adplus-dvertising
frame-decoration

Question

Which of the field must be 1 using an authenticator in the following code?
EncryptByKey ( key_GUID , { 'cleartext' | @cleartext }
    [, { add_authenticator | @add_authenticator }
     , { authenticator | @authenticator } ] )

a.

@add_authenticator

b.

@cleartext

c.

key_GUID

d.

None of the mentioned

Posted under SQL Server

Answer: (a).@add_authenticator

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the field must be 1 using an authenticator in the following code?

Similar Questions

Discover Related MCQs

Q. Point out the wrong statement.

Q. Which of the following script creates master key?

Q. Which of the statement is used to create a new certificate with a valid subject in SQL Server?

Q. Point out the wrong statement.

Q. Like data compression, TDE database encryption is performed at the ______ level.

Q. Which of the following is valid code to backup a certificate?

Q. Which of the following catalog view is used to monitor TDE?

Q. ___________ encryption was introduced in SQL Server 2005 and is available in all editions of SQL Server.

Q. Which of the following functions decrypts data by using a symmetric key?

Q. Which of the following condition in the where clause will return the login identification name of the user?

Q. Point out the correct statement.

Q. View that contains the list of all the security labels present in the database are __________

Q. Which of the following retrieves a SecurityLabel instance describing the subject label of the current database user?

Q. Point out the wrong statement.

Q. What will the fn_Dominates return if A dominates B where A and B both are security label?

Q. The major components of the Label Security Toolkit are _____________

Q. Return type of CertName field in vwVisibleLabels is __________

Q. Which of the following will not return user name of the current session?

Q. Grant ________ permission on the stored procedures to database roles for implementing call level security.