單項選擇題

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. A database is utilized by the instance, and the database is utilized by a Web-based application. 15,000 transactions are processed by the application every minute. A column is contained by a table in the database, and the column is utilized only by the application. Sensitive data is stored in this column. The sensitive data should be stored with the highest security level. In addition, the least amount of memory space and processor time should be utilized.
From the following four encryption types, which one should you utilize?()

A.Asymmetric key encryption should be utilized.
B.Certificate-based encryption should be utilized.
C.Symmetric key encryption should be utilized.
D.Transparent data encryption should be utilized.

題目列表

你可能感興趣的試題

單項選擇題

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 database solution is managed by you. All data changes are implemented through stored procedures, and only the INSERT, UPDATE, or DELETE statements are utilized by the procedures. A backup strategy should be implemented. The business requirements listed below should be satisfied. Point-in-time recovery for failure is supported by the backup strategy at any time of day. In addition, the least amount of disk space should be utilized by the transaction log. 
Which action should you perform to finish the task?()

A.To finish the task, hourly database snapshots should be utilized. 
B.To finish the task, the full-recovery model along with transaction log backups should be utilized.
C.To finish the task, the full-recovery model along with differential backups should be utilized.
D.To finish the task, the simple-recovery model along with differential backups should be utilized. 

單項選擇題

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. There are 30 branch offices in DoubleSecurity Insurance, and in the branch offices, customer data are stored in SQL Server 2008 databases. Customer data should be security compliant if it is stored through multiple database instances. You intend to utilize the Policy-Based Management feature to design a strategy for custom policies. And the format of custom policies is XML format. The requirements listed below should be satisfied. The company distributes custom policies to all instances. In addition, the company enforces the policies on all instances. A strategy should be thought out and the minimum amount of administrative effort should be utilized.   
Which action should you perform to finish the task?()

A.To finish the task, the Distributed File System Replication service should be utilized.
B.To finish the task, a configuration server should be utilized. 
C.To finish the task, the policies should be distributed by utilizing Group Policy Objects. 
D.To finish the task, the policies should be distributed by utilizing the Active Directory directory service.

微信掃碼免費搜題