Download Administering a SQL Database Infrastructure.70-764.PremDumps.2019-03-20.57q.tqb

Vendor: Microsoft
Exam Code: 70-764
Exam Name: Administering a SQL Database Infrastructure
Date: Mar 20, 2019
File Size: 823 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
You manage a Microsoft SQL Server environment. You implement Transparent Data Encryption (TDE). A user will assist in managing TDE. You need to ensure that the user can view the TDE metadata while following the principle of lease privilege. Which permission should you grant?
  1. DDLAdmin
  2. db_datawriter
  3. dbcreator
  4. dbo
  5. View Database State
  6. View Server State
  7. View Definition
  8. sysadmin
Correct answer: G
Explanation:
Viewing the metadata involved with TDE requires the VIEW DEFINITION permission on the certificate.https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/transparent-data- encryption-tde
Viewing the metadata involved with TDE requires the VIEW DEFINITION permission on the certificate.
https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/transparent-data- encryption-tde
Question 2
You are the database administrator for a company that hosts Microsoft SQL Server. You manage both on-premises and Microsoft Azure SQL Database environments. You have a user database named HRDB that contains sensitive human resources data. The HRDB backup files must be encrypted. You need to grant the correct permission to the service account that backs up the HRDB database. Which permission should you grant?
  1. DDLAdmin
  2. db_datawriter
  3. dbcreator
  4. dbo
  5. View Database State
  6. View Server State
  7. View Definition
  8. sysadmin
Correct answer: G
Explanation:
Restoring the encrypted backup: SQL Server restore does not require any encryption parameters to be specified during restores. It does require that the certificate or the asymmetric key used to encrypt the backup file be available on the instance that you are restoring to. The user account performing the restore must have VIEW DEFINITION permissions on the certificate or key. https://docs.microsoft.com/en-us/sql/relational-databases/backup-restore/backup-encryption
Restoring the encrypted backup: SQL Server restore does not require any encryption parameters to be specified during restores. It does require that the certificate or the asymmetric key used to encrypt the backup file be available on the instance that you are restoring to. The user account performing the restore must have VIEW DEFINITION permissions on the certificate or key. 
https://docs.microsoft.com/en-us/sql/relational-databases/backup-restore/backup-encryption
Question 3
You are the database administrator for a company that hosts Microsoft SQL Server. You manage both on-premises and Microsoft Azure SQL Database environments. You plan to delegate encryption operations to a user. You need to grant the user permission to implement cell-level encryption while following the principle of least privilege. Which permission should you grant?
  1. DDLAdmin
  2. db_datawriter
  3. dbcreator
  4. dbo
  5. View Database State
  6. View Server State
  7. View Definition
  8. sysadmin
Correct answer: G
Explanation:
The following permissions are necessary to perform column-level encryption, or cell-level encryption: - CONTROL permission on the database. - CREATE CERTIFICATE permission on the database. Only Windows logins, SQL Server logins, and application roles can own certificates. Groups and roles cannot own certificates. - ALTER permission on the table. - Some permission on the key and must not have been denied VIEW DEFINITION permission. https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/encrypt-a-column-of-data 
The following permissions are necessary to perform column-level encryption, or cell-level encryption: 
- CONTROL permission on the database. 
- CREATE CERTIFICATE permission on the database. Only Windows logins, SQL Server logins, and application roles can own certificates. Groups and roles cannot own certificates. 
- ALTER permission on the table. 
- Some permission on the key and must not have been denied VIEW DEFINITION permission. 
https://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/encrypt-a-column-of-data 
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!