单项选择题
A.A single RAID 5 volume should be utilized.
B.A RAID 1 volume and a RAID 5 volume should be utilized.
C.A single RAID 10 volume should be utilized.
D.A RAID 0 volume and a RAID 5 volume should be utilized.
多项选择题 You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. A corporate backup and recovery strategy that has to be validated is designed. You are required to make sure that any single database can be restored successfully from a severe failure, and during the restoration, a backup data center should not be required in a different location. Which three actions should be contained by your solution?()
单项选择题 You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. SQL Server 2008 instances at five sites are managed by you.A mission-critical database is shared by the five sites. According to the business requirements, the users at each site should be enabled to access and change data on all sites with minimal latency.In addition, data loss should be minimized if a server fails. A high-availability solution should be designed, and the business requirements should be satisfied. Which action should be included in your solution?()
单项选择题 You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application, and the application will be deployed to the instance. A table is consisted by the new database, and the table is created by utilizing the following code segment: Since you are the technical support, you should utilize the maximum secure method to protect the BonusPlan column from the access of unauthorized users. Which action will you perform to finish the task?()