单项选择题X 纠错
A.To achieve the goal, the Import and Export Wizard should be utilized to save packages.
B.To achieve the goal, a direct package configuration should be created for each package.
C.To achieve the goal, a deployment utility should be created for the SSIS project.
D.To achieve the goal, an indirect package configuration should be created for all packages.
你可能喜欢
多项选择题
A.To finish the task, Log shipping should be utilized.
B.To finish the task, Failover clustering should be utilized.
C.To finish the task, Replication should be utilized.
D.To finish the task, Database snapshot should be utilized.
单项选择题
A.A single RAID 5 volume should be utilized.
B.A RAID 1 volume and a RAID 5 volume should be utilized.
C.A single RAID 10 volume should be utilized.
D.A RAID 0 volume and a RAID 5 volume should be utilized.
多项选择题
A.All SQL Server instances should be installed on a failover cluster.
B.One list of all Windows logins and passwords should be sustained.
C.All backup media offsite should be stored.
D.SQL login accounts and credentials should be scripted.
E.The administrative processes and application access requirements should be documented.
单项选择题
A.Failover clustering should be included.
B.Asynchronous database mirroring without a witness server should be included.
C.Peer-to-Peer replication should be included.
D.Log shipping to servers at two of the sites to offer read-only replications of data should be included.
单项选择题
A.To finish the task, Transparent data encryption should be utilized.
B.To finish the task, the NTFS file system security should be utilized and the access of the database files should be limited to the SQL Server 2008 Service account.
C.To finish the task, the Trustworthy option for the database should be utilized.
D.To finish the task, the Advanced Encryption Standard encryption should be utilized on all columns in the database.
单项选择题
A.The SAFE code access security should be utilized for the assembly.
B.All public static fields should be replaced with public fields.
C.All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
D.All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.
单项选择题
A.The clustered index of the Orders table should be dropped.
B.The clustered index of the Orders table offline should be rebuilt once a month.
C.The clustered index of the Orders table should be excluded from scheduled reorganizing or rebuilding operations.
D.The clustered index of the Orders table should be reorganized by reducing the fill factor.
单项选择题
A.Asymmetric key encryption should be utilized.
B.Certificate-based encryption should be utilized.
C.Symmetric key encryption should be utilized.
D.Transparent data encryption should be utilized.
单项选择题
A.To finish the task, hourly database snapshots should be utilized.
B.To finish the task, the full-recovery model along with transaction log backups should be utilized.
C.To finish the task, the full-recovery model along with differential backups should be utilized.
D.To finish the task, the simple-recovery model along with differential backups should be utilized.
单项选择题
A.To finish the task, the Distributed File System Replication service should be utilized.
B.To finish the task, a configuration server should be utilized.
C.To finish the task, the policies should be distributed by utilizing Group Policy Objects.
D.To finish the task, the policies should be distributed by utilizing the Active Directory directory service.