You work as DBA at AIOTestKing.com. You administer a SQL Server 2005 computer named AIOTestKingA. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO).
Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on AIOTestKingA . You need to ensure that these computers can access the Services database without violating the company’s written security policy. What should you do?
A.
Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
B.
Configure a virtual directory through Internet Information Services (IIS) for access to AIOTestKingA. Direct users to the virtual directory for data access.
C.
Create a domain account for each of the company’s users. Provide each domain account with access to AIOTestKing A and the Services database.
D.
Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.
E.
Create a local logon account on AIOTestKing A for each of the company’s users. Provide each logon account with access to AIOTestKing A and the Services database.
Explanation:
All UNIX and DOS users have to use SQL Server logon accounts in order to access the database. You do not want to have multiple users chairing one logon account. And you do not want the users to have a local logon account on the SQL Server.