多选题You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()AAdd the Task_Admin role to thedb_accessadmin fixed database role.BGrant Update permissions on the Tasks table to the Task_Admin role.CGrant Update permissions on the Tasks table to the User 1 role foreach column except the Close Dateand Estimated Time columns.DCreatean INSTEAD OF trigger on the Tasks Table. Use theIs_Member function toprevent the User 1 role from updating the Close Date and Estimated Time columns.

多选题
You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()
A

Add the Task_Admin role to thedb_accessadmin fixed database role.

B

Grant Update permissions on the Tasks table to the Task_Admin role.

C

Grant Update  permissions on  the  Tasks table to  the  User  1  role foreach  column  except the  Close  Dateand Estimated  Time columns.

D

Createan  INSTEAD OF trigger  on  the  Tasks Table. Use theIs_Member function  toprevent the  User  1  role from updating the Close  Date and Estimated  Time columns.


参考解析

解析: 暂无解析

相关考题:

You develop a serializable class for persisting objects as files.Every time an object is serialized, you have to update the database with the name of the object and location of that file.You elect to employ the OnSerialized attribute to achieve this objective.You now need to apply the OnSerialized attribute to a certain method.What should you do?()A.B.C.D.

You are adatabase developer.You develop ataskmanagementapplication that connect stoa SQLServer2008databasenamed TaskDB.Users logon to the application by using a SQLServer login. The application containsamodulenamed Taskthatassignstaskstousers.Informationaboutthe setasksisstoredinthe Taskstableofthe TaskDB data base.The Taskstablecontainsmultiplecolumns.These include the Close Dateand Estimated Timecolumns.Theapplication mustmeetthefollowingsecurityrequirements:Usersassigned toad atabase role named User 1 canupd ate all taskinformation columnsexceptthe Close Dateandthe Estimated TimecolumnsintheTaskstable.Administrative usersassigned toad atabase rolenamed Task_Admincanupd ateall taskinformation intheTaskstable.Youneedtodesignastrategy tomeetthesecurityrequirements.Whichtwoactionsshouldyouperform?()

You are adatabase solutionsarchitect.Your company plansto develop asolution by using a SQLServer2008instance.The solutionhasthefollowingbusinessrequirements:ImportdatafromvariousdatasourcessuchasMicrosoftOfficeExcel,Microsoft SQL Server2000,MicrosoftSQLServer2005,andCSVfiles.Profilethesourcedatabeforeitisimported.Providecollaborationandofflinecapabilitiestomobileusers.Allowmobileuserstouseheterogeneousdatastores.YouneedtoconfiguretheappropriateSQLServercomponentstoaccomplishthebusinessrequirements.Youwanttoachievethisgoalbyusingtheminimum amountofadministrativeeffort.Whichtwo SQL Server componentsshould you use?()

When do you need to configure the P1 interface?()A、 whenever you have an upstream proxyB、 whenever you intend to deploy the L4TM in blocking modeC、 whenever you want to enable the WSA proxyD、 whenever you have a separate management VLAN orsubnetwork

You work as a database administrator for Supportcenter.cn. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()A、Database ControlB、Management ServerC、Management RepositoryD、Application Server ControlE、Oracle Management Agent

Certkiller.com has employed you as a Web Application Developer. You are in the process ofcreating an ASP.NET application using Microsoft .NET Framework v3.5. You decide to create acustom Web user control for the application.  You name this control TestShare. TestShare will be compiled as a library. The code below iswritten for TestShare. (The line numbers is included for reference purposes) 1 Protected Overloads Overrides Sub OnInit(ByVal e As EventArgs) 2 MyBase.OnInit(e) 3 4 End Sub  The master pages in the application contains the directive below:%@ Master Language="VB" EnableViewState="false" % You receive an instruction from management to make sure that the state of TestShare is able tocontinue on the pages that reference a master page. You thus need to determine the appropriatecode that should be added at line 3.  What should you identify?()A、You should consider adding the Page.RegisterRequiresControlState(Me) code fragment.B、You should consider adding the Page.UnregisterRequiresControlState(Me) code fragment.C、You should consider adding the Page.RegisterStartupScript("TestShare", "server") codefragment.D、You should consider adding the Page.RegisterRequiresPostBack(Me) code fragment.

If an existing script is uploaded to the CRS, what does it ask?()A、Do you want to debug the script?  B、Do you want to refresh the script?  C、Do you want to save the application?  D、Do you want to return to Script Management?

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to view the replication status of a mailbox database copy in the organization. What should you do?()A、You should consider having the properties of the database copy viewed from the Exchange Management Console (EMC).B、You should consider having the properties of the Mailbox server viewed from the Exchange Management Console (EMC).C、You should consider having the Test-ServiceHealth cmdlet run from the Exchange Management Shell.D、You should consider having the Get-DatabaseAvailabilityGroup cmdlet run from the Exchange Management Shell.

You are employed as the exchange administrator at TestKing.com. You are in the process of installing anew Exchange Server 2010 Organization. Outlook Web App is used throughout the organization by usersto access their e-mail. TestKing.com wants you to implement a new compliance policy that states that e-mail messaging containing client contracts be kept for two years. Management also wants users to classify e-mails relatingto client contracts as well as moving e-mail messages to other folders. You are instructed a solution thatwill comply with the set criteria. What should you do?()A、You should recommend Retention Policy Tags as well as a Retention Policy to management.B、You should recommend an OWA mailbox policy to management.C、You should recommend Managed Folder mailbox policies to management.D、You should recommend Personal Archives and an Archive policy to management.

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in London where you are located.During the course of the day you receive notification from management to view the a number of mailbox on the servers that is bigger than 1 GB.What should you do?()A、You should consider having the properties of the mailbox database viewed from the Exchange Management Console (EMC).B、You should consider running the Get-Mailbox cmdlet from the Exchange Management Shell.C、You should consider running the Get-MailboxStatistics cmdlet from the Exchange Management Shell.D、You should consider having a recipient filter created from the Exchange Management Console (EMC).

You have an Exchange Server 2010 organization.You need to use Role Based Access Control (RBAC) to provide a user the ability to manage recipients in a specific organizational unit (OU).  What should you do first?()A、Create a new direct role assignment.B、Create a new management role assignment policy.C、Create a new management scope.D、Modify the default management scope.

You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization that contains a number of Hub Transport servers. During the course of day you receive an instruction form management to recommend a messaging hygiene solution. Your recommendation should ensure that servers known to send spam is blocked andthat the administrative efforts are reduced. What should you do?()A、You should recommend to management recipient filtering.B、You should recommend to management an IP Block list.C、You should recommend to management IP Block list providers.D、You should recommend to management sender filtering.

You work as the exchange administrator at company.com.the company.com network contains an exchange server 2010 organization.company.com has its headquarters in london where you are located.during the course of the day you receive notification from management to view the number of mailboxes on the servers that exceeds 1 gb in size.what should you do?()A、you should consider having the properties of the mailbox database viewed using the exchange management console (emc).B、you should consider running the get-mailbox cmdlet using the exchange management shell.C、you should consider running the get-mail box statistics cmdlet using the exchange management shell.D、you should consider having a send- and a recipient filter created using the exchange management console (emc).

You have an Exchange Server 2010 organization.  You plan to delegate administration of the organization.  You have a group named Technicians that contains all the level-two technicians in the organization. You need to ensure that the Technicians group can manage the properties of all the mailbox databases. The solution must minimize the number of permissions assigned to the Technicians group.  Which management role should you assign to the Technicians group?()A、Help DeskB、Organization ManagementC、Recipient ManagementD、Server Management

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules.  What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously

You have an Exchange Server 2010 organization.You need to view the replication status of a mailbox database copy.What should you do?()A、From the Exchange Management Shell, run the Test-ServiceHealth cmdlet.B、From the Exchange Management Shell, run the Get-DatabaseAvailabilityGroup cmdlet.C、From the Exchange Management Console (EMC), view the properties of the database copy.D、From the Exchange Management Console (EMC), view the properties of the Mailbox server.

You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()A、Add the Task_Admin role to thedb_accessadmin fixed database role.B、Grant Update permissions on the Tasks table to the Task_Admin role.C、Grant Update permissions on the Tasks table to the User 1 role foreach column except the Close Dateand Estimated Time columns.D、Createan INSTEAD OF trigger on the Tasks Table. Use theIs_Member function toprevent the User 1 role from updating the Close Date and Estimated Time columns.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked.  Which tool should you use? () A、You should use the Database Engine Tuning Advisor tool B、You should use the Windows System Monitor tool C、You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio D、You should use the Activity Monitor tool in Microsoft SQL Server Management Studio

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you arelocated. The TestKing.com network contains a Hub Transport server that has anti-spam agents installed. Youreceive instruction from management to assign the administration of the Exchange 201 organization to agroup named KingSecruity. To ensure productivity you need to make sure that users belonging to thisgroup are able to manage anti-spam setting in the organization. You should thus ensure that your solutionreduces the number of permissions that are assigned to KingSecurity. What should you do?()A、You should consider assigning the Organization Management role group.B、You should consider assigning the Server Management role group.C、You should consider assigning the Hygiene Management role group.D、You should consider assigning the Records Management role group.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.The TestKing.com network contains a database availability group (DAG). You receive an instruction fromthe management to devise a Mailbox database security solution for the organization. Management wantsthe read/write performance to be maximized as well as ensuring that any access to the database isprohibited in the event of theft. What should you do?()A、You should recommend that management make use of DAG network encryption.B、You should recommend that management make use of Encrypted File System (EFS)C、You should recommend that management make use of Windows BitLocker Drive Encryption.D、You should recommend that management make use of Rights Management Service RMS.

单选题You work as a database administrator for Supportcenter.cn. You have been asked to use a centralized administrative tool to administer your database servers and application servers. In order to achieve the objective, which component would you configure on each database server?()ADatabase ControlBManagement ServerCManagement RepositoryDApplication Server ControlEOracle Management Agent

单选题You are configuring a Windows Server?2008?R2 Hyper-V failover cluster. You configure five iSCSI logical unit numbers (LUNs) on shared storage, and you present them to the first server. Each LUN appears twice in the Disk Management console.  You need to ensure that each LUN appears only once in the Disk Management console. What should you do?()AReset the iSCSI initiator name to the default name.BInstall and configure Microsoft Multipath I/O (MPIO).CIn the Disk Management console, rescan the disks.DIn the Disk Management console, configure shadow copies.

单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()AControl Panel  Data Sources (ODBC).BControl Panel  System Tools  Shared Folders.CComputer Management  System Tools  System Information.DComputer Management  System Tools  Shared Folders  Open Files.EComputer Management  System Tools  Shared Folders  Sessions.FComputer Management  System Tools  Shared Folders  Shares.

多选题You have been asked to develop an application that uses only connection-oriented protocols. Which two protocols can you use?()APPPBUDPCTCPDICMP

单选题You have an Exchange Server 2010 organization.You need to modify the permissions of a public folder.Which tool should you use?()AExchange Control Panel (ECP)BExchange Management Console (EMC)CMicrosoft Office OutlookDPublic Folder Management Console

多选题Which files will you need to perform a full recovery of a database backed up in NOARCHIVELOG mode?()ADatabase datafilesBControl filesCArchived redo logsDOnline redo logsEFlashback logs

多选题You are adatabase solutions architect.Your company plans to develop asolution by using a SQLServer 2008 instance. The solutionhas the following business requirements: Import datafromvarious datasources suchas MicrosoftOffice Excel, Microsoft SQL Server2000, Microsoft SQL Server 2005, and CSV files. Profile the source data before it is imported. Provide collaboration andoffline capabilities to mobile users. Allowmobile users to use heterogeneous data stores. You need to configure the appropriate SQL Server components to accomplish the business requirements. You want to achieve this goal by using the minimum amount of administrative effort. Which two SQL Server components should you use?()AAnalysis ServicesBReporting ServicesCIntegration ServicesDNotification ServicesEMicrosoft Sync Framework