发信人: reynolds(雷龙.DBA中)
整理人: reynolds(2002-02-19 17:07:28), 站内信件
|
26. You are the Administrator of a SQL Server 2000 computer. The server is configured for Windows authentication. You add an integrated logon for the domain users group. However, 20 of the users in the domain users group should not have access to the server. You need to prevent the unauthorized users from accessing the server. You need to accomplish this goal by making the least number of changes to the server. What should you do?
A. Add a SQL server login for the unauthorized users, and then deny access to the login.
B. Add the unauthorized users to a domain user group, add a login for the group and then deny access to the login.
C. Add a login for each authorized user, and then deny access to each login.
D. Remove each unauthorized user from the domain users group.
Answer: B
Reason: 基本维护技能,合理使用组来进行管理。
27. You are the administrator of a SQL Server 2000 computer. Your company has 150 client computers that are running UNIX. This client computer requires access to the server to use a database named Techinfo. The server is configured with the TCP/IP and Named Pipes libraries. You need to configure the server to allow the client computers to use the Techinfo database. You also want to minimize the amount of time it takes to configure the server and allow for the tracking of individual user actions. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
A. Configure Windows authentication.
B. Configure mixed mode authentication.
C. Create a SQL Server login for each user.
D. Create a domain user group login for all of the users.
E. Create a single SQL server login for all of the users.
F. Enable the multiprotocol Net-Library.
G. Disable the Named Pipes Net-library.
Answer: B C
Reason: 异构平台认证方式只可使用混合模式。
28. You are the administrator of a SQL Server 2000 computer. The server is used to store confidential company information. Company policy requires that every action and change of permission on the server be logged. Policy also requires that the server can run only when logging in enabled. You need to configure the server to comply with this policy. What should you do?
A. Use SQL Profiler to capture security events and audit events. Make sure that a rollover is enabled.
B. On the Security tab of the Server Properties dialog box, set the Audit Level option to All.
C. Configure the server to use Windows authentication. Make sure that Windows security log does not overwrite events.
D. Set the c2 Audit mode option to 1. Restart the MSSQLServer service.
Answer: D
Reason: 注意区别B和D。关于B请参考《联机帮助手册》使用SQL SERVER工具-用户界面参考-SQL SERVER企业管理器-SQL SERVER属性(安全选项卡)。这个是记录登录日志的选项,和题目要求有差距。
关于D清参考《联机帮助手册》管理SQL SERVER-管理服务器-设置配置选项-C2 AUDIT MODE选项。
29. You are the administrator of a SQL Server 2000 computer. The server is used to store information for your company's finance department. The permissions on the financeinfo database are configured as shown below:
User/Role Create Table Create View CreateSP
Accountants Deny Blank Allow
Administrators Allow Blank Blank
Public Blank Blank Blank
AppRole1 Blank Blank Blank
Managers Allow Allow Allow
Brian Blank Deny Blank
You need to configure the database to allow Brian to add a new view. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)
A. Add Brian to the Managers database role.
B. Add Brian to the Administrators database role.
C. Revoke CREATE TABLE permissions for Brian.
D. Revoke CREATE PROCEDURE permissions for Brian.
E. Revoke CREATE VIEW permissions for Brian.
Answer: A E
Reason: 权限分配是够用就好,过分大的权限是安全的隐患,正如数据统计的那样,真正的安全隐患大多数来自于局域网内部。
30. You are the administrator of a SQL Server 2000 computer. One of the databases on the server contains a table named complaints. This table is used to store information about customer complaints. The customer service representatives in your company add and edit the information in the Complaints table. They work with this table by using a number of client applications, including a Web-based application and a Microsoft Windows 32-bit application.
The customer service manager discovers that some customer complaints are marked as closed before they are resolved to the customer’s satisfaction. You need to notify the customer service manager whenever a compliant is marked as closed. You do not want to make any changes to the client applications. What should you do?
A. Create an UPDATE trigger that sends an e-mail message.
B. Create a stored procedure that sends an e-mail message. Use the stored procedures to make changes to the data.
C. Create a user-defined function that sends an e-mail message. Use the function to make changes to the data.
D. Create a rule that validates data entry. Bind the rule to the CompliantClosed column.
Answer: A
Reason: 关联动作的最好选择——触发器。
---- /
<>< o /| /
<>< (o / |/|
) ) <@ <
( O )( \ |\| <><
) <>< () \| \
\
每天在网易游水的鱼 |
|