O'Reilly logo

MCITP Administrator: Microsoft® SQL Server™ 2005 Optimization and Maintenance (70-444): Study Guide by Andy Warren, J. Steven Jones, Marilyn Miller-White, Victor Isakov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Answers to Review Questions

  1. D. Option A would not help because it would remove all the sensitive data that would most likely be needed to execute the package. Options C and E would work only for the user that saved the package, and option F does not work for the file system. That leaves you with options B and D, with D being the better choice in this case because you want to encrypt only the sensitive portions of the package.
  2. A, F, H. For checkpoints to work, you need to set a CheckPointFileName property (it's blank by default), set SaveCheckPoint to true, and set CheckPointUsage to IfExists. Combined, they tell SSIS that the checkpoint is enabled and to use the file if it is present on disk. Checkpoint files can be named anything, but an.xml ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required