which one would be used to make sure that the package can be viewed and executed by changing the protection level of the package?

You are a database developer and you have about two years experience in creating business intelligence (BI) solutions by using SQL Server2008.

Now you are employed in a company which is named NaproStar and work as a developer of a SQL Server 2008 Integration Services (SSIS) for the company.
To meet the business requirement, you use the SSIS to develop a package and use your local development environment to test the package.
Then the package is deployed to the file system in the production environment.

After the deployment, the users notice that the package contains no connection strings, which means the package gets a failure of the deployment.
Now you are assigned a task to make sure that the package can be viewed and executed by changing the protection level of the package.

So of the protection levels of the package, which one would be used?

You are a database developer and you have about two years experience in creating business intelligence (BI) solutions by using SQL Server2008.

Now you are employed in a company which is named NaproStar and work as a developer of a SQL Server 2008 Integration Services (SSIS) for the company.
To meet the business requirement, you use the SSIS to develop a package and use your local development environment to test the package.
Then the package is deployed to the file system in the production environment.

After the deployment, the users notice that the package contains no connection strings, which means the package gets a failure of the deployment.
Now you are assigned a task to make sure that the package can be viewed and executed by changing the protection level of the package.

So of the protection levels of the package, which one would be used?

A.
EncryptAllWithPassword level would be used

B.
ServerStorage level would be used

C.
ServerChange level would be used

D.
DontSaveSensitive level would be used

E.
EncryptAllWithUserKey level would be used



Leave a Reply 0

Your email address will not be published. Required fields are marked *