Which features should you identify?

DRAG DROP
You plan to deploy SQL Server 2014.
You identify the following security requirements for the deployment:
• Users must be prevented from intercepting and reading the T-SQL statements sent
from the clients to the database engine.
• All database files and log files must be encrypted if the files are moved to another
disk on another server.
You need to identify which feature meets each security requirement. The solution must
minimize processor overhead.
Which features should you identify?
To answer, drag the appropriate feature to the correct requirement in the answer area.

DRAG DROP
You plan to deploy SQL Server 2014.
You identify the following security requirements for the deployment:
• Users must be prevented from intercepting and reading the T-SQL statements sent
from the clients to the database engine.
• All database files and log files must be encrypted if the files are moved to another
disk on another server.
You need to identify which feature meets each security requirement. The solution must
minimize processor overhead.
Which features should you identify?
To answer, drag the appropriate feature to the correct requirement in the answer area.

Answer:

Explanation:

* Secure Sockets Layer (SSL) encryption enables transmitting encrypted data across the
network between an instance of SQL Server and a client application.
* Transparent data encryption (TDE) performs real-time I/O encryption and decryption of the
data and log files.



Leave a Reply 2

Your email address will not be published. Required fields are marked *