High value 70-764 Dumps Questions 2019

Your success in 70-462 exam preparation is our sole target and we develop all our 70-462 exam preparation in a way that facilitates the attainment of this target. Not only is our 70-462 exam preparation material the best you can find, it is also the most detailed and the most updated. 70-462 exam preparation for Microsoft 70-764 are written to the highest standards of technical accuracy.

Free demo questions for Microsoft 70-764 Exam Dumps Below:

NEW QUESTION 1
You administer a Microsoft SQL Server 2016 server that hosts a transactional database and a reporting database. The transactional database is updated through a web application and is operational throughout the day.
The reporting database is only updated from the transactional database.
The recovery model and backup schedule are configured as shown in the following table:
70-764 dumps exhibit
At 14:00 hours, you discover that pages 71, 520, and 713 on one of the database files are corrupted on the reporting database.
You need to ensure that the databases are restored.
You also need to ensure that data loss is minimal. What should you do?

  • A. Perform a partial restore.
  • B. Restore the latest full backup, and restore the latest differential backu
  • C. Then, restore each log backup taken before the time of failure from the most recent differential backup.
  • D. Restore the latest full backup.
  • E. Restore the latest full backup, and restore the latest differential backu
  • F. Then, restore the latest log backup.
  • G. Perform a page restore.
  • H. Restore the latest full backu
  • I. Then, restore each differential backup taken before the time of failure from the most recent full backup.
  • J. Perform a point-in-time restore.
  • K. Restore the latest full backu
  • L. Then, restore the latest differential backup.

Answer: H

Explanation: At restore time, before you restore a differential backup, you must restore its base. Then, restore only the most recent differential backup to bring the database forward to the time when that differential backup was created. Typically, you would restore the most recent full backup followed by the most recent differential backup that is based on that full backup.
References: https://technet.microsoft.com/en-us/library/ms345448(v=sql.105).aspx

NEW QUESTION 2
Overview
Application Overview
Contoso, Ltd., is the developer of an enterprise resource planning (ERP) application.
Contoso is designing a new version of the ERP application. The previous version of the ERP application used SQL Server 2008 R2.
The new version will use SQL Server 2014.
The ERP application relies on an import process to load supplier data. The import process updates thousands of rows simultaneously, requires exclusive access to the database, and runs daily.
You receive several support calls reporting unexpected behavior in the ERP application. After analyzing the calls, you conclude that users made changes directly to the tables in the database.
Tables
The current database schema contains a table named OrderDetails.
The OrderDetails table contains information about the items sold for each purchase order. OrderDetails stores the product ID, quantities, and discounts applied to each product in a purchase order.
The product price is stored in a table named Products. The Products table was defined by using the SQL_Latin1_General_CP1_CI_AS collation.
A column named ProductName was created by using the varchar data type. The database contains a table named Orders.
Orders contains all of the purchase orders from the last 12 months. Purchase orders that are older than 12 months are stored in a table named OrdersOld.
The previous version of the ERP application relied on table-level security. Stored Procedures
The current version of the database contains stored procedures that change two tables. The following shows the relevant portions of the two stored procedures:
70-764 dumps exhibit
Customer Problems Installation Issues
The current version of the ERP application requires that several SQL Server logins be set up to function correctly. Most customers set up the ERP application in multiple locations and must create logins multiple times.
Index Fragmentation Issues
Customers discover that clustered indexes often are fragmented. To resolve this issue, the customers defragment the indexes more frequently. All of the tables affected by fragmentation have the following columns that are used as the clustered index key:
70-764 dumps exhibit
Backup Issues
Customers who have large amounts of historical purchase order data report that backup time is unacceptable. Search Issues
Users report that when they search product names, the search results exclude product names that contain accents, unless the search string includes the accent.
Missing Data Issues
Customers report that when they make a price change in the Products table, they cannot retrieve the price that the item was sold for in previous orders.
Query Performance Issues
Customers report that query performance degrades very quickly. Additionally, the customers report that users cannot run queries when SQL Server runs maintenance tasks. Import Issues During the monthly import process, database administrators receive many supports call from users who report that they cannot access the supplier data. The database administrators want to reduce the amount of time required to import the data.
Design Requirements
File Storage Requirements
The ERP database stores scanned documents that are larger than 2 MB. These files must only be accessed through the ERP application. File access must have the best possible read and write performance.
Data Recovery Requirements
If the import process fails, the database must be returned to its prior state immediately. Security Requirements
You must provide users with the ability to execute functions within the ERP application, without having direct access to the underlying tables.
Concurrency Requirements
You must reduce the likelihood of deadlocks occurring when Sales.Prod and Sales.Proc2 execute. You need to recommend a solution that addresses the backup issue.
The solution must minimize the amount of development effort. What should you include in the recommendation?

  • A. Indexed views
  • B. Filegroups
  • C. Table partitioning
  • D. Indexes

Answer: B

Explanation: - Backup Issues
Customers who have large amounts of historical purchase order data report that backup time is unacceptable.
- For very large databases (and by that, I mean, at least 500gb, but more like 5-10tb or more), it can become too expensive to regularly run a straight full backup.
So, where needed, you can choose to backup smaller pieces of the database by choosing to back up one of the files or file groups that make up a database.

NEW QUESTION 3
You administer a Microsoft SQL Server 2012 instance.
You need to configure a new database to support FILETABLES. What should you do? Choose all that apply.

  • A. Disable FILESTREAM on the Database.
  • B. Enable FILESTREAM on the Server Instance.
  • C. Configure the Database for Partial Containment.
  • D. Create a non-empty FILESTREAM file group.
  • E. Enable Contained Databases on the Server Instance.
  • F. Set the FILESTREAM directory name on the Database.

Answer: BDF

Explanation: References:
http://msdn.microsoft.com/en-us/library/gg509097.aspx

NEW QUESTION 4
An organization deploys Microsoft SQL Server instances at a main office and the organization's remote office. SQL Server is not using Windows failover clustering.
Remote employef s report connection issues when they attempt to run queries against a specific database that is hosted at the main office.
You need to ensure that remote employees can retrieve data from a database instance that is hosted in the remote office.
Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
70-764 dumps exhibit

    Answer:

    Explanation: Database mirroring is a solution for increasing the availability of a SQL Server database. Mirroring is implemented on a per-database basis and works only with databases that use the full recovery model.

    NEW QUESTION 5
    You work as a Database Administrator (DBA) at ABC.com.
    You are in the process of deploying new servers running SQL Server 2012.
    You need to deploy a SQL Server 2012 server to host databases used to host databases used by Research and Development department.
    The databases used by the Research and Development department will store sensitive data.
    A company security policy states that if Research and Development department database files are moved to another server, the files must be encrypted.
    Which of the following solutions would meet the encryption requirement?

    • A. Encrypting File System (EFS).
    • B. Transparent Data Encryption (TDE).
    • C. Windows Bitlocker Drive Encryption.
    • D. Secure Sockets Layer (SSL)

    Answer: B

    NEW QUESTION 6
    You are configuring log shipping for a Microsoft SQL Server database named salesOrders. You run the following Transact-SQL script:
    70-764 dumps exhibit
    You need to determine the changes that the script has on the environment.
    How does the script affect the environment? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
    70-764 dumps exhibit

      Answer:

      Explanation: Box 1: is
      Note: sp_change_log_shipping_primary_database, Parameter: [ @backup_share = ] 'backup_share'
      Is the network path to the backup directory on the primary server. backup_share is nvarchar(500), with no default, and cannot be NULL.
      Box 2: 72 hours
      4320 minutes is 72 hours.
      Note: sp_change_log_shipping_primary_database, Backup_retention_period parameter
      @backup_retention_period = ] 'backup_retention_period'
      Is the length of time, in minutes, to retain the log backup file in the backup directory on the primary server. backup_retention_period is int, with no default, and cannot be NULL.
      Box 2: SP_Add_Retcode Box 3: 24 hours sp_add_schedule
      @freq_type (here 4, which is daily)
      A value indicating when a job is to be executed. freq_typeis int, with a default of 0, and can be one of these values.
      ValueDescription 1Once
      4Daily 8Weekly 16Monthly
      32Monthly, relative to freq_interval
      64Run when SQLServerAgent service starts 128Run when the computer is idle
      @freq_interval = ] freq_interval
      The days that a job is executed. freq_interval is int, with a default of 1, and depends on the value of freq_type. Value of freq_typeEffect on freq_interval
      1 (once)freq_interval is unused.
      References:
      https://docs.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/sp-add-schedule-transact-sql

      NEW QUESTION 7
      You administer a Microsoft SQL Server 2016 instance.
      You discover that the SQL Agent Error Log file is rapidly growing in size.
      You need to ensure that the SQL Agent Error Log file does not grow rapidly when SQL Server agent jobs execute.
      What should you do?

      • A. Execute the sp_cycle_agent_errorlog stored procedure.
      • B. Configure event forwarding.
      • C. Enable the Auto Shrink option on the master database.
      • D. Enable the Auto Shrink option on the msdb database.
      • E. Disable the Include execution trace messages feature.

      Answer: E

      Explanation: Because the Include execution trace messages option can cause the error log to become large, only include execution trace messages in SQL Server Agent error logs when investigating a specific SQL Server Agent problem.
      References:
      https://docs.microsoft.com/en-us/sql/ssms/agent/write-execution-trace-messages-to-sql-server-agent-log-ssms

      NEW QUESTION 8
      You are implementing log shipping. You configure a secondary server in standby mode. You configure log shipping to occur hourly and keep up to seven days of log backups.
      Users create reports by querying the secondary server. Transaction logs are not applied to the secondary server.
      You need to ensure that the secondary server has current data at the beginning of each business day. What are two possible ways to achieve the goal? Each answer represents a complete solution.

      • A. Create a snapshot database from a daily backup to use as the secondary databas
      • B. Revert the snapshot database back to the previous business day.
      • C. Disconnect users while transaction logs are applied.
      • D. Configure the secondary server as a database mirroring target server.
      • E. Allow restore operations to accumulat
      • F. Run a Microsoft SQL Agent job that disconnects all users that are connected to the secondary server.

      Answer: CD

      NEW QUESTION 9
      Overview
      You are a database administrator for a company named Litware, Inc.
      Litware is a book publishing house. Litware has a main office and a branch office.
      You are designing the database infrastructure to support a new web-based application that is being developed. The web application will be accessed at www.litwareinc.com. Both internal employees and external partners
      will use the application.
      You have an existing desktop application that uses a SQL Server 2008 database named App1_DB. App1_DB will remain in production.
      Requirements Planned Changes
      You plan to deploy a SQL Server 2014 instance that will contain two databases named Database1 and Database2.
      All database files will be stored in a highly available SAN. Database1 will contain two tables named Orders and OrderDetails.
      Database1 will also contain a stored procedure named usp_UpdateOrderDetails.
      The stored procedure is used to update order information. The stored procedure queries the Orders table twice each time the procedure executes.
      The rows returned from the first query must be returned on the second query unchanged along with any rows added to the table between the two read operations.
      Database1 will contain several queries that access data in the Database2 tables. Database2 will contain a table named Inventory.
      Inventory will contain over 100 GB of data.
      The Inventory table will have two indexes: a clustered index on the primary key and a nonclustered index.
      The column that is used as the primary key will use the identity property.
      Database2 wilt contains a stored procedure named usp_UpdateInventory. usp_UpdateInventory will manipulate a table that contains a self-join that has an unlimited number of hierarchies. All data in Database2 is recreated each day ad does not change until the next data creation process. Data from Database2 will be accessed periodically by an external application named Application1. The data from Database2 will be sent to a database named Appl_Dbl as soon as changes occur to the data in Database2. Litware plans to use offsite storage for all SQL Server 2014 backups.
      Business Requirements
      You have the following requirements:
      Costs for new licenses must be minimized.
      Private information that is accessed by Application must be stored in a secure format.
      Development effort must be minimized whenever possible.
      The storage requirements for databases must be minimized.
      System administrators must be able to run real-time reports on disk usage.
      The databases must be available if the SQL Server service fails.
      Database administrators must receive a detailed report that contains allocation errors and data corruption.
      Application developers must be denied direct access to the database tables. Applications must be denied direct access to the tables.
      You must encrypt the backup files to meet regulatory compliance requirements.
      The encryption strategy must minimize changes to the databases and to the applications. You need to recommend an isolation level for usp_UpdateOrderDetails.
      Which isolation level should recommend?

      • A. Read committed
      • B. Repeatable read
      • C. Read uncommitted
      • D. Serializable

      Answer: B

      Explanation: - Scenario: Databasel will also contain a stored procedure named usp_UpdateOrderDetails. The stored procedure is used to update order information. The stored procedure queries the Orders table twice each time the procedure executes. The rows returned from the first query must be returned on the second query unchanged along with any rows added to the table between the two read operations.
      - REPEATABLE READ Specifies that statements cannot read data that has been modified but not yet committed by other transactions and that no other transactions can modify data that has been read by the current transaction until the current transaction completes.

      NEW QUESTION 10
      Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question apply only to that question.
      You are the database administrator for a company that hosts Microsoft SQL Server. You manage both on-premises and Microsoft Azure SQL Database environments.
      You plan to delegate encryption operations to a user.
      You need to grant the user permission to implement cell-level encryption while following the principle of least privilege.
      Which permission should you grant?

      • A. DDLAdmin
      • B. db_datawriter
      • C. dbcreator
      • D. dbo
      • E. View Database State
      • F. View ServerState
      • G. View Definition
      • H. sysadmin

      Answer: G

      Explanation: The following permissions are necessary to perform column-level encryption, or cell-level encryption.
      CONTROL permission on the database.
      CREATE CERTIFICATE permission on the database. Only Windows logins, SQL Server logins, and application roles can own certificates. Groups and roles cannot own certificates.
      ALTER permission on the table.
      Some permission on the key and must not have been denied VIEW DEFINITION permission. References:
      https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/encrypt-a-column-of-data

      NEW QUESTION 11
      Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
      After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
      A company has an on-premises Microsoft SQL Server environment and Microsoft Azure SQL Database instances. The environment hosts several customer databases.
      One customer reports that their database is not responding as quickly as the service level agreements dictate. You observe that the database is fragmented.
      You need to optimize query performance.
      Solution: You run the DBCC CHECKDB command. Does the solution meet the goal?

      • A. Yes
      • B. No

      Answer: B

      Explanation: DBCC CHECKDB only checks the logical and physical integrity of all the objects in the specified database. It does not update any indexes, and does not improve query performance.
      References: https://docs.microsoft.com/en-us/sql/t-sql/database-console-commands/dbcc-checkdb-transact-sql

      NEW QUESTION 12
      You are troubleshooting an application that runs a query. The application frequently causes deadlocks. You need to identify which transaction causes the deadlock.
      What should you do? More than one answer choice may achieve the goal. Select the BEST answer.

      • A. Query the sys.dm_exec_requests dynamic management view.
      • B. Create a trace in SQL Server Profiler that contains the Deadlock graph event.
      • C. Query the sys.dm_exec_sessions dynamic management view.
      • D. Create an extended events session to capture deadlock information.

      Answer: D

      Explanation: Troubleshooting deadlocks
      You have been receiving reports from users indicating that certain applications are returning deadlock errors. To maximize the effectiveness of troubleshooting these problems, you decide to focus on the deadlocks that are hit most frequently. You create an Extended Events session that:
      Configures deadlock event tracking for the session.
      Specifies a target that aggregates based on an identifier for the deadlock.
      You run the Extended Events session, and after additional deadlocks are reported you are able to obtain aggregated deadlock information, along with the complete XML deadlock graph for each source. Using this information, you are able to pin point the most common deadlocks and start working on a solution.

      NEW QUESTION 13
      General Overview
      You are the Senior Database Administrator (DBA) for a software development company named Leafield Solutions. The company develops software applications custom designed to meet customer requirements.
      Requirements Leafield Solutions has been asked by a customer to develop a web-based Enterprise Resource Planning and Management application. The new application will eventually replace a desktop application that the customer is currently using. The current application will remain in use while the users are trained to use the new webbased application.
      You need to design the SQL Server and database infrastructure for the web-based application. Databases
      You plan to implement databases named Customers, Sales, Products, Current_Inventory, and TempReporting. The Sales database contains a table named OrderTotals and a table named SalesInfo.
      A stored procedure named SPUpdateSalesInfo reads data in the OrderTotals table and modifies data in the SalesInfo table.
      The stored procedure then reads data in the OrderTotals table a second time and makes further changes to the information in the SalesInfo table.
      The Current_Inventory database contains a large table named Inv_Current. The Inv_Current table has a
      clustered index for the primary key and a nonclustered index. The primary key column uses the identity property.
      The data in the Inv_Current table is over 120GB in size. The tables in the Current_Inventory database are accessed by multiple queries in the Sales database.
      Another table in the Current_Inventory database contains a self-join with an unlimited number of hierarchies. This table is modified by a stored procedure named SPUpdate2.
      An external application named ExternalApp1 will periodically query the Current_Inventory database to generate statistical information. The TempReporting database contains a single table named GenInfo.
      A stored procedure named SPUPdateGenInfo combines data from multiple databases and generates millions of rows of data in the GenInfo table.
      The GenInfo table is used for reports.
      When the information in GenInfo is generated, a reporting process reads data from the Inv_Current table and queries information in the GenInfo table based on that data.
      The GenInfo table is deleted after the reporting process completes. The Products database contains tables named ProductNames and ProductTypes.
      Current System
      The current desktop application uses data stored in a SQL Server 2005 database named DesABCopAppDB. This database will remain online and data from the Current_Inventory database will be copied to it as soon as data is changed in the Current_Inventory database.
      SQL Servers
      A new SQL Server 2012 instance will be deployed to host the databases for the new system. The databases will be hosted on a Storage Area Network (SAN) that provides highly available storage.
      Design Requirements
      Your SQL Server infrastructure and database design must meet the following requirements:
      Confidential information in the Current_ Inventory database that is accessed by ExternalApp1 must be securely stored.
      Direct access to database tables by developers or applications must be denied.
      The account used to generate reports must have restrictions on the hours when it is allowed to make a connection.
      Deadlocks must be analyzed with the use of Deadlock Graphs.
      In the event of a SQL Server failure, the databases must remain available.
      Software licensing and database storage costs must be minimized.
      Development effort must be minimized.
      The Tempdb databases must be monitored for insufficient free space.
      Failed authentication requests must be logged.
      Every time a new row is added to the ProductTypes table in the Products database, a user defined function that validates the row must be called before the row is added to the table.
      When SPUpdateSalesInfo queries data in the OrderTotals table the first time, the same rows must be returned along with any newly added rows when SPUpdateSalesInfo queries data in the OrderTotals table the second time.
      You need to meet the design requirement for the ProductTypes table in the Product database. Which of the following would be the best solution?

      • A. A PRIMARY KEY constraint.
      • B. A CHECK constraint.
      • C. A UNIQUE constraint.
      • D. A Data Definitions Language (DDL) trigger.
      • E. A FOREIGN KEY constraint.

      Answer: B

      NEW QUESTION 14
      You administer a Microsoft SQL Server 2016 instance that contains a financial database hosted on a storage area network (SAN). The financial database has the following characteristics:
      A data file of 2 terabytes is located on a dedicated LUN (drive D).
      A transaction log of 10 GB is located on a dedicated LUN (drive E).
      Drive D has 1 terabyte of free disk space.
      Drive E has 5 GB of free disk space.
      The database is continually modified by users during business hours from Monday through Friday between 09:00 hours and 17:00 hours.
      Five percent of the existing data is modified each day.
      The Finance department loads large CSV files into a number of tables each business day at 11:15 hours and 15:15 hours by using the BCP or BULK INSERT commands.
      Each data load adds 3 GB of data to the database.
      These data load operations must occur in the minimum amount of time. A full database backup is performed every Sunday at 10:00 hours.
      Backup operations will be performed every two hours (11:00, 13:00, 15:00, and 17:00) during business hours. You implement log shipping of the financial database to another SQL Server 2016 instance. You decide to
      failover to this secondary database.
      You need to ensure that all transactions will be replicated to the secondary database. Which backup option should you use?

      • A. Differential
      • B. Transaction Log
      • C. FULL
      • D. SIMPLE
      • E. SKIP
      • F. RESTART
      • G. STANDBY
      • H. CHECKSUM
      • I. DBO_ONLY
      • J. COPY_ONLY
      • K. NORECOVERY
      • L. NO_CHECKSUM
      • M. CONTINUE_AFTER_ERROR
      • N. BULK_LOGGED

      Answer: K

      Explanation: Roll back is controlled by the RESTORE statement through the [ RECOVERY | NORECOVERY ] options: NORECOVERY specifies that roll back not occur. This allows roll forward to continue with the next
      statement in the sequence.
      References: https://docs.microsoft.com/en-us/sql/t-sql/statements/restore-statements-transact-sql

      NEW QUESTION 15
      Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
      After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
      Your company is developing a new business intelligence application that will access data in a Microsoft Azure SQL Database instance. All objects in the instance have the same owner.
      A new security principal named BI_User requires permission to run stored procedures in the database. The stored procedures read from and write to tables in the database. None of the stored procedures perform IDENTIFY_INSERT operations or dynamic SQL commands.
      The scope of permissions and authentication of BI_User should be limited to the database. When granting permissions, you should use the principle of least privilege.
      You need to create the required security principals and grant the appropriate permissions. Solution: You run the following Transact-SQL statement:
      70-764 dumps exhibit
      Does the solution meet the goal?

      • A. Yes
      • B. No

      Answer: A

      Explanation: One method of creating multiple lines of defense around your database is to implement all data access using stored procedures or user-defined functions. You revoke or deny all permissions to underlying objects, such as tables, and grant EXECUTE permissions on stored procedures. This effectively creates a security perimeter around your data and database objects.
      Best Practices
      Simply writing stored procedures isn't enough to adequately secure your application. You should also consider the following potential security holes.
      70-764 dumps exhibit Grant EXECUTE permissions on the stored procedures for database roles you want to be able to access the data.
      70-764 dumps exhibit Revoke or deny all permissions to the underlying tables for all roles and users in the database, including the public role. All users inherit permissions from public. Therefore denying permissions to public means that only owners and sysadmin members have access; all other users will be unable to inherit permissions from membership in other roles.
      70-764 dumps exhibit Do not add users or roles to the sysadmin or db_owner roles. System administrators and database owners can access all database objects.
      References:
      https://docs.microsoft.com/en-us/dotnet/framework/data/adonet/sql/managing-permissions-with-stored-procedur

      NEW QUESTION 16
      Overview
      You are a database administrator for a company named Litware, Inc.
      Litware is a book publishing house. Litware has a main office and a branch office.
      You are designing the database infrastructure to support a new web-based application that is being developed. The web application will be accessed at www.litwareinc.com. Both internal employees and external partners
      will use the application.
      You have an existing desktop application that uses a SQL Server 2008 database named App1_DB. App1_DB will remain in production.
      Requirements Planned Changes
      You plan to deploy a SQL Server 2014 instance that will contain two databases named Database1 and Database2.
      All database files will be stored in a highly available SAN.
      Database1 will contain two tables named Orders and OrderDetails.
      Database1 will also contain a stored procedure named usp_UpdateOrderDetails.
      The stored procedure is used to update order information. The stored procedure queries the Orders table twice each time the procedure executes.
      The rows returned from the first query must be returned on the second query unchanged along with any rows added to the table between the two read operations.
      Database1 will contain several queries that access data in the Database2 tables. Database2 will contain a table named Inventory.
      Inventory will contain over 100 GB of data.
      The Inventory table will have two indexes: a clustered index on the primary key and a nonclustered index. The column that is used as the primary key will use the identity property.
      Database2 wilt contains a stored procedure named usp_UpdateInventory. usp_UpdateInventory will manipulate a table that contains a self-join that has an unlimited number of hierarchies. All data in Database2 is recreated each day ad does not change until the next data creation process. Data from Database2 will be accessed periodically by an external application named Application1. The data from Database2 will be sent to a database named Appl_Dbl as soon as changes occur to the data in Database2. Litware plans to use offsite storage for all SQL Server 2014 backups.
      Business Requirements
      You have the following requirements:
      Costs for new licenses must be minimized.
      Private information that is accessed by Application must be stored in a secure format.
      Development effort must be minimized whenever possible.
      The storage requirements for databases must be minimized.
      System administrators must be able to run real-time reports on disk usage.
      The databases must be available if the SQL Server service fails.
      Database administrators must receive a detailed report that contains allocation errors and data corruption.
      Application developers must be denied direct access to the database tables. Applications must be denied direct access to the tables.
      You must encrypt the backup files to meet regulatory compliance requirements.
      The encryption strategy must minimize changes to the databases and to the applications.
      You need to recommend a solution for Application1 that meets the security requirements. What should you include in the recommendation?

      • A. Encrypted columns
      • B. Certificate Authentication
      • C. Secure Socket Layer (SSL)
      • D. Signed stored procedures

      Answer: D

      Explanation: - Scenario:
      - Data from Database2 will be accessed periodically by an external application named Application1
      - Application developers must be denied direct access to the database tables. Applications must be denied direct access to the tables.
      Tutorial: Signing Stored Procedures with a Certificate

      P.S. 2passeasy now are offering 100% pass ensure 70-764 dumps! All 70-764 exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/70-764/ (427 New Questions)