单项选择题
A.Symmetric key encryption
B.Asymmetric key encryption
C.Certificate-based encryption
D.Transparent data encryption
单项选择题 You administer a SQL Server 2008 instance. You plan to design the security requirements for a new database application that will be deployed to the instance. The new database contains a table that is created by using the following code segment: You need to ensure that the BonusPlan column is protected from unauthorized access by using the most secure method. What should you do?()
单项选择题 You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()
多项选择题 You administer a SQL Server 2008 instance. You deploy a new database named Engineering. The Engineering database manages large documents that will be revised occasionally. You need to design a table structure that allows fast read access. You also need to minimize storage space requirements. Which two actions should you perform?()