多项选择题
You are a database administrator for your company. The company runs a popular database-driven Web site against a SQL Server 2005 computer named SQL2. You need to ensure a quick response time and appropriate audit trail in the event that SQL2 experiences excessive traffic due to denial-of-service (DoS) attacks. Which two actions should you perform?()
A.Create a new performance alert to monitor the Current Bandwidth counter.
B.Create a new performance alert to monitor the Bytes Total/sec counter.
C.Configure the new performance alert to start a SQL Server Profiler trace.
D.Configure the new performance alert to start a Network Monitor capture.
相关考题
-
单项选择题
You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy. What should you do?()
A.Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.
B.Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.
C.Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.
D.Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.
E.Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database. -
单项选择题
You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name\password for first account: pentest\P@ssw0rdUser name\password for second account: hacktest\password You need to provide the information security team with the requested access to SQL1. Which Transact-SQL script should you use?()
A.CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'
B.CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFF
C.CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]
D.CREATE LOGIN [CONTOSO\pentest]FROM WINDOWS CREATE LOGIN [CONTOSO\hacktest]FROM WINDOWS -
单项选择题
YouaretheadministratorofaSQLServer2005computernamedSQL1.Youcreateasecuritytemplatethatdisablesunnecessaryservices.ThetemplateisappropriateonlyforSQL1.YouneedtoensurethatthesecuritytemplateisappliedtoSQL1.Yoursolutionmustensurethatthetemplateautomaticallyoverridesanymanualconfigurationchangesmadebyotheradministratorswithinanhour.Whatshouldyoudo?()
A.Use the SQL Server Surface Area Configuration tool to import the security template.
B.Use the Local Security Policy editor to import the security template into the Local Security Policy object.
C.Configure Task Scheduler to import the security template by using Secedit.exe. Configure the task to run every half hour.
D.Configure Task Scheduler to run the Microsoft Baseline Security Analyzer tool every half hour.
