當前位置: 首頁 > 問題分類 > 計算機類考試 > 微軟認證 > 問題詳情
問題

You are the administrator of SQL Server computers. One server is named SQL7, and other is named SQL2000. SQL7 is running SQL Server 7.O and SQL2000 is running SQL Server 2000.

The net-libraries on SQL2000 are configured as shown in the exhibit.

SQL7 is configured so that it has the named pipes, TCP/IP, NWlink, IPX/SPX and multiprotocol Net Libraries.

SQL2000 and SQL7 exchange confidential company information. You need to ensure that unauthorized users cannot access this information.

Which two actions should you take? (Each correct answer presents part of the solution. Choose two)

A.On SQL2000, enable the multiprotocol net library.

B.On SQL2000, select the force protocol encryption check box.

C.On SQL7, select the force protocol encryption check box.

D.On SQL2000, install a secure sockets layer (SSL) encryption certificate.

E.On SQL2000 and SQL7, enable multiprotocol encryption.

參考答案
正確答案:AE
解析:Explanation:
For compatibility with earlier versions of SQL Server, the Multiprotocol Net-Library continues to support its own encryption. This fits this scenario with a SQL Server 7 and a SQL Server 2000.

Note: Network libraries are used to pass network packets between the clients and the server running SQL Server 2000. The network libraries, implemented as dynamic-link libraries (DLLs), perform. the network operations required to communicate using specific interprocess communication (IPC) mechanisms.

The Multiprotocol Net-Library uses the Windows NT remote procedure call (RPC) facility and can communicate over most IPC mechanisms supported by Windows NT such as TCP/IP Sockets, NWLink IPX/SPX, and Named Pipes; allow the use of Windows Authentication over all protocols that RPC supports; support encryption for user password authentication as well as data; and can offer performance comparable to native IPC Net-Libraries for most applications.

The Multiprotocol encryption is used only for compatibility purposes with existing systems but is not supported on Windows 98. The Secure Sockets Layer (SSL) encryption that can be enabled using the Server Network Utility is a more comprehensive encryption solution. However, SSL encryption works only with instances of SQL Server 2000 running on a computer that has been assigned a certificate from a public certification authority. The computer on which the application is running must also have a root CA certificate from the same authority.

Incorrect Answers:
B: You can force protocol encryption using SSL. Here Multiprotocol encryption must be used for compatibility purposes. SSL requires a server certificate and is not support by SQL Server 7.0.

C: You can force protocol encryption using SSL. Here Multiprotocol encryption must be used for compatibility purposes. SSL requires a server certificate and is not support by SQL Server 7.0.

D: The Secure Sockets Layer (SSL) encryption that can be enabled using the Server Network Utility is a more comprehensive encryption solution than Multiprotocol encryption. However, SSL encryption works only with instances of SQL Server 2000 running on a computer that has been assigned a certificate from a public certification authority. The Multiprotocol encryption must be used for compatibility purposes.
您可能感興趣的試題
  • You are the administrator of your company's network. Your network has five Windows 2000 server computers and 75 Windows 2000 Professional computers. The Windows 2000 Professional computers were installed by using a RIS image on one of the Windows 2000 Server computers. You need to upgrade several applications on the Windows 2000 Professional computers. The applications do not have built-in support for scripted installations.

    You want to accomplish the following goals:

    1. An unattended installation of the upgraded applications will be performed on the Windows 2000 Professional computers.

    2. Existing user environments will be maintained on the Windows 2000 Professional computers.

    3. The network name of each Windows 2000 Professional computer will be changed to match its asset tag.

    4. The RIS image and the upgraded applications will be enabled as they are added to the network.

    You take the following actions:

    1. Install the RIS image on a Windows 2000 Professional computer named Computer1.

    2. Install the upgraded applications on Computers1.

    3. Change the network name of Computer1 to %DMI-SERIAL_NUM%.

    4. Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server.

    5. Start all of the Windows 2000 Professional computers, and then load the RIS image from the RIS server.

    Which result or results do these actions produce? (Choose all that apply.)

    A.An unattended installation of the upgraded applications will be performed on the Windows 2000 Professional computers.

    B.Existing user environments will be maintained on the Windows 2000 Professional computers.

    C.The network name of each Windows 2000 Professional computer will be changed to match its asset tag.

    D.The RIS image and the upgraded applications will be enabled as they are added to the network.

  • You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.

    What should you do?

    A.Configure an ADM template and add the template to the GPO.

    B.Configure an INF policy and add the policy to the GPO.

    C.Configure a Microsoft Windows installer package and add the package to the GPO.

    D.Configure RIS to include the registry entry.

  • You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.

    Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.

    However, users report that they can see EzonexamDocs when they browse for shared folders.

    How should you solve this problem?

    A.Modify the share permissions to remove the All - Read permission on EzonexamDocs from the Users group.

    B.Modify the NTFS permissions to remove the Allow - Read permissions on EzonexamDocs from the Users group.

    C.Change the share name to EzonexamDocs #.

    D.Change the share name to EzonexamDocs $.

  • On a Windows 2000 Professional computer, you run a shipping application that prints packing labels to a laser printer for every outgoing shipment, 24 hours per day. During peak hours, your company ships more than 1,000 packages per hour.

    You have just purchased a second identical laser printer to aid in printing. You want to configure the printers so that the jobs are load balanced. You connect the second laser printer to the computer.

    What must you do next?

    A.Enable bi-directional support.

    B.Enable printer pooling.

    C.Configure print spooling.

    D.Configure print sharing.

×
驗證
新疆十一选五和值表