多选题You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()ACreate a database role named BankTerminals.BGrant the BankTerminals role the Execute permission for the WoodgroveBanking database.CGrant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.DGrant the BankTerminals role the Execute permission for the Bank schema.EGrant the Windows Bank Terminals group the Execute permission for the Bank schema.FGrant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

多选题
You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()
A

Create a database role named BankTerminals.

B

Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.

C

Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.

D

Grant the BankTerminals role the Execute permission for the Bank schema.

E

Grant the Windows Bank Terminals group the Execute permission for the Bank schema.

F

Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.


参考解析

解析: 暂无解析

相关考题:

You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports. You name the share WebReports and allow Read permissions on the share.You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, 'You are not authorized to view this page.'You need to be able to access the folder. What must you do?A.Allow write permission on WebReports.B.Allow directory browsing permissions on WebReports.C.In the IIS console, enable anonymous access to WebReports.D.In the IIS console, set the execute permissions option to script. and executables on WebReports.

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

Redo log files are multiplexed in your database. The disk in which you have one of the redo log members is highly fragmented. In the process of defragmentation you lose the redo log member, which is not a member of the current group. How would you recover from the loss of the redo log member?()A、SMON would automatically restore the lost file.B、You would need to restore the whole database from the last backup.C、You would need to restore the file from the last full database backup.D、You would need to use flashback technology to restore the lost redo log member.E、You would need to use Recovery Manager (RMAN) to restore the lost redo log member.F、You would need to restore the missing log file by copying one of the remaining files from the same group.

You need to design the retrieval of advertising statistics without compromising security. What should you do?()A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D、Design a stored procedure to return the statistics on a call from the advertisers application.E、Design a user-defined function to return the statistics on a call from the advertisers application.

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()A、Client Access server array and hardware load-balancerB、database availability group (DAG) and hardware load-balancerC、failover clustering and database availability group (DAG)D、Windows Network Load Balancing and failover clustering

You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()A、Access the personalization data from the Session property of the HttpContext object.B、Access the personalization data from the Application property of the HttpContext object.C、Access the personalization data from the Cache property of the HttpContext object.D、Access the personalization data from the Profile property of the HttpContext object.

You need to design an administrative model that meets the business and technical requirements. What should you do?()A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins groupB、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins groupC、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins groupD、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group

You install the Windows SharePoint Services (WSS) role on a server that runs Windows Server 2008. You create a group named SPReviewers that will access content on the WSS server.  You need to restrict the permissions for the SPReviewers group to viewing items, opening items, and viewing versions.  Which permissions should you configure for the SPReviewers group?()A、ReadB、DesignC、ContributeD、Limited Access

You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A、Start from Web.B、Install from Web.C、Start from network shareD、Install from network share.

You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()A、Allow file and printer sharing through Windows Firewall.B、Change the network location from a Public network to a Home or Work network.C、From the Security settings of the folder, assign the user the Read NTFS permission.D、From the Advanced Sharing settings of the folder, assign the user the Read share permission.

You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()A、Create a database role named BankTerminals.B、Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.C、Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.D、Grant the BankTerminals role the Execute permission for the Bank schema.E、Grant the Windows Bank Terminals group the Execute permission for the Bank schema.F、Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

单选题You are changing the security settings of a file named MyData.xml.You need to preserve the existing inherited access rules.You also need to prevent the access rules from inheriting changes in the future.   Which code segment should you use?()A AB BC CD D

单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication

单选题You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B Grant the Server Access Team group permissions to modify computer objects in the Application OU.C Move the Server Access Team group object into the Application OU.D Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

单选题You need to create a web share on your Windows 2000 Professional computer named Admin01. Youcreate a folder named reports. Then you configure web sharing on Reports.  You name the shareWebReports and allow Read permissions on the share.You test the web share by pointing to http://admin01/WebReports from another computer. You receivethe following error message, ‘You are not authorized to view this page.’You need to be able to access the folder.  What must you do? ()AAllow write permission on WebReports.BAllow directory browsing permissions on WebReports.CIn the IIS console, enable anonymous access to WebReports.DIn the IIS console, set the execute permissions option to script and executables on      WebReports.

单选题Your network consists of a single Active Directory domain. The domain contains three organizational units (OUs) named Test, Application, and Database.   You need to redesign the layout of the OUs to support the following requirements:   èPrevent Group Policy objects(GPOs) that are linked to the domain from applying to computerslocated in the Applications OU   èMinimize the number of GPOs èMinimize the number of OUs What should you include in your design?()ACreate a Starter GPO.BCreate a Windows Management Instrumentation (WMI) filter.CDelegate permissions on the Application OU.DConfigure block inheritance on the Application OU.

单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()AOn Folder1, modify the share permissions.BOn Folder1, modify the NTFS permissions.CAdd all local user accounts to the Guests group. DAdd all local user accounts to the Network Configuration Operators group.

单选题You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()ARemote Desktop GatewayBRemote Desktop Connection BrokerCWindows Deployment ServicesDWindows Virtual PC and Windows XP Mode

单选题You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails.Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()AClient Access server array and hardware load-balancerBdatabase availability group (DAG) and hardware load-balancerCfailover clustering and database availability group (DAG)DWindows Network Load Balancing and failover clustering

多选题You administer a SQL Server 2008 instance. You deploy a new database named Engineering. The Engineering database manages large documents that will be revised occasionally. You need to design a table structure that allows fast read access. You also need to minimize storage space requirements.  Which two actions should you perform?()AUse NTFS file system compression on the volume.BUse row-level compression on the document table.CUse varbinary(MAX) data type with FILESTREAM storage.DEnable row-level compression on all columns that use the vardecimal() data type.

单选题You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5.  You use Windows Authentication for the application. You set up NTFS file system permissions for the Sales group to access a particular file. You discover that all the users are able to access the file.  You need to ensure that only the Sales group users can access the file. What additional step should you perform?()ARemove the rights from the ASP.NET user to the file. BRemove the rights from the application pool identity to the file. CAdd the identity impersonate=true/ section to the Web.config file. DAdd the authentication mode=[None] section to the Web.config file.

多选题You are planning the migration of a Microsoft SQL Server 2008 database to SQL Azure.   You need to recommend an approach for ensuring that database connectivity does not degrade.   Which two actions should you recommend?()AImplement transactions for database queries.BClose database connections in the application.CUse Microsoft ADO.NET in the data access layer.DImplement a retry policy in the data access layer.

单选题You need to design the consolidation strategy for the Promotions and Partners databases. You want to choose a strategy that results in the best database performance while maintaining the permissions of end users in each database.What consolidation strategy should you choose?()APlace each database in a separate instance running on SQL2.BPlace each database in a separate instance running on SQL3.CPlace both databases in a single instance running on SQL2.DPlace both databases in a single instance running on SQL3.

单选题You are the administrator of a Microsoft Windows Server 2003 computer named Server1. SQL Server 2005 is installed on Server1 to host a database named MedDB. The MedDB database serves as the backend database for a new client/server application named MedDATA. Installation of the MedDATA application creates the database schema, application roles, and administrative accounts. It also sets all of the default permissions. You need to establish a permissions baseline for all objects in the MedDB database.  What should you do?()AUse the SQL Server 2005 Management Studio to review the permissions of the default database objects.BQuery the sys.server_permissions table on Server1.CExecute the sp_helplogins system stored procedure for each of the default users that the MedDATA application creates.DQuery the sys.database_permissions and sys.database_principals tables in the MedDB database.