level used when making ODBC connections is:
A. read uncommitted
B. read committed
C. repeatable read
D. whatever the AUTO_COMMIT option is set to
E. serializable
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved