You need to design the database permissions for access from 

题目
多选题
You need to design the database permissions for access from the terminals to the database server. Which action or actions should you perform?()
A

Create a database role named BankTerminals.

B

Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.

C

Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.

D

Grant the BankTerminals role the Execute permission for the Bank schema.

E

Grant the Windows Bank Terminals group the Execute permission for the Bank schema.

F

Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.

You want to minimize changes to your security model and to your database applications. How should you modify the database?

A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.

B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.

C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.

D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.


正确答案:A
解析:Explanation:SQLServer2000allowsfilegroupsotherthantheprimaryfilegrouptobemarkedasreadonly.Afilegroupthatismarkedread-onlycannotbemodified.Tablesthatmustnotbemodifiedcanbeplacedonafilegroupthatcanthenbemarkasread-only.Thiswillpreventsaccidentalupdates.IncorrectAnswers:B:Thissolutioneffectivelypermitsalluserstomodifyanytableinthedatabase,astheywouldallhaveSELECTpermissionstothedatabase.C:ThissolutionwilleffectivelypreventallusersfrombeingabletoperformingthesetasksonalltablesinthedatabaseastheyaredeniedpermissionstorunINSERT,UPDATE,orDELETEstatementsagainstthedatabase.Abettersolutionwouldbetoapplythedenypermissionsatthetablelevelofthelookuptables.Thiswould,however,requireunnecessaryadministrativetime.D:Viewsarevirtualtablesthatareusedtofiltertablesorrowsthattheusersshouldnothaveaccessto,however,iftheusershaveaccesstothebasetables,theycanstillrunINSERT,UPDATE,andDELETEstatementsagainstthebasetable.

第2题:

You need to design the retrieval of advertising statistics without compromising security. What should you do?()

  • A、Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.
  • B、Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.
  • C、Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.
  • D、Design a stored procedure to return the statistics on a call from the advertisers application.
  • E、Design a user-defined function to return the statistics on a call from the advertisers application.

正确答案:B

第3题:

You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports. You name the share WebReports and allow Read permissions on the share.

You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, 'You are not authorized to view this page.'

You need to be able to access the folder. What must you do?

A.Allow write permission on WebReports.

B.Allow directory browsing permissions on WebReports.

C.In the IIS console, enable anonymous access to WebReports.

D.In the IIS console, set the execute permissions option to script. and executables on WebReports.


正确答案:C
解析:Explanation: The proper NTFS permissions, read permission, have already been granted. To access the folder through Internet Explorer the folder must be published in Internet Information Services (IIS), and authentication through IIS must be provided. By enabling anonymous access in the IIS console the folder would be accessible through Internet Explorer.

Incorrect answers:
A: Only read permission is required to view a page, not write permissions. And read permission is already granted.

B: Via directory browsing, web site visitors are able to view the contents of directories as a list of files. Directory browsing is not used to allow access to a web share.

D: The execute permission is only required to enable the user to run scripts and executables. It is not required to view the web share.

第4题:

You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()

  • A、Access the personalization data from the Session property of the HttpContext object.
  • B、Access the personalization data from the Application property of the HttpContext object.
  • C、Access the personalization data from the Cache property of the HttpContext object.
  • D、Access the personalization data from the Profile property of the HttpContext object.

正确答案:D

第5题:

You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()

  • A、Client Access server array and hardware load-balancer
  • B、database availability group (DAG) and hardware load-balancer
  • C、failover clustering and database availability group (DAG)
  • D、Windows Network Load Balancing and failover clustering

正确答案:A

第6题:

Redo log files are multiplexed in your database. The disk in which you have one of the redo log members is highly fragmented. In the process of defragmentation you lose the redo log member, which is not a member of the current group. How would you recover from the loss of the redo log member?()

  • A、SMON would automatically restore the lost file.
  • B、You would need to restore the whole database from the last backup.
  • C、You would need to restore the file from the last full database backup.
  • D、You would need to use flashback technology to restore the lost redo log member.
  • E、You would need to use Recovery Manager (RMAN) to restore the lost redo log member.
  • F、You would need to restore the missing log file by copying one of the remaining files from the same group.

正确答案:F

第7题:

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

  • A、REVOKE ACCESS ON DATABASE FROM USER bob
  • B、REVOKE CONNECT ON DATABASE FROM USER tom
  • C、REVOKE tom FROM ACCESS ON DATABASE BY USER bob
  • D、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

正确答案:B

第8题:

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

A.REVOKE ACCESS ON DATABASE FROM USER bob

B.REVOKE CONNECT ON DATABASE FROM USER tom

C.REVOKE tom FROM ACCESS ON DATABASE BY USER bob

D.REVOKE tom FROM CONNECT ON DATABASE BY USER bob


参考答案:B

第9题:

You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()

  • A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.
  • B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.
  • C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.
  • D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

正确答案:C

第10题:

You need to design an administrative model that meets the business and technical requirements. What should you do?()

  • A、Assign permissions to manage Mailbox and Exchange Server configuration to the server-admins group
  • B、Assign permissions to manage Mailbox and Exchange Server configuration to the domain-admins group
  • C、Assign permissions to manage Mailboxes to the server-admins group. Assign permissions to manage Exchange Servers configuration to the domain-admins group
  • D、Assign permissions to manage Mailboxes to the domain-admins group. Assign permissions to manage Exchange Servers configuration to the server-admins group

正确答案:D

更多相关问题