You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure thatyou minimize the usage of memory space and processor time. Which encryption type should you use?()
A: Symmetric key encryption
B: Asymmetric key encryption
C: Certificate-based encryption
D: Transparent data encryption
A: Symmetric key encryption
B: Asymmetric key encryption
C: Certificate-based encryption
D: Transparent data encryption
举一反三
- You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?() A: affinity mask B: affinity I/O mask C: max degree of parallelism D: optimize for ad hoc workload
- You administer a SQL Server 2008 instance. The instance is located on a four-processor, quad-core server. The server frequently experiences CPU pressure. The instance contains a very large mission-critical database that is used continuously. You need to ensure that online index rebuilds do not consume all available CPU cycles. Which configuration option should you use?() A: affinity mask B: affinity I/O mask C: max degree of parallelism D: optimize for ad hoc workloads
- Symmetric key encryption is also known as: A: public key encryption. B: secret key encryption. C: PGP. D: PKI.
- A ( ) is a collection of related, logically coherent, data used by the application programs in an organization.() A: database B: data C: program D: application
- You need to include a disclaimer to all sent messages in your organization. Some of the users require message encryption.How do you make sure that disclaimer can be included in encrypted messages?() A: Instruct the users to use IRM encryption method only B: Instruct the users to use S/MIME encryption method only C: Using command New-ExchangeCertificate cmdlet D: Using the Set-ExchangeServer cmdlet