Question

In: Other

A systems developer needs to provide machine-to-machine interface between an application and a database server in...

A systems developer needs to provide machine-to-machine interface between an application and a database server in the production environment. This interface will exchange data once per day. Which of the following access control account practices would BEST be used in this situation?

A.Establish a privileged interface group and apply read -write permission.to the members of that group.

B.Submit a request for account privilege escalation when the data needs to be transferred

C.Install the application and database on the same server and add the interface to the local administrator group.

D.Use a service account and prohibit users from accessing this account for development work

Solutions

Expert Solution


Regarding the above requirement where the application and database server in the production environment will need to exchange the data once per day, the following access control account practices would be used in this situation:
D.Use a service account and prohibit users from accessing this account for development work.

The service account can be used here to explicitly provide a security context for services. Thus, the service can also access the local and the other resources, prohibiting the other users from accessing the account for the development work. Submitting an Adhoc request daily is not an option as this is needed daily. Also, the servers can be different and cannot be installed in one place. Also, we cannot apply the read-write permission to the members of that group.

 


Related Solutions

Which of the following is a database client software? Microsoft SQL Server 2017 Developer Microsoft SQL...
Which of the following is a database client software? Microsoft SQL Server 2017 Developer Microsoft SQL Server Management Studio Microsoft SQL Server Configuration Manager SQL Server Analysis Service Compared to Data Warehousing approach, the following are disadvantages of query-driven data integration approach, EXCEPT: __________. competition with local processing at source delay in query processing waste of storage space inefficient and potentially expensive for frequent queries What does OLAP stand for? Olympic Linear Algebra Problem On-Line Amazon Platform On-Line Analytical Processing...
Describe some of the differences between database management systems such as Oracle and Access. Provide specific...
Describe some of the differences between database management systems such as Oracle and Access. Provide specific examples of these differences. Create your first SQL Oracle statement after reviewing the resource link above; everyone's SQL query should be different. Provide the SQL code and describe what data is being retrieved and how you would use the information for decision purposes. Identify how you might come up with the same data using other SQL syntax.
Database Systems Example of data set which illustrates the difference between the application-oriented and subject-oriented organization...
Database Systems Example of data set which illustrates the difference between the application-oriented and subject-oriented organization of data?
Explain the key difference between a web service application and a general client/server application
Explain the key difference between a web service application and a general client/server application
a) What are the most important differences between MS Access and as Server database like SQL...
a) What are the most important differences between MS Access and as Server database like SQL Server? b) Does Access have any advantages over SQL Server? c) Describe one or more scenarios where you would recommend upgrading an existing MS Access application to SQL Server. Not the use of SQL Server Express edition.
The operating system provides an interface between application programs and the computer hardware. Discuss the process...
The operating system provides an interface between application programs and the computer hardware. Discuss the process of the execution of any application program on the hardware using all managers of the operating system.
The operating system provides an interface between application programs and the computer hardware. Discuss the process...
The operating system provides an interface between application programs and the computer hardware. Discuss the process of the execution of any application program on the hardware using all managers of the operating system.
The operating system provides an interface between application programs and the computer hardware. Discuss the process...
The operating system provides an interface between application programs and the computer hardware. Discuss the process of the execution of any application program on the hardware using all managers of the operating system.
Referring to the Needs analysis phase which illustrates the application of the systems engineering method to...
Referring to the Needs analysis phase which illustrates the application of the systems engineering method to the needs analysis phase, write a description of the processes of the Operations analysis. Explain the nature and significance of the two processes represented by Analysis projected needs and Define operational approach, and of each internal and external interaction between Operational analysis and Functional analysis. The description should be more detailed than the definition of the step in the subsection describing the systems engineering...
1.      Provide an overview of the systems design phase. 2.      Explain Apple’s view of user interface...
1.      Provide an overview of the systems design phase. 2.      Explain Apple’s view of user interface design, especially for apps. 3.      Describe the habits of successful interface designers. 4.      List the eight main guidelines for user interface design. How would you rank them in order of importance? Explain your answer. 5.      How has input technology changed in recent years? Provide examples of traditional, evolving, and emerging input technology. 6.      What are input masks? What are validation rules? Why are they...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT