What should you do?

You are a database administrator for AIOTestKing.com. You are responsible for managing 10 SQL Server 2005 computers that run Microsoft Windows Server 2003, Enterprise Edition. The company’s Microsoft Active Directory administrators handle all Group Policy object (GPO) deployments. The Active Directory administrators have deployed a security template named SQL05_Security.inf that has the appropriate settings to meet the company’s security policy. You need to identify the existing configuration of each SQL Server 2005 computer to ensure that it meets the company’s security policy. What should you do?

You are a database administrator for AIOTestKing.com. You are responsible for managing 10 SQL Server 2005 computers that run Microsoft Windows Server 2003, Enterprise Edition. The company’s Microsoft Active Directory administrators handle all Group Policy object (GPO) deployments. The Active Directory administrators have deployed a security template named SQL05_Security.inf that has the appropriate settings to meet the company’s security policy. You need to identify the existing configuration of each SQL Server 2005 computer to ensure that it meets the company’s security policy. What should you do?

A.
Use Network Monitor on each SQL Server 2005 computer to capture a detailed report of the types of network traffic on the local network adapter.

B.
Use the Performance Logs and Alerts snap-in to create counter logs for the Network Interface performance object.

C.
Use the Security Template snap-in to analyze the SQL05_Security.inf security template.

D.
Use the Security Configuration and Analysis tool on each SQL Server 2005 computer to identify discrepancies between system settings and database settings.

Explanation:
To simplify security configuration and give administrators a means to monitor security settings, Microsoft developed the Security Configuration and Analysis tool for the Microsoft Management Console (MMC) and a corresponding set of security templates for specific scenarios. Using these tools, you can analyze a server against a known previously saved configuration, or you can analyze it against a recommended security configuration template.



Leave a Reply 0

Your email address will not be published. Required fields are marked *