You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. H

admin2009-05-19  41

问题 You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.
You want to minimize changes to your security model and to your database applications. How should you modify the database?

选项 A、Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.
B、Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.
C、Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.
D、Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

答案A

解析 Explanation: SQL Server 2000 allows filegroups other than the primary filegroup to be marked as readonly.
A filegroup that is marked read-only cannot be modified. Tables that must not be modified can be placed on a filegroup that can then be mark as read-only. This will prevents accidental updates.

Incorrect Answers:
B: This solution effectively permits all users to modify any table in the database, as they would all have SELECT permissions to the database.

C: This solution will effectively prevent all users from being able to performing these tasks on all tables in the database as they are denied permissions to run INSERT, UPDATE, or DELETE statements against the database. A better solution would be to apply the deny permissions at the table level of the lookup tables. This would, however, require unnecessary administrative time.

D: Views are virtual tables that are used to filter tables or rows that the users should not have access to, however, if the users have access to the base tables, they can still run INSERT, UPDATE, and DELETE statements against the base table.
转载请注明原文地址:https://jikaoti.com/ti/lwO7FFFM
0

最新回复(0)