Which of the following is a recommendation for installing SQL Server 2012 for optimal logical security?

A. install it on a dedicated server not shared with other services
B. install it on  hardware with appropriate physical access controls
C. install it on a domain controller
D. install it on a server with several other services


Answer: A

Computer Science & Information Technology

You might also like to view...

Mobile device software is closed source and vendor-specific

Indicate whether the statement is true or false

Computer Science & Information Technology

When a data flow diagram (DFD) is exploded, the higher-level diagram is called the child diagram, and the lower-level diagram is referred to as the parent diagram.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

User documentation _____.

A. allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) B. describes a system’s functions and how they are implemented C. contains all the information needed for users to process and distribute online and printed output D. consists of instructions and information for users who will interact with the system

Computer Science & Information Technology

Sara, an employee, visits a website and downloads the PDF application to officially become a member. The network administrator notices large amounts of bandwidth at night from Sara's workstation. Which of the following attacks does this describe?

A. Adware B. Botnets C. Logic bomb D. Spyware

Computer Science & Information Technology