exam questions

Exam 70-764 All Questions

View all questions & answers for the 70-764 exam

Exam 70-764 topic 1 question 190 discussion

Actual exam question from Microsoft's 70-764
Question #: 190
Topic #: 1
[All 70-764 Questions]

Overview -
Application Overview -
Contoso, Ltd., is the developer of an enterprise resource planning (ERP) application.
Contoso is designing a new version of the ERP application. The previous version of the ERP application used SQL Server 2008 R2.
The new version will use SQL Server 2014.
The ERP application relies on an import process to load supplier data. The import process updates thousands of rows simultaneously, requires exclusive access to the database, and runs daily.
You receive several support calls reporting unexpected behavior in the ERP application. After analyzing the calls, you conclude that users made changes directly to the tables in the database.

Tables -
The current database schema contains a table named OrderDetails.
The OrderDetails table contains information about the items sold for each purchase order. OrderDetails stores the product ID, quantities, and discounts applied to each product in a purchase order.
The product price is stored in a table named Products. The Products table was defined by using the SQL_Latin1_General_CP1_CI_AS collation.
A column named ProductName was created by using the varchar data type. The database contains a table named Orders.
Orders contains all of the purchase orders from the last 12 months. Purchase orders that are older than 12 months are stored in a table named OrdersOld.
The previous version of the ERP application relied on table-level security.

Stored Procedures -
The current version of the database contains stored procedures that change two tables. The following shows the relevant portions of the two stored procedures:


Customer Problems -

Installation Issues -
The current version of the ERP application requires that several SQL Server logins be set up to function correctly. Most customers set up the ERP application in multiple locations and must create logins multiple times.

Index Fragmentation Issues -
Customers discover that clustered indexes often are fragmented. To resolve this issue, the customers defragment the indexes more frequently. All of the tables affected by fragmentation have the following columns that are used as the clustered index key:


Backup Issues -
Customers who have large amounts of historical purchase order data report that backup time is unacceptable.

Search Issues -
Users report that when they search product names, the search results exclude product names that contain accents, unless the search string includes the accent.

Missing Data Issues -
Customers report that when they make a price change in the Products table, they cannot retrieve the price that the item was sold for in previous orders.

Query Performance Issues -
Customers report that query performance degrades very quickly. Additionally, the customers report that users cannot run queries when SQL Server runs maintenance tasks. Import Issues During the monthly import process, database administrators receive many supports call from users who report that they cannot access the supplier data. The database administrators want to reduce the amount of time required to import the data.

Design Requirements -

File Storage Requirements -
The ERP database stores scanned documents that are larger than 2 MB. These files must only be accessed through the ERP application. File access must have the best possible read and write performance.

Data Recovery Requirements -
If the import process fails, the database must be returned to its prior state immediately.

Security Requirements -
You must provide users with the ability to execute functions within the ERP application, without having direct access to the underlying tables.

Concurrency Requirements -
You must reduce the likelihood of deadlocks occurring when Sales.Prod and Sales.Proc2 execute.
You need to recommend a solution that addresses the security requirement. What should you recommend?

  • A. Revoke user permissions on the tables. Create stored procedures that manipulate data. Grant the users the EXECUTE permission on the stored procedures.
  • B. Grant the users the SELECT permission on the tables. Create views that retrieve data from the tables. Grant the users the SELECT permission on the views.
  • C. Deny the users SELECT permission on the tables. Create views that retrieve data from the tables. Grant the users the SELECT permission on the views.
  • D. Deny the users the SELECT permission on the tables. Create stored procedures that manipulate data. Grant the users the EXECUTE permission on the
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
- Security Requirements
You must provide users with the ability to execute functions within the ERP application, without having direct access to the underlying tables.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
huzein
4 years, 7 months ago
Views are not functions. So the answers are bad formulated. Assuming that with views the funkctions are meant, then C is correct.
upvoted 1 times
...
DudeHere
5 years, 3 months ago
Answer is C. chh2. Functions by nature CANNOT manipulate data.
upvoted 2 times
...
chh2
5 years, 3 months ago
I tested it with a view (view1 = select * from table1). The user rights: DENY SELECT on table1, GRANT SELECT on view1. The user was not able to do "select * from table1" but "select * from view1" worked. My problem with this quest is: how do you know if it is sufficient to retrieve data and no need to manipulate data? All I can find in the question is "You must provide users with the ability to execute functions within the ERP application [...]".
upvoted 1 times
...
mrn0107
5 years, 3 months ago
I beleve the answer is B. if you deny select permisionss that will override select rights on view. It is not hard to test this.
upvoted 2 times
...
KwangC
5 years, 4 months ago
D is correct. Views also require access to the underlying tables.
upvoted 2 times
TheSwedishGuy
5 years, 4 months ago
Using views does not require permissions on the underlying table. Only permissions on the view is enough.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...