试题详情
- 多项选择题 You are adatabase developer. You develop atask management application that connect stoa SQLServer 2008 database named TaskDB.Users logon to the application by using a SQLServer login. The application contains amodule named Task that assigns tasks tousers. Information about the setasks is stored in the Tasks table of the TaskDB data base. The Tasks table contains multiple columns. These include the Close Dateand Estimated Timecolumns. The application must meet the following security requirements: Users assigned toad atabase role named User 1 canupd ate all task information columns except the Close Date and the Estimated Time columns in the Tasks table. Administrative users assigned toad atabase role named Task_Admin canupd ateall task information in the Tasks table.You needto design a strategy to meet the security requirements. Which two actions should you perform?()
A、Add the Task_Admin role to thedb_accessadmin fixed database role.
B、Grant Update permissions on the Tasks table to the Task_Admin role.
C、Grant Update permissions on the Tasks table to the User 1 role foreach column except the Close Dateand Estimated Time columns.
D、Createan INSTEAD OF trigger on the Tasks Table. Use theIs_Member function toprevent the User 1 role from updating the Close Date and Estimated Time columns.
- B,C
关注下方微信公众号,在线模考后查看
热门试题
- You work
- 你正在创建一个可以供 Web 应用使用的
- You administer&
- Youareusingtracingto
- Youusetwouseraccount
- You are th
- You are developing
- Your network contai
- 最近,您已完成创建的应用程序使用应用程
- Your network&e
- You are e
- You have
- You have
- 您的计算机启用了 Micro
- You create a Web For
- Your network&e
- Certkiller.COM有一个Act
- You are the network
- Your network&e
- You have