D. Option A would not help because it would remove all the sensitive data that would most likely be needed to execute the package. Options C and E would work only for the user that saved the package, and option F does not work for the file system. That leaves you with options B and D, with D being the better choice in this case because you want to encrypt only the sensitive portions of the package.
A, F, H. For checkpoints to work, you need to set a CheckPointFileName property (it's blank by default), set SaveCheckPoint to true, and set CheckPointUsage to IfExists. Combined, they tell SSIS that the checkpoint is enabled and to use the file if it is present on disk. Checkpoint files can be named anything, but an.xml ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.