You work as a database administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of Microsoft SQL Server 2012 in their
environment.
ABC.com has a database that hosts highly classified information. You have received instructions
to configure page level encryption for the database files. Your solution should also allow for
transaction log files to be encrypted.
You start by creating a master key. You then create a certificate in the master database, which is
protected by the master key.
Which of the following actions should you take NEXT?
A.
You should consider creating a database encryption key in the master database.
B.
You should consider creating a database encryption key in the user database.
C.
You should consider creating a symmetric encryption key in the master database.
D.
You should consider creating a symmetric encryption key in the user database.
Explanation: