试题详情
多项选择题 You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()

A、Add the Task_Admin role to thedb_accessadmin fixed database role.

B、Grant Update permissions on the Tasks table to the Task_Admin role.

C、Grant Update  permissions on  the  Tasks table to  the  User  1  role foreach  column  except the  Close  Dateand Estimated  Time columns.

D、Createan  INSTEAD OF trigger  on  the  Tasks Table. Use theIs_Member function  toprevent the  User  1  role from updating the Close  Date and Estimated  Time columns.

  • B,C
  • 关注下方微信公众号,在线模考后查看

热门试题