Which Transact-SQL script should you use?

You work as DBA at AIOTestKing.com. You administer a Microsoft Windows Server 2003 computer named AIOTestKingA. AIOTestKing A runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to AIOTestKingA. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name\password for first account:
pentest\P@ssw0rdUser name\password for second account: hacktest\password You need to provide the information security team with the requested access to AIOTestKing A.
Which Transact-SQL script should you use?

You work as DBA at AIOTestKing.com. You administer a Microsoft Windows Server 2003 computer named AIOTestKingA. AIOTestKing A runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to AIOTestKingA. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name\password for first account:
pentest\P@ssw0rdUser name\password for second account: hacktest\password You need to provide the information security team with the requested access to AIOTestKing A.
Which Transact-SQL script should you use?

A.
CREATE LOGIN pentest WITH PASSWORD = ‘P@ssw0rd’ CREATE LOGIN hacktest WITH PASSWORD = ‘password’,CHECK_POLICY = OFF

B.
CREATE LOGIN pentest WITH PASSWORD = ‘P@ssw0rd’ CREATE LOGIN hacktest WITH PASSWORD = ‘password'[HASHED]

C.
CREATE LOGIN pentest WITH PASSWORD = ‘P@ssw0rd’ CREATE LOGIN hacktest WITH PASSWORD = ‘password’

D.
CREATE LOGIN [CONTOSO\pentest] FROM WINDOWS CREATE LOGIN [CONTOSO\hacktest] FROM WINDOWS

Explanation:
Syntax:
CREATE LOGIN login_name { WITH | FROM } ::= WINDOWS [ WITH [ ,… ] ] | CERTIFICATE certname | ASYMMETRIC KEY asym_key_name ::= PASSWORD = ‘password’ [ HASHED ] [ MUST_CHANGE ] [ , [ ,… ] ] ::= SID = sid | DEFAULT_DATABASE = database | DEFAULT_LANGUAGE = language | CHECK_EXPIRATION = { ON | OFF} | CHECK_POLICY = { ON | OFF} [ CREDENTIAL = credential_name] ::= DEFAULT_DATABASE = database | DEFAULT_LANGUAGE = language



Leave a Reply 0

Your email address will not be published. Required fields are marked *