You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements.
Which two actions should you perform?()
A.Add the Task_Admin role to thedb_accessadmin fixed database role.
B.Grant Update permissions on the Tasks table to the Task_Admin role.
C.Grant Update permissions on the Tasks table to the User 1 role foreach column except the Close Dateand Estimated Time columns.
D.Createan INSTEAD OF trigger on the Tasks Table. Use theIs_Member function toprevent the User 1 role from updating the Close Date and Estimated Time columns.