Deck 6: SQL Server Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
Play
Full screen (f)
Deck 6: SQL Server Security
1
Encryption does not prevent data loss, but it can lessen the impact of data loss.
True
2
Which of the following is a reason that Windows authentication is considered more secure than combining Windows and SQL Server authentication.
A)multiple sets of credentials are not required
B)Windows authentication uses the MS-CHAPv2 protocol
C)SQL Server allows for password complexity
D)Windows has a limited range of password policies
A)multiple sets of credentials are not required
B)Windows authentication uses the MS-CHAPv2 protocol
C)SQL Server allows for password complexity
D)Windows has a limited range of password policies
A
3
IPSec uses certificates for identity verification.
False
4
Which default account is enabled when SQL Server authentication is enabled using mixed mode?
A)admin
B)root
C)sa
D)superuser
A)admin
B)root
C)sa
D)superuser
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
All server-level principals have access to the SQL databases.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
Which predefined server-level role allows a user to create or alter any database?
A)security admin
B)dbcreator
C)database auditor
D)sysroot
A)security admin
B)dbcreator
C)database auditor
D)sysroot
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is NOT an action against a database object that requires a permission?
A)connecting to a database
B)logging in to SQL Server
C)executing a procedure
D)modifying a view
A)connecting to a database
B)logging in to SQL Server
C)executing a procedure
D)modifying a view
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is another term for the layered security model?
A)extreme defenses
B)defense-in-depth
C)security-immersion
D)total-security-strategy
A)extreme defenses
B)defense-in-depth
C)security-immersion
D)total-security-strategy
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is true about database access control?
A)to access a database the SQL Server login must be mapped to a database user
B)members of the sysadmin server role don't have access to databases by default
C)once a user logs in to the SQL Server, they have automatic access to underlying database objects
D)the database user login name must be different from the server login name
A)to access a database the SQL Server login must be mapped to a database user
B)members of the sysadmin server role don't have access to databases by default
C)once a user logs in to the SQL Server, they have automatic access to underlying database objects
D)the database user login name must be different from the server login name
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Which action does a user perform that requires the user to provide credentials?
A)decryption of data
B)system logon
C)reading a data record
D)shutting down a system
A)decryption of data
B)system logon
C)reading a data record
D)shutting down a system
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
Which method of securing client/server connections used by SQL Server 2012 requires implementing a policy on the server and client computers?
A)SSL
B)PPTP
C)IPSec
D)L2TP
A)SSL
B)PPTP
C)IPSec
D)L2TP
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is a method to secure client/server connections that uses certificates for identification?
A)IPSec
B)PPTP
C)MS-CHAPv2
D)SSL
A)IPSec
B)PPTP
C)MS-CHAPv2
D)SSL
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
AES is a block cipher that translates fixed-size blocks of unencrypted data into corresponding fixed-sized blocks of encrypted data.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true about database permissions?
A)connecting to a database does not require permissions as long as the user is logged on to the server
B)permissions can only be granted to the database as a whole
C)permissions can be granted on a schema
D)tables are securables that group together a collection of objects
A)connecting to a database does not require permissions as long as the user is logged on to the server
B)permissions can only be granted to the database as a whole
C)permissions can be granted on a schema
D)tables are securables that group together a collection of objects
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is an authentication mode supported by SQL Server 2012?
A)Server-instance authentication
B)System level authentication
C)Hybrid authentication mode
D)Mixed authentication mode
A)Server-instance authentication
B)System level authentication
C)Hybrid authentication mode
D)Mixed authentication mode
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
What should you reduce in order to limit the number of security vulnerabilities in a system?
A)password complexity
B)the number of logins
C)surface area
D)antivirus programs
A)password complexity
B)the number of logins
C)surface area
D)antivirus programs
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a type of security principal that may request access to a SQL server instance?
A)Windows contact
B)Windows account
C)Windows group
D)SQL Server Login
A)Windows contact
B)Windows account
C)Windows group
D)SQL Server Login
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
Which environments must use SQL Server authentication because Windows authentication cannot be used?
A)Active Directory domains
B)Windows-only networks
C)Web applications
D)multi-domain forests
A)Active Directory domains
B)Windows-only networks
C)Web applications
D)multi-domain forests
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Which term is best described as a way to group together users for the purposes of managing database permissions?
A)schema
B)role
C)right
D)principal
A)schema
B)role
C)right
D)principal
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
Security principals can be either users or groups.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
What happens when a users requests access to a SQL Server using Windows authentication?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
How is authentication performed using security principals?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
Which type of encryption uses public and private keys?
A)symmetric
B)point-to-point
C)asymmetric
D)digital
A)symmetric
B)point-to-point
C)asymmetric
D)digital
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
_____________ is designed to render data in the physical data and log files unusable should someone gain unauthorized access.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is true about asymmetric encryption algorithms?
A)they use a secret key
B)the same key is used to encrypt and encrypt data
C)the performance is slower than with symmetric algorithms
D)it is the most commonly used form of encryption
A)they use a secret key
B)the same key is used to encrypt and encrypt data
C)the performance is slower than with symmetric algorithms
D)it is the most commonly used form of encryption
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
What is a symmetric key and what are its advantages and disadvantages?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What is the IPSec protocol and under what conditions is its use most appropriate?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
What is the Service Master Key?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
How do secure Internet transactions use encryption keys?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
The default role assigned to every login is the __________ role.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
List and describe three fixed roles that are associated with performing administrative functions on the server.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
What SQL function should you use to encrypt an individual data item in a column that lets you choose the encryption algorithm?
A)EncryptByPhrase
B)EncryptColumn
C)EncryptSymmetric
D)EncryptByKey
A)EncryptByPhrase
B)EncryptColumn
C)EncryptSymmetric
D)EncryptByKey
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
Which encryption algorithm is a block cipher that uses a 128-bit block cipher with varying key sizes?
A)AES
B)3-key Triple DES
C)DPAPI
D)EncryptByPhrase
A)AES
B)3-key Triple DES
C)DPAPI
D)EncryptByPhrase
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
How is a user granted permission to access a database?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
What are two reasons that Windows authentication is considered to be the most secure method of authenticating with SQL Server?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
SQL Server can generate a self-signed ______________ to encrypt data.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
Use of a third-party product can improve the ________ management function that encompasses their generation, storage, distribution and retrieval.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is NOT true about roles?
A)there are several predefined database level roles
B)the scope of a role is confined to each table in a database
C)a single user can be assigned to a role
D)roles are used to manage permissions for groups of users
A)there are several predefined database level roles
B)the scope of a role is confined to each table in a database
C)a single user can be assigned to a role
D)roles are used to manage permissions for groups of users
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
What is a permission? Provide examples of permissions for database access.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
__________ authentication mode includes both Windows and SQL Server authentication.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck