1. Trang chủ
  2. » Công Nghệ Thông Tin

The Real MTCS SQL Server 2008 Exam 70/432 Prep Kit- P43 ppsx

5 80 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 5
Dung lượng 116,33 KB

Nội dung

192 Chapter 5 • Managing Data Encryption 14. Which of the following best describes the difference between symmetric and asymmetric keys? A. An asymmetric key uses the same password to encrypt and decrypt the data and a symmetric key uses a public key to encrypt the data and a private key to decrypt the data. B. An asymmetric key uses the same password to encrypt and decrypt the data and a symmetric key uses a private key to encrypt and a public key to decrypt the data. C. A symmetric key uses the same password to encrypt and decrypt the data and an asymmetric key uses a public key to encrypt and a different password/ private key to decrypt the data. D. A symmetric key uses the same password to encrypt and decrypt the data and an asymmetric key uses a private key to encrypt and a different password/ public key to decrypt the data. 15. Which of the following best describes EFS encryption? A. Encryption occurs at the file-level. B. Encryption occurs at the database-level. C. Encryption occurs at the cell-level. D. Encryption occurs at the server-level. 16. When you are using Encrypting File System (EFS) with SQL Server, which SQL server account must have access to file encryption keys encrypting any database files? A. SQL Server agent account B. Database server, service account C. SA account D. SQL executive account 17. In which of the following is EFS best used? A. Web server B. Database server C. Workstation D. Application server Managing Data Encryption • Chapter 5 193 18. Which of the following best describes SQL Server 2008 Extensible Key Management? A. Enables third-party EKM/HSM vendors to register their modules in SQL Server B. Enables easy management of Encrypting File System (EFS) encryption C. Enables easy creation of an EKM key with another EKM key D. Enables easy back up of a database encryption key 19. In which of the following editions of SQL Server 2008 is Extensible Key Management available? A. Workgroup edition B. Web edition C. Enterprise edition D. Express edition 20. Which system stored procedure is used to enable Extensible Key Management? A. Sys.dboption B. Sys.sp_configure C. Sys.sp_helpdb D. Sys.sp_addextendedproc 194 Chapter 5 • Managing Data Encryption Self Test Quick Answer Key 1. C 2. B 3. D 4. C 5. A 6. B 7. D 8. A 9. B 10. D 11. D 12. B 13. C 14. C 15. A 16. B 17. C 18. A 19. C 20. B 195 Exam objectives review: ˛ Summary of Exam Objectives ˛ Exam Objectives Fast Track ˛ Exam Objectives Frequently Asked Questions ˛ Self Test ˛ Self Test Quick Answer Key Exam objectives in this chapter: Defining High Availability  SQL High-Availability Options  Expandability  Managing High Availability Chapter 6 MCTS SQL Server 2008 Exam 432 196 Chapter6•ManagingHighAvailability Introduction This chapter focuses on how high availability ensures that your application is always available. High availability incorporates such technologies as clustering, log shipping, and replication. These will all be covered in detail, along with the pros and cons of each, in the following chapter. Clustering has improved in SQL 2008, and these improvements are discussed in this chapter. It’s important to have a good understanding of the differences between each technology, as each has its own advantages and disadvantages. Hot-add CPU support and hot-add memory support will also be explained in this chapter. We will also touch on fault tolerant disk subsystems, like RAID 5 and mirroring. It’s important to understand the performance implications of using different disk systems. Defining High Availability The basic definition of high availability is a solution that allows for a hardware or software failure but continues to run. Simple high-availability solutions include using redundant hard drives, redundant memory, or redundant CPUs in your server. As you get into more advanced solutions you will have redundant servers to provide redundancy in the event of a software problem on one of the servers. In this case the backup server will take over for the failed server either manually or automatically. When you are dealing with redundant hard drives you have several options. When you configure redundant hard drives you can create what is called a RAID array—a Redundant Array of Inexpensive Disks (or Redundant Array of Independent Disks). The exact array depends on the number of disks you have, the protection level you want, and the performance that you want to get from the system. All RAID levels require at least two disks, and some require three or four disks. Each RAID level has its strengths and weaknesses. Understanding these strengths and weaknesses is key in deciding which RAID level you should select. RAID 0 (also called a stripe set) is where all the disks are written to at the same time. The upside to this RAID level is that it is very fast, and you get the most amount of storage for your money. The downside to this system is that there is no redundancy. Because there is no redundancy in a RAID 0 array, if any disk in the RAID array fails then all data on the RAID array is lost. RAID 1 (also called a mirror set) is where you have two disks, and as data is written to the first disk, it is also written to the second disk at the same time. . File System (EFS) with SQL Server, which SQL server account must have access to file encryption keys encrypting any database files? A. SQL Server agent account B. Database server, service account C Chapter 5 193 18. Which of the following best describes SQL Server 2008 Extensible Key Management? A. Enables third-party EKM/HSM vendors to register their modules in SQL Server B. Enables easy. your server. As you get into more advanced solutions you will have redundant servers to provide redundancy in the event of a software problem on one of the servers. In this case the backup server

Ngày đăng: 06/07/2014, 23:21