You plan to deploy SQL Server 2012. You identify the following security requirements for the deployment:
Users must be prevented from intercepting and reading the T-SQL statements sent from the clients to the
database engine.
All database files and log files must be encrypted if the files are moved to another disk on another server.
You need to identify which feature meets each security requirement. The solution must minimize processor
overhead. Which features should you identify? To answer, drag the appropriate feature to the correct
requirement in the answer area.
Select and Place:
Explanation:
http://msdn.microsoft.com/en-us/library/windows/desktop/aa364223.aspx
http://msdn.microsoft.com/en-us/library/bb510667.aspx
http://msdn.microsoft.com/en-us/library/bb879935.aspx
http://msdn.microsoft.com/en-us/library/bb934049.aspx
http://msdn.microsoft.com/en-us/library/windows/hardware/gg487306.aspx
http://msdn.microsoft.com/en-us/library/ff773063.aspx