Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
SSIS (SQL Server Integration Services) consists of two different deployment models. Project deployment and Package deployment models, which of the following options incorrectly describes the respective models?
Correct
Package Deployment: During execution, any event produced is not automatically saved to the catalog. A log provider has to be added to capture such events.
Incorrect
Package Deployment: During execution, any event produced is not automatically saved to the catalog. A log provider has to be added to capture such events.
-
Question 2 of 10
2. Question
A company requires transactions to be enabled within the SSIS to allow the container to start transactions. This can be achieved by changing the settings of the TransactionOption property. Multiple options are provided, in order to fulfil the company’s requirements, select the most appropriate option provided in the TransactionOption property menu.
Correct
The TransactionOption property menu only provides three options: “NotSupported”, “Supported”, and “Required”. The most appropriate options from these is “Required”.
Incorrect
The TransactionOption property menu only provides three options: “NotSupported”, “Supported”, and “Required”. The most appropriate options from these is “Required”.
-
Question 3 of 10
3. Question
In certain cases, package failure may occur, however, to quickly recover data SSIS Checkpoints are set up to restart a package at the update step. This can further be set up using Checkpoints to configure the restart at certain steps (i.e, points of failure). From the following options, which of these settings found at the Control Flow Tab for Checkpoints is incorrect?
Correct
The only three options found at the settings are; CheckpointFileName: Configures the path and filename to store the checkpoint run status information. CheckpointUsage: When using IfExists, the checkpoint file is created unless there is an existing one. SaveCheckpoint: By setting this to true, checkpoints are enabled (CheckpointSave does not exist).
Incorrect
The only three options found at the settings are; CheckpointFileName: Configures the path and filename to store the checkpoint run status information. CheckpointUsage: When using IfExists, the checkpoint file is created unless there is an existing one. SaveCheckpoint: By setting this to true, checkpoints are enabled (CheckpointSave does not exist).
-
Question 4 of 10
4. Question
When multiple tasks are executed as a group, SSIS provides multiple types of containers (whether these tasks are done sequentially or parallel). From the following options, select the type which is NOT a container
Correct
SSIS provides only three types of containers; Sequence Container: Group several tasks together, organizing them to run as a single unit. For Loop Container: Loop and then run several tasks a number of times within a container. Foreach Loop Container: Loop and run each task from a file (Parallel Container does not exist).
Incorrect
SSIS provides only three types of containers; Sequence Container: Group several tasks together, organizing them to run as a single unit. For Loop Container: Loop and then run several tasks a number of times within a container. Foreach Loop Container: Loop and run each task from a file (Parallel Container does not exist).
-
Question 5 of 10
5. Question
A company wants to protect its SSIS package by securing it with a password, there are multiple options, however, the company wants to encrypt the whole package with a password. From the following options, select the most appropriate answer.
Correct
To meet the company’s demands EncryptAllWithPassword should be used as this encrypts the whole package with a password. Some other methods of securing SSIS packages with a password are DontSaveSensitive, this removes sensitive information and EncryptAllWithUserKey, this encrypts the whole package with the user’s profile key.
Incorrect
To meet the company’s demands EncryptAllWithPassword should be used as this encrypts the whole package with a password. Some other methods of securing SSIS packages with a password are DontSaveSensitive, this removes sensitive information and EncryptAllWithUserKey, this encrypts the whole package with the user’s profile key.
-
Question 6 of 10
6. Question
A company wants to keep track of historical changes affecting its data to create a year-end report. This can be achieved with SCD (Slowly Changing Dimensions), the company requires outdated records to be changed when using SCD without saving records. From the following list of options which would be the most appropriate to meet the company’s demands?
Correct
Fixed Attributes are Type 0 attributes, they can not be changed. Changing Attributes are Type 1 attributes, which can update values to a newer one without saving records (as the company requires). Historical Attributes are Type 2 attributes, which can also update values while maintaining a record of the previous ones. Recorded Attributes does not exist
Incorrect
Fixed Attributes are Type 0 attributes, they can not be changed. Changing Attributes are Type 1 attributes, which can update values to a newer one without saving records (as the company requires). Historical Attributes are Type 2 attributes, which can also update values while maintaining a record of the previous ones. Recorded Attributes does not exist
-
Question 7 of 10
7. Question
When combining data from multiple sources in order to consolidate and deduplicate it (bringing it under one roof) SQL Server provides two fuzzy transformation solutions, Fuzzy Grouping and Fuzzy lookup. When describing these two transformations, choose from the following options the incorrect statement.
Correct
Fuzzy grouping is used for deduplication and standardizing values in column data. Fuzzy lookup is used to identify mapping to lookup values using a reference table (along with fuzzy match). So, the main difference between the two is, fuzzy grouping executes the comparison with the input data itself while Fuzzy Lookup uses a reference table.
Incorrect
Fuzzy grouping is used for deduplication and standardizing values in column data. Fuzzy lookup is used to identify mapping to lookup values using a reference table (along with fuzzy match). So, the main difference between the two is, fuzzy grouping executes the comparison with the input data itself while Fuzzy Lookup uses a reference table.
-
Question 8 of 10
8. Question
A company requires you to search for a large piece of text in its database. A method that can be used is Term Lookup, however certain conditions should be adhered to. From the following options, which of these is NOT a condition to bear in mind when using Term Lookup
Correct
“Multiple forms” does not exist, when looking up the word bag, for example, Singular Form: bag = bags, Plural form: bag is not = bags, Case Sensitivity: he wore the bag. Bag on discount for sale. both bags are counted
Incorrect
“Multiple forms” does not exist, when looking up the word bag, for example, Singular Form: bag = bags, Plural form: bag is not = bags, Case Sensitivity: he wore the bag. Bag on discount for sale. both bags are counted
-
Question 9 of 10
9. Question
Data flow transforms sometimes process information through varied speeds using different processes such as: Fully Blocking Asynchronous Transformations (FBAT), Semi-Blocking Asynchronous Transformations (SBAT) and Non-Blocking Synchronous Transformations (NBST). From the options given below, which example is incorrect for the given process?
Correct
NBST is also a very fast transformation process (not intermediate) used for rapid streaming processes such as Data Conversion and Auditing.
Incorrect
NBST is also a very fast transformation process (not intermediate) used for rapid streaming processes such as Data Conversion and Auditing.
-
Question 10 of 10
10. Question
Data that is brought into a DW comes from different sources such as XML files or files directly from the database. These need to be mapped to the correct columns (destination column mapping) using certain methods. The following options describe these methods, select the option which does NOT describe a type of Destination Column Mapping
Correct
There are only 3 types of options; Select All Mappings, Delete Selected Mappings, Map Items By Matching Names (AutoSelective Mapping does not exist).
Incorrect
There are only 3 types of options; Select All Mappings, Delete Selected Mappings, Map Items By Matching Names (AutoSelective Mapping does not exist).