Matching
Matching :
Premises:
a type of key that uses the same key to encrypt and decrypt data
the various objects in a database and a SQL Server instance that can be secured
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
it is established using Windows authentication
a user identifier from the Windows operating system that is created when the user initially logs on
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
an external entity that issues and verifies digital certificates used for encrypting data
a parameter used in conjunction with a cryptographic algorithm to encrypt data
a cryptographic algorithm used in conjunction with a key to encrypt data
Responses:
authenticator
symmetric key
encryption
access token
cipher
certificate authority
securable
key
trusted connection
database master key
Correct Answer:
Premises:
Responses:
a type of key that uses the same key to encrypt and decrypt data
the various objects in a database and a SQL Server instance that can be secured
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
it is established using Windows authentication
a user identifier from the Windows operating system that is created when the user initially logs on
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
an external entity that issues and verifies digital certificates used for encrypting data
a parameter used in conjunction with a cryptographic algorithm to encrypt data
a cryptographic algorithm used in conjunction with a key to encrypt data
Premises:
a type of key that uses the same key to encrypt and decrypt data
the various objects in a database and a SQL Server instance that can be secured
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
it is established using Windows authentication
a user identifier from the Windows operating system that is created when the user initially logs on
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
an external entity that issues and verifies digital certificates used for encrypting data
a parameter used in conjunction with a cryptographic algorithm to encrypt data
a cryptographic algorithm used in conjunction with a key to encrypt data
Responses:
Related Questions
Q22: What SQL function should you use to
Q23: Which of the following is an authentication
Q24: Which environments must use SQL Server authentication
Q25: Which method of securing client/server connections used
Q26: How is a user granted permission to
Q28: What is a permission? Provide examples of
Q29: All server-level principals have access to the
Q30: How do secure Internet transactions use encryption
Q31: How is authentication performed using security principals?
Q32: Which of the following is NOT true