Exam 6: SQL Server Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is true about database access control?

(Multiple Choice)
5.0/5
(47)

What SQL function should you use to encrypt an individual data item in a column that lets you choose the encryption algorithm?

(Multiple Choice)
4.7/5
(35)

Which of the following is an authentication mode supported by SQL Server 2012?

(Multiple Choice)
4.7/5
(43)

Which environments must use SQL Server authentication because Windows authentication cannot be used?

(Multiple Choice)
4.7/5
(37)

Which method of securing client/server connections used by SQL Server 2012 requires implementing a policy on the server and client computers?

(Multiple Choice)
4.8/5
(40)

How is a user granted permission to access a database?

(Essay)
4.8/5
(26)
Matching :
a type of key that uses the same key to encrypt and decrypt data
authenticator
the various objects in a database and a SQL Server instance that can be secured
symmetric key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
encryption
Correct Answer:
Verified
Premises:
Responses:
a type of key that uses the same key to encrypt and decrypt data
authenticator
the various objects in a database and a SQL Server instance that can be secured
symmetric key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
encryption
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
access token
it is established using Windows authentication
cipher
a user identifier from the Windows operating system that is created when the user initially logs on
certificate authority
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
securable
an external entity that issues and verifies digital certificates used for encrypting data
key
a parameter used in conjunction with a cryptographic algorithm to encrypt data
trusted connection
a cryptographic algorithm used in conjunction with a key to encrypt data
database master key
(Matching)
4.8/5
(38)

What is a permission? Provide examples of permissions for database access.

(Essay)
4.7/5
(44)

All server-level principals have access to the SQL databases.

(True/False)
4.8/5
(39)

How do secure Internet transactions use encryption keys?

(Essay)
4.8/5
(32)

How is authentication performed using security principals?

(Essay)
4.8/5
(36)

Which of the following is NOT true about roles?

(Multiple Choice)
4.9/5
(36)

_____________ is designed to render data in the physical data and log files unusable should someone gain unauthorized access.

(Short Answer)
4.9/5
(41)

Which of the following is true about asymmetric encryption algorithms?

(Multiple Choice)
4.8/5
(39)

What should you reduce in order to limit the number of security vulnerabilities in a system?

(Multiple Choice)
4.9/5
(48)

Which action does a user perform that requires the user to provide credentials?

(Multiple Choice)
4.8/5
(37)

What is the IPSec protocol and under what conditions is its use most appropriate?

(Essay)
4.8/5
(38)

What is the Service Master Key?

(Essay)
4.9/5
(38)

What is a symmetric key and what are its advantages and disadvantages?

(Essay)
4.9/5
(44)

__________ authentication mode includes both Windows and SQL Server authentication.

(Short Answer)
4.9/5
(41)
Showing 21 - 40 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)