单项选择题X 纠错
A.Asymmetric key encryption should be utilized.
B.Certificate-based encryption should be utilized.
C.Symmetric key encryption should be utilized.
D.Transparent data encryption should be utilized.
你可能喜欢
单项选择题
A.To finish the task, hourly database snapshots should be utilized.
B.To finish the task, the full-recovery model along with transaction log backups should be utilized.
C.To finish the task, the full-recovery model along with differential backups should be utilized.
D.To finish the task, the simple-recovery model along with differential backups should be utilized.
单项选择题
A.To finish the task, the Distributed File System Replication service should be utilized.
B.To finish the task, a configuration server should be utilized.
C.To finish the task, the policies should be distributed by utilizing Group Policy Objects.
D.To finish the task, the policies should be distributed by utilizing the Active Directory directory service.
单项选择题
A.To finish the task, you should utilize Resource Governor.
B.To finish the task, you should utilize Database Engine Tuning Advisor.
C.To finish the task, you should utilize Extended Events.
D.To finish the task, you should utilize Performance Monitor (SYSMON).
单项选择题
A.To finish the task, database and log files should be placed on the same volume.
B.To finish the task, the affinity mask option should be configured properly.
C.To finish the task, multiple data files should be create for the database.
D.To finish the task, the affinity I/O mask option should be configured properly.
单项选择题
A.To finish the task, the client-side profiler trace should be utilized.
B.To finish the task, the dynamic management views should be utilized.
C.To finish the task, the data collector should be utilized.
D.To finish the task, the System Monitor counter log trace should be utilized.
单项选择题
A.To finish the task, Data Collector should be utilized.
B.To finish the task, the SQLdiag.exe utility should be utilized.
C.To finish the task, SQL Server Profiler and the tracerpt.exe utility should be utilized.
D.To finish the task, SQL Server Profiler and System Monitor should be utilized.
单项选择题
A.ROW compression should be utilized for the EmployeeData table.
B.The Profile column should be stored by utilizing filestream storage, and the NTFS file system Compression should be utilized.
C.PAGE LEVEL compression should be utilized for the EmployeeData table.
D.The Profile column should be implemented as a CLR user-defined type.
单项选择题
A.Replace read write non-static fields in the code with static fields.
B.Replace read-only static fields in the code with read write static fields.
C.Use the peverify.exe PEVerify tool to verify whether the code meets the type-safety requirements.
D.Use the regasm.exe assembly registration tool to register the assembly on the server before deployment.
单项选择题
A.Symmetric key encryption
B.Asymmetric key encryption
C.Certificate-based encryption
D.Transparent data encryption
单项选择题
A.Use Transparent data encryption.
B.Use the Trustworthy option for the database.
C.Use the Advanced Encryption Standard encryption on all columns in the database.
D.Use the NTFS file system security and limit the access of the database files to the SQL Server 2008 Service account.