相关考题

多项选择题 Youareadatabaseadministratorforyourcompany.Thecompanyrunsapopulardatabase-drivenWebsiteagainstaSQLServer2005computernamedSQL2.YouneedtoensureaquickresponsetimeandappropriateaudittrailintheeventthatSQL2experiencesexcessivetrafficduetodenial-of-service(DoS)attacks.Whichtwoactionsshouldyouperform?()

单项选择题 You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()

单项选择题 You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name\password for first account: pentest\P@ssw0rdUser name\password for second account: hacktest\password You need to provide the information security team with the requested access to SQL1.  Which Transact-SQL script should you use?()