| |||||
|
Microsoft SQL Server FAQs Part: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 (Continued from previous part...) What algorithm is used to encrypt the Database Master Key when it is created?
Answer Which protocols support Kerberos authentication on SQL Server 2005?
Answer You have a few new SQL Server 2005 server instances and you want to be sure that SQL authenticated logins must abide by the password policy. On this platforms can you enforce this?
Answer You are setting up a native XML web service on your SQL Server 2005 to respond to inventory requests. How can you you be sure that a SOAP queries that are looking for a WSDL response will be provided?
Answer Where can you view the list of server-scoped DDL triggers?
Answer You want to be sure that your reporting solutions using a database snapshot are properly protected from disaster. How can you back up your database snapshots?
Answer (Continued on next part...)
Part: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 |
||||