找考题网-背景图
多项选择题

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A corporate backup and recovery strategy that has to be validated is designed. You are required to make sure that any single database can be restored successfully from a severe failure, and during the restoration, a backup data center should not be required in a different location.
Which three actions should be contained by your solution?()

A.All SQL Server instances should be installed on a failover cluster.
B.One list of all Windows logins and passwords should be sustained.
C.All backup media offsite should be stored. 
D.SQL login accounts and credentials should be scripted. 
E.The administrative processes and application access requirements should be documented. 

热门试题

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international  corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application, and the application will be deployed to the instance. A table is consisted by the new database, and the table is created by utilizing the following code segment:  Since you are the technical support, you should utilize the maximum secure method to protect the BonusPlan column from the access of unauthorized users.   Which action will you perform to finish the task?()

A.To finish the task, Transparent data encryption should be utilized. 
B.To finish the task, the NTFS file system security should be utilized and the access of the database files should be limited to the SQL Server 2008 Service account. 
C.To finish the task, the Trustworthy option for the database should be utilized. 
D.To finish the task, the Advanced Encryption Standard encryption should be utilized on all columns in the database.

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.    Which action will you perform?()

A.The SAFE code access security should be utilized for the assembly.
B.All public static fields should be replaced with public fields.
C.All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
D.All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.

单项选择题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A maintenance strategy should be designed for a mission-critical database, and a large table named Orders is contained by the database. Index maintenance operations are contained in the design plan. When you design the strategy, the facts listed below should be taken into consideration. First, the users continuously access to the Orders table in the database. Secondly, a column of the xml data type is contained by Orders table.  Thirdly, the new rows are regularly added to the Orders table. Fourthly, the average fragmentation for the clustered index of the Orders table is no more than 2 percent.    A strategy should be designed to have the performance of the queries on the table optimized.    Which action will you perform?()

A.The clustered index of the Orders table should be dropped.
B.The clustered index of the Orders table offline should be rebuilt once a month.
C.The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.
D.The clustered index of the Orders table should be reorganized by reducing the fill factor.