PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

You plan to deploy a new application. The application will perform the following operations:
* Create a new database
* Add new logins
* Back up the new database
You need to configure a login to support the deployment of the new application. The solution must ensure that the application uses the most restrictive permissions possible. What should you do?

Which two actions should you perform?

You are a database developer. You develop a task management application that connects to a SQL Server 2008 database named TaskDB. Users log on to the application by using a SQL Server login. The application contains a module named Task that assigns tasks to users. Information about these tasks is stored in the Tasks table of the TaskDB database. The Tasks table contains multiple columns. These include the CloseDate and EstimatedTime columns. Users assigned to a database role named User1 can update all task information columns except the CloseDate and the EstimatedTime columns in the Tasks table. Administrative users assigned to a database role named Task_Admin can update all task information in the Tasks table. You need to design a strategy to meet the security requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

What should you do?

You are a database developer. You develop a database application for a SQL Server 2008 instance. The instance hosts a third-party database. You are not allowed to modify the database schema. The database contains two tables that are as shown in the following diagram.

You plan to extract address information about full-time employees based on the FullTimeIndicator flag. You need to design a data access layer to simplify the extraction process. What should you do?