多项选择题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.
What should you do? ()
A.The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)
B.You should restore a backup to the active node
C.You should get rid of the shared array from the active node
D.From the active node, you have to uplug the network cable(s)
相关考题
-
单项选择题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you. So what action should you perform to achieve this goal?()
A.All the SQL Server logins of the application developers have to be added to a fixed server role.
B.All the database users of the application developers have to be added to a fixed database role
C.All SQL Server logins of the application developers should be given the appropriate server-level permissions.
D.All database users of the application developers should be given the appropriate database-level permissions. -
单项选择题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. VIP customer data of the company are stored in DB1. The customers access their profile data by using a Web application. You must ensure the security of the customer data, that is to say, even if the backup media is lost, you must guarantee that data files, log files and subsequent backups and so on are as safe as possible. So what action should you perform to achieve this goal?()
A.For both the CustomerDB database and the master database, enable Transparent Database Encryption
B.You should use the built-in encryption functions to encrypt the sensitive data at the cell Ievel
C.You should make the CustomerDB database accessible only through stored procedures and functions.
D.For the CustomerDB database, enable Transparent Database Encryption and back up the transaction log. -
单项选择题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully. So on InstanceB, which Transact-SQL statements should you execute?()
A.USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary;
B.USE AdventureWorks;ALTER LOGIN Mary ENABLE;
C.USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = "Tk@87#34" UNLOCK;
D.USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;
