单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There are 30 branch offices in DoubleSecurity Insurance, and in the branch offices, customer data are stored in SQL Server 2008 databases. Customer data should be security compliant if it is stored through multiple database instances. You intend to utilize the Policy-Based Management feature to design a strategy for custom policies. And the format of custom policies is XML format. The requirements listed below should be satisfied. The company distributes custom policies to all instances. In addition, the company enforces the policies on all instances. A strategy should be thought out and the minimum amount of administrative effort should be utilized. Which action should you perform to finish the task?()ATo finish the task, the Distributed File System Replication service should be utilized.BTo finish the task, a configuration server should be utilized. CTo finish the task, the policies should be distributed by utilizing Group Policy Objects. DTo finish the task, the policies should be distributed by utilizing the Active Directory directory service.
单选题
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There are 30 branch offices in DoubleSecurity Insurance, and in the branch offices, customer data are stored in SQL Server 2008 databases. Customer data should be security compliant if it is stored through multiple database instances. You intend to utilize the Policy-Based Management feature to design a strategy for custom policies. And the format of custom policies is XML format. The requirements listed below should be satisfied. The company distributes custom policies to all instances. In addition, the company enforces the policies on all instances. A strategy should be thought out and the minimum amount of administrative effort should be utilized. Which action should you perform to finish the task?()
A
To finish the task, the Distributed File System Replication service should be utilized.
B
To finish the task, a configuration server should be utilized.
C
To finish the task, the policies should be distributed by utilizing Group Policy Objects.
D
To finish the task, the policies should be distributed by utilizing the Active Directory directory service.
参考解析
解析:
暂无解析
相关考题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A corporate backup and recovery strategy that has to be validated is designed. You are required to make sure that any single database can be restored successfully from a severe failure, and during the restoration, a backup data center should not be required in a different location. Which three actions should be contained by your solution?()A、All SQL Server instances should be installed on a failover cluster.B、One list of all Windows logins and passwords should be sustained.C、All backup media offsite should be stored. D、SQL login accounts and credentials should be scripted. E、The administrative processes and application access requirements should be documented.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a text file which is named SQL01.log on the E: drive. A SQL Server Agent job executes every 2 minutes and logs information to the text file. You get a report from users saying that the sever doesn't make response. As the technical support, you check and find that the SQL Server Agent service does not run and the SQL Server Agent job no longer functions. You have to identify the reason why the SQL Server Agent service is unresponsive. In the options below, which log should you check?() A、You should check SQL1.logB、You should check SQLAGENT.OUTC、You should check log_xx.trcD、You should check ERRORLOG
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A new database should be deployed, and the capacity requirements listed below should be satisfied. There should be 275 GB for the database data file, while there should be 50 GB for the transaction log file. There are six 100-GB disk drives which are accessible for the database in the storage array. The six disks are attached to a redundant array of independent disks (RAID) controller, and the controller supports RAID levels 0, 1, 5, and 10. Since you are the technical support, you are required to maximize the write performance of the transaction log. In addition, you should protect the database and transaction log files, when a drive fails. The storage system should be designed. From the following four storage configuration, which one should you utilize?()A、A single RAID 5 volume should be utilized. B、A RAID 1 volume and a RAID 5 volume should be utilized.C、A single RAID 10 volume should be utilized. D、A RAID 0 volume and a RAID 5 volume should be utilized.
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed by you. The computer on which the instance run has the following three features: a 64-GB RAM, four quad-core processors, and several independent physical raid volumes. A transactional database will be implemented on the instance. In addition, the database should have a high volume of INSERT, UPDATE, and DELETE activities. Creation of new tables is contained by the activities. You need to maximize disk bandwidth and decrease the contention in the storage allocation structures so as to have the performance of the database optimized. Which action will you perform to finish the task?()A、To finish the task, database and log files should be placed on the same volume.B、To finish the task, the affinity mask option should be configured properly.C、To finish the task, multiple data files should be create for the database. D、To finish the task, the affinity I/O mask option should be configured properly.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you. So what action should you perform to achieve this goal?() A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions.
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance of your company is managed by you. There is a team of database administrators in your company. SQL Server 2008 Integration Services (SSIS) packages are created on the test server in a shared project by a team of application developers. A fixed cache file is required by one of the packages. The company will deploy the packages to the production server on completion of development. The production server is available only to the database administrators. Since you are the technical support, you need to confirm that the project can be deployed successfully to the production server by the application developers. Which action will you perform to achieve the goal?()A、To achieve the goal, the Import and Export Wizard should be utilized to save packages.B、To achieve the goal, a direct package configuration should be created for each package.C、To achieve the goal, a deployment utility should be created for the SSIS project. D、To achieve the goal, an indirect package configuration should be created for all packages.
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column. The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized. From the following four encryption types, which one should you utilize?()A、Asymmetric key encryption should be utilized.B、Certificate-based encryption should be utilized.C、Symmetric key encryption should be utilized.D、Transparent data encryption should be utilized.
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance. Which action will you perform?()A、The SAFE code access security should be utilized for the assembly.B、All public static fields should be replaced with public fields.C、All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.D、All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task. Which tool will you utilize to finish the task?() A、To finish the task, you should utilize Resource Governor. B、To finish the task, you should utilize Database Engine Tuning Advisor.C、To finish the task, you should utilize Extended Events. D、To finish the task, you should utilize Performance Monitor (SYSMON).
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. You are log shipping the Adventureworks database to a remote SQL Server 2008 instance. The primary SQL Server instance required a restart during the weekend. But you notice that log shipping has stopped working after the weekend. You have to check log shipping of the Adventureworks database and find out the problem. What should you do? () A、You should use the EXTENDED_LOGICAL_CHECKS option to execute a DBCC CHECKDB statement on the AdventureWorks database by. B、You should identify whether the SQL Server Agent is started on the primary server. C、You should identify whether the AdventureWorks database uses the Simple recovery model. D、You should identify whether the SQL Server Volume Shadow Copy Service (VSS) Writer is started on the primary server
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security,troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A database is included by the instance, and a table named EmployeeData is contained by the database. There is a column named Profile in the EmployeeData table. Microsoft Office Word 2003 documents are stored in the column. The space utilized by the Profile column should be cut to the least. In addition, a reasonable performance should be maintained to retrieve the content of the column. Which action will you perform?()A、ROW compression should be utilized for the EmployeeData table.B、The Profile column should be stored by utilizing filestream storage, and the NTFS file system Compression should be utilized.C、PAGE LEVEL compression should be utilized for the EmployeeData table.D、The Profile column should be implemented as a CLR user-defined type.
ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? () A、You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B、You should upgrade the SQL Server 2005 application to use SQL Server 2008 C、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D、You should install SQL Server 2008 as a named instance, and make the new application use the new instance.
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log. Which action should you perform to finish the task?()A、To finish the task, hourly database snapshots should be utilized. B、To finish the task, the full-recovery model along with transaction log backups should be utilized.C、To finish the task, the full-recovery model along with differential backups should be utilized.D、To finish the task, the simple-recovery model along with differential backups should be utilized.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()A、ServiceGreatUser should be added to the appropriate fixed database roles. B、You should assign the appropriate object-level permissions to ServiceGreatUser C、You should assign the appropriate server-level permissions to ServiceGreatLogin D、You should assign the appropriate database-level permissions to ServiceGreatUser
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed. It is reported by the customers that the server performance degraded due to a newly implemented process. Dynamic Management Views is utilized to confirm that no long running queries exist. The operating system performance data should be correlated with the actual query execution trace, and the least administrative effort should be utilized. Which action will you perform to finish the task?()A、To finish the task, Data Collector should be utilized.B、To finish the task, the SQLdiag.exe utility should be utilized.C、To finish the task, SQL Server Profiler and the tracerpt.exe utility should be utilized.D、To finish the task, SQL Server Profiler and System Monitor should be utilized.
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?() A、You should configure the database for Read Committed Snapshot isolation. B、You should modify the stored procedure to use the Snapshot isolation level C、You should configure the database for Auto Update Statistics asynchronously D、You should modify the stored procedure to use the Repeatable Read isolation level
You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()A、You should install SQL Server 2008 as a named instance, and make the new application to use the new instance. B、You should install SQL Server 2008 as the default instance, and make the new application to use the default instance. C、You should upgrade the SQL Server 2005 application to use SQL Server 2008. D、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a SQL Server 7.0 database. You upgrade the database to the SQL Server instance. According to the company requirement, you must make sure that suspect pages can be detected in the database. So what action should you perform to achieve this goal?()AFor the database, you should turn on the TRUSTWORTHY database optionBFor the database, the PAGE_VERIFY database option should be set to CHECKSUMCFor the database, the database compatibility level option should be set to 10DFor the model database, the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log. Which action should you perform to finish the task?()ATo finish the task, hourly database snapshots should be utilized. BTo finish the task, the full-recovery model along with transaction log backups should be utilized.CTo finish the task, the full-recovery model along with differential backups should be utilized.DTo finish the task, the simple-recovery model along with differential backups should be utilized.
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance should be managed. It is reported by the customers that the server performance degraded due to a newly implemented process. Dynamic Management Views is utilized to confirm that no long running queries exist. The operating system performance data should be correlated with the actual query execution trace, and the least administrative effort should be utilized. Which action will you perform to finish the task?()ATo finish the task, Data Collector should be utilized.BTo finish the task, the SQLdiag.exe utility should be utilized.CTo finish the task, SQL Server Profiler and the tracerpt.exe utility should be utilized.DTo finish the task, SQL Server Profiler and System Monitor should be utilized.
多选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 servers on a single site are managed by you. Two SQL Server 2008 instances are contained by the site. One is an Enterprise Edition server, and it is on a server that has a redundant array of ndependent disks (RAID) 10 disk system. The other is a Standard Edition server, and it is on a server that has a RAID 5 disk system. A single application is hosted by each instance. A high-availability solution should be recommended for the site to satisfy the business requirements listed below. First, the solution can be implemented on the current systems. Secondly, the database is available with least downtime. Thirdly, Data loss should be cut to the least. Fourthly, the existing system should be with least impact. Which solutions should be utilized to finish the task?()ATo finish the task, Log shipping should be utilized.BTo finish the task, Failover clustering should be utilized.CTo finish the task, Replication should be utilized.DTo finish the task, Database snapshot should be utilized.
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 instances at five sites are managed by you.A mission-critical database is shared by the five sites. According to the business requirements, the users at each site should be enabled to access and change data on all sites with minimal latency.In addition, data loss should be minimized if a server fails. A high-availability solution should be designed, and the business requirements should be satisfied. Which action should be included in your solution?()AFailover clustering should be included. BAsynchronous database mirroring without a witness server should be included.CPeer-to-Peer replication should be included. DLog shipping to servers at two of the sites to offer read-only replications of data should be included.
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There is a database in the instance, and the day-to-day business of your company requires the database. When reports are executed, slow response time will be experienced by Users. A performance monitoring strategy will be implemented by you so as to have three aspects of data captured and stored: Blocking and deadlock information, Executed Transact-SQL statements Query activity and Counters for disk, CPU, and memory. You are required to utilize the least amount of administrative effort to implement the monitoring process. Which action will you perform to finish the task?()ATo finish the task, the client-side profiler trace should be utilized. BTo finish the task, the dynamic management views should be utilized.CTo finish the task, the data collector should be utilized. DTo finish the task, the System Monitor counter log trace should be utilized.
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task. Which tool will you utilize to finish the task?()ATo finish the task, you should utilize Resource Governor. BTo finish the task, you should utilize Database Engine Tuning Advisor.CTo finish the task, you should utilize Extended Events. DTo finish the task, you should utilize Performance Monitor (SYSMON).
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Service in the instance. There is a database user who is named ServiceGreatUser. A SQL Server login named ServiceGreatLogin maps to ServiceGreatUser in the Service database. According to the requirement of the company CIO, the database user can only perform the two tasks below: the database user executes all stored procedures that currently exist in the Sales database and executes all stored procedures that will be created in the Sales database. So what should you do to ensure this? ()AServiceGreatUser should be added to the appropriate fixed database roles. BYou should assign the appropriate object-level permissions to ServiceGreatUser CYou should assign the appropriate server-level permissions to ServiceGreatLogin DYou should assign the appropriate database-level permissions to ServiceGreatUser
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A maintenance strategy should be designed for a mission-critical database, and a large table named Orders is contained by the database. Index maintenance operations are contained in the design plan. When you design the strategy, the facts listed below should be taken into consideration. First, the users continuously access to the Orders table in the database. Secondly, a column of the xml data type is contained by Orders table. Thirdly, the new rows are regularly added to the Orders table. Fourthly, the average fragmentation for the clustered index of the Orders table is no more than 2 percent. A strategy should be designed to have the performance of the queries on the table optimized. Which action will you perform?()AThe clustered index of the Orders table should be dropped.BThe clustered index of the Orders table offline should be rebuilt once a month.CThe clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.DThe clustered index of the Orders table should be reorganized by reducing the fill factor.
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There are 30 branch offices in DoubleSecurity Insurance, and in the branch offices, customer data are stored in SQL Server 2008 databases. Customer data should be security compliant if it is stored through multiple database instances. You intend to utilize the Policy-Based Management feature to design a strategy for custom policies. And the format of custom policies is XML format. The requirements listed below should be satisfied. The company distributes custom policies to all instances. In addition, the company enforces the policies on all instances. A strategy should be thought out and the minimum amount of administrative effort should be utilized. Which action should you perform to finish the task?()ATo finish the task, the Distributed File System Replication service should be utilized.BTo finish the task, a configuration server should be utilized. CTo finish the task, the policies should be distributed by utilizing Group Policy Objects. DTo finish the task, the policies should be distributed by utilizing the Active Directory directory service.
多选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A corporate backup and recovery strategy that has to be validated is designed. You are required to make sure that any single database can be restored successfully from a severe failure, and during the restoration, a backup data center should not be required in a different location. Which three actions should be contained by your solution?()AAll SQL Server instances should be installed on a failover cluster.BOne list of all Windows logins and passwords should be sustained.CAll backup media offsite should be stored.DSQL login accounts and credentials should be scripted.EThe administrative processes and application access requirements should be documented.