多项选择题X 纠错
A.All SQL Server instances should be installed on a failover cluster.
B.One list of all Windows logins and passwords should be sustained.
C.All backup media offsite should be stored.
D.SQL login accounts and credentials should be scripted.
E.The administrative processes and application access requirements should be documented.
你可能喜欢
单项选择题
A.Failover clustering should be included.
B.Asynchronous database mirroring without a witness server should be included.
C.Peer-to-Peer replication should be included.
D.Log shipping to servers at two of the sites to offer read-only replications of data should be included.
单项选择题
A.To finish the task, Transparent data encryption should be utilized.
B.To finish the task, the NTFS file system security should be utilized and the access of the database files should be limited to the SQL Server 2008 Service account.
C.To finish the task, the Trustworthy option for the database should be utilized.
D.To finish the task, the Advanced Encryption Standard encryption should be utilized on all columns in the database.
单项选择题
A.The SAFE code access security should be utilized for the assembly.
B.All public static fields should be replaced with public fields.
C.All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
D.All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.
单项选择题
A.The clustered index of the Orders table should be dropped.
B.The clustered index of the Orders table offline should be rebuilt once a month.
C.The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.
D.The clustered index of the Orders table should be reorganized by reducing the fill factor.
单项选择题
A.Asymmetric key encryption should be utilized.
B.Certificate-based encryption should be utilized.
C.Symmetric key encryption should be utilized.
D.Transparent data encryption should be utilized.
单项选择题
A.To finish the task, hourly database snapshots should be utilized.
B.To finish the task, the full-recovery model along with transaction log backups should be utilized.
C.To finish the task, the full-recovery model along with differential backups should be utilized.
D.To finish the task, the simple-recovery model along with differential backups should be utilized.
单项选择题
A.To finish the task, the Distributed File System Replication service should be utilized.
B.To finish the task, a configuration server should be utilized.
C.To finish the task, the policies should be distributed by utilizing Group Policy Objects.
D.To finish the task, the policies should be distributed by utilizing the Active Directory directory service.
单项选择题
A.To finish the task, you should utilize Resource Governor.
B.To finish the task, you should utilize Database Engine Tuning Advisor.
C.To finish the task, you should utilize Extended Events.
D.To finish the task, you should utilize Performance Monitor (SYSMON).
单项选择题
A.To finish the task, database and log files should be placed on the same volume.
B.To finish the task, the affinity mask option should be configured properly.
C.To finish the task, multiple data files should be create for the database.
D.To finish the task, the affinity I/O mask option should be configured properly.
单项选择题
A.To finish the task, the client-side profiler trace should be utilized.
B.To finish the task, the dynamic management views should be utilized.
C.To finish the task, the data collector should be utilized.
D.To finish the task, the System Monitor counter log trace should be utilized.