What should you do?

You plan to deploy a new application. The application will perform the following operations:
* Create a new database
* Add new logins
* Back up the new database
You need to configure a login to support the deployment of the new application. The solution must ensure that the application uses the most restrictive permissions possible. What should you do?

You plan to deploy a new application. The application will perform the following operations:
* Create a new database
* Add new logins
* Back up the new database
You need to configure a login to support the deployment of the new application. The solution must ensure that the application uses the most restrictive permissions possible. What should you do?

A.
Add the login to the sysadmin server role.

B.
Add the login to the dbcreator and securityadmin server roles.

C.
Add the login to the diskadmin and securityadmin server roles.
Once the database is created, add a user to the db_backupoperator database role.

D.
Add the login to the diskadmin and serveradmin server roles.
Once the database is created, add a user to the db_backupoperator database role.

Explanation:
Members of the securityadmin fixed server role manage logins and their properties. They can GRANT, DENY, and REVOKE server-level permissions. They can also GRANT, DENY, and REVOKE database-level permissions. Additionally, they can reset passwords for SQL Server logins.

The members of dbcreator server role can create, alter, and resize databases.



Leave a Reply 0

Your email address will not be published. Required fields are marked *