Deck 6: SQL Server Security

Full screen (f)
exit full mode
Question
Encryption does not prevent data loss, but it can lessen the impact of data loss.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a reason that Windows authentication is considered more secure than combining Windows and SQL Server authentication.

A)multiple sets of credentials are not required
B)Windows authentication uses the MS-CHAPv2 protocol
C)SQL Server allows for password complexity
D)Windows has a limited range of password policies
Question
IPSec uses certificates for identity verification.
Question
Which default account is enabled when SQL Server authentication is enabled using mixed mode?

A)admin
B)root
C)sa
D)superuser
Question
All server-level principals have access to the SQL databases.
Question
Which predefined server-level role allows a user to create or alter any database?

A)security admin
B)dbcreator
C)database auditor
D)sysroot
Question
Which of the following is NOT an action against a database object that requires a permission?

A)connecting to a database
B)logging in to SQL Server
C)executing a procedure
D)modifying a view
Question
Which of the following is another term for the layered security model?

A)extreme defenses
B)defense-in-depth
C)security-immersion
D)total-security-strategy
Question
Which of the following is true about database access control?

A)to access a database the SQL Server login must be mapped to a database user
B)members of the sysadmin server role don't have access to databases by default
C)once a user logs in to the SQL Server, they have automatic access to underlying database objects
D)the database user login name must be different from the server login name
Question
Which action does a user perform that requires the user to provide credentials?

A)decryption of data
B)system logon
C)reading a data record
D)shutting down a system
Question
Which method of securing client/server connections used by SQL Server 2012 requires implementing a policy on the server and client computers?

A)SSL
B)PPTP
C)IPSec
D)L2TP
Question
Which of the following is a method to secure client/server connections that uses certificates for identification?

A)IPSec
B)PPTP
C)MS-CHAPv2
D)SSL
Question
AES is a block cipher that translates fixed-size blocks of unencrypted data into corresponding fixed-sized blocks of encrypted data.
Question
Which of the following is true about database permissions?

A)connecting to a database does not require permissions as long as the user is logged on to the server
B)permissions can only be granted to the database as a whole
C)permissions can be granted on a schema
D)tables are securables that group together a collection of objects
Question
Which of the following is an authentication mode supported by SQL Server 2012?

A)Server-instance authentication
B)System level authentication
C)Hybrid authentication mode
D)Mixed authentication mode
Question
What should you reduce in order to limit the number of security vulnerabilities in a system?

A)password complexity
B)the number of logins
C)surface area
D)antivirus programs
Question
Which of the following is NOT a type of security principal that may request access to a SQL server instance?

A)Windows contact
B)Windows account
C)Windows group
D)SQL Server Login
Question
Which environments must use SQL Server authentication because Windows authentication cannot be used?

A)Active Directory domains
B)Windows-only networks
C)Web applications
D)multi-domain forests
Question
Which term is best described as a way to group together users for the purposes of managing database permissions?

A)schema
B)role
C)right
D)principal
Question
Security principals can be either users or groups.
Question
What happens when a users requests access to a SQL Server using Windows authentication?
Question
How is authentication performed using security principals?
Question
Which type of encryption uses public and private keys?

A)symmetric
B)point-to-point
C)asymmetric
D)digital
Question
_____________ is designed to render data in the physical data and log files unusable should someone gain unauthorized access.
Question
Which of the following is true about asymmetric encryption algorithms?

A)they use a secret key
B)the same key is used to encrypt and encrypt data
C)the performance is slower than with symmetric algorithms
D)it is the most commonly used form of encryption
Question
What is a symmetric key and what are its advantages and disadvantages?
Question
What is the IPSec protocol and under what conditions is its use most appropriate?
Question
What is the Service Master Key?
Question
How do secure Internet transactions use encryption keys?
Question
The default role assigned to every login is the __________ role.
Question
List and describe three fixed roles that are associated with performing administrative functions on the server.
Question
What SQL function should you use to encrypt an individual data item in a column that lets you choose the encryption algorithm?

A)EncryptByPhrase
B)EncryptColumn
C)EncryptSymmetric
D)EncryptByKey
Question
Which encryption algorithm is a block cipher that uses a 128-bit block cipher with varying key sizes?

A)AES
B)3-key Triple DES
C)DPAPI
D)EncryptByPhrase
Question
How is a user granted permission to access a database?
Question
What are two reasons that Windows authentication is considered to be the most secure method of authenticating with SQL Server?
Question
SQL Server can generate a self-signed ______________ to encrypt data.
Question
Use of a third-party product can improve the ________ management function that encompasses their generation, storage, distribution and retrieval.
Question
Which of the following is NOT true about roles?

A)there are several predefined database level roles
B)the scope of a role is confined to each table in a database
C)a single user can be assigned to a role
D)roles are used to manage permissions for groups of users
Question
What is a permission? Provide examples of permissions for database access.
Question
__________ authentication mode includes both Windows and SQL Server authentication.
Question
Match between columns
a type of key that uses the same key to encrypt and decrypt data
database master key
a type of key that uses the same key to encrypt and decrypt data
access token
a type of key that uses the same key to encrypt and decrypt data
trusted connection
a type of key that uses the same key to encrypt and decrypt data
certificate authority
a type of key that uses the same key to encrypt and decrypt data
securable
a type of key that uses the same key to encrypt and decrypt data
encryption
a type of key that uses the same key to encrypt and decrypt data
symmetric key
a type of key that uses the same key to encrypt and decrypt data
cipher
a type of key that uses the same key to encrypt and decrypt data
authenticator
a type of key that uses the same key to encrypt and decrypt data
key
the various objects in a database and a SQL Server instance that can be secured
database master key
the various objects in a database and a SQL Server instance that can be secured
access token
the various objects in a database and a SQL Server instance that can be secured
trusted connection
the various objects in a database and a SQL Server instance that can be secured
certificate authority
the various objects in a database and a SQL Server instance that can be secured
securable
the various objects in a database and a SQL Server instance that can be secured
encryption
the various objects in a database and a SQL Server instance that can be secured
symmetric key
the various objects in a database and a SQL Server instance that can be secured
cipher
the various objects in a database and a SQL Server instance that can be secured
authenticator
the various objects in a database and a SQL Server instance that can be secured
key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
database master key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
access token
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
trusted connection
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
certificate authority
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
securable
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
encryption
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
symmetric key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
cipher
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
authenticator
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
key
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
database master key
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
access token
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
trusted connection
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
certificate authority
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
securable
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
encryption
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
symmetric key
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
cipher
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
authenticator
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
key
it is established using Windows authentication
database master key
it is established using Windows authentication
access token
it is established using Windows authentication
trusted connection
it is established using Windows authentication
certificate authority
it is established using Windows authentication
securable
it is established using Windows authentication
encryption
it is established using Windows authentication
symmetric key
it is established using Windows authentication
cipher
it is established using Windows authentication
authenticator
it is established using Windows authentication
key
a user identifier from the Windows operating system that is created when the user initially logs on
database master key
a user identifier from the Windows operating system that is created when the user initially logs on
access token
a user identifier from the Windows operating system that is created when the user initially logs on
trusted connection
a user identifier from the Windows operating system that is created when the user initially logs on
certificate authority
a user identifier from the Windows operating system that is created when the user initially logs on
securable
a user identifier from the Windows operating system that is created when the user initially logs on
encryption
a user identifier from the Windows operating system that is created when the user initially logs on
symmetric key
a user identifier from the Windows operating system that is created when the user initially logs on
cipher
a user identifier from the Windows operating system that is created when the user initially logs on
authenticator
a user identifier from the Windows operating system that is created when the user initially logs on
key
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
database master key
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
access token
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
trusted connection
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
certificate authority
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
securable
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
encryption
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
symmetric key
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
cipher
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
authenticator
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
key
an external entity that issues and verifies digital certificates used for encrypting data
database master key
an external entity that issues and verifies digital certificates used for encrypting data
access token
an external entity that issues and verifies digital certificates used for encrypting data
trusted connection
an external entity that issues and verifies digital certificates used for encrypting data
certificate authority
an external entity that issues and verifies digital certificates used for encrypting data
securable
an external entity that issues and verifies digital certificates used for encrypting data
encryption
an external entity that issues and verifies digital certificates used for encrypting data
symmetric key
an external entity that issues and verifies digital certificates used for encrypting data
cipher
an external entity that issues and verifies digital certificates used for encrypting data
authenticator
an external entity that issues and verifies digital certificates used for encrypting data
key
a parameter used in conjunction with a cryptographic algorithm to encrypt data
database master key
a parameter used in conjunction with a cryptographic algorithm to encrypt data
access token
a parameter used in conjunction with a cryptographic algorithm to encrypt data
trusted connection
a parameter used in conjunction with a cryptographic algorithm to encrypt data
certificate authority
a parameter used in conjunction with a cryptographic algorithm to encrypt data
securable
a parameter used in conjunction with a cryptographic algorithm to encrypt data
encryption
a parameter used in conjunction with a cryptographic algorithm to encrypt data
symmetric key
a parameter used in conjunction with a cryptographic algorithm to encrypt data
cipher
a parameter used in conjunction with a cryptographic algorithm to encrypt data
authenticator
a parameter used in conjunction with a cryptographic algorithm to encrypt data
key
a cryptographic algorithm used in conjunction with a key to encrypt data
database master key
a cryptographic algorithm used in conjunction with a key to encrypt data
access token
a cryptographic algorithm used in conjunction with a key to encrypt data
trusted connection
a cryptographic algorithm used in conjunction with a key to encrypt data
certificate authority
a cryptographic algorithm used in conjunction with a key to encrypt data
securable
a cryptographic algorithm used in conjunction with a key to encrypt data
encryption
a cryptographic algorithm used in conjunction with a key to encrypt data
symmetric key
a cryptographic algorithm used in conjunction with a key to encrypt data
cipher
a cryptographic algorithm used in conjunction with a key to encrypt data
authenticator
a cryptographic algorithm used in conjunction with a key to encrypt data
key
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: SQL Server Security
1
Encryption does not prevent data loss, but it can lessen the impact of data loss.
True
2
Which of the following is a reason that Windows authentication is considered more secure than combining Windows and SQL Server authentication.

A)multiple sets of credentials are not required
B)Windows authentication uses the MS-CHAPv2 protocol
C)SQL Server allows for password complexity
D)Windows has a limited range of password policies
A
3
IPSec uses certificates for identity verification.
False
4
Which default account is enabled when SQL Server authentication is enabled using mixed mode?

A)admin
B)root
C)sa
D)superuser
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
All server-level principals have access to the SQL databases.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
Which predefined server-level role allows a user to create or alter any database?

A)security admin
B)dbcreator
C)database auditor
D)sysroot
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is NOT an action against a database object that requires a permission?

A)connecting to a database
B)logging in to SQL Server
C)executing a procedure
D)modifying a view
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is another term for the layered security model?

A)extreme defenses
B)defense-in-depth
C)security-immersion
D)total-security-strategy
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is true about database access control?

A)to access a database the SQL Server login must be mapped to a database user
B)members of the sysadmin server role don't have access to databases by default
C)once a user logs in to the SQL Server, they have automatic access to underlying database objects
D)the database user login name must be different from the server login name
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Which action does a user perform that requires the user to provide credentials?

A)decryption of data
B)system logon
C)reading a data record
D)shutting down a system
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
Which method of securing client/server connections used by SQL Server 2012 requires implementing a policy on the server and client computers?

A)SSL
B)PPTP
C)IPSec
D)L2TP
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is a method to secure client/server connections that uses certificates for identification?

A)IPSec
B)PPTP
C)MS-CHAPv2
D)SSL
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
AES is a block cipher that translates fixed-size blocks of unencrypted data into corresponding fixed-sized blocks of encrypted data.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true about database permissions?

A)connecting to a database does not require permissions as long as the user is logged on to the server
B)permissions can only be granted to the database as a whole
C)permissions can be granted on a schema
D)tables are securables that group together a collection of objects
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is an authentication mode supported by SQL Server 2012?

A)Server-instance authentication
B)System level authentication
C)Hybrid authentication mode
D)Mixed authentication mode
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
What should you reduce in order to limit the number of security vulnerabilities in a system?

A)password complexity
B)the number of logins
C)surface area
D)antivirus programs
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT a type of security principal that may request access to a SQL server instance?

A)Windows contact
B)Windows account
C)Windows group
D)SQL Server Login
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
Which environments must use SQL Server authentication because Windows authentication cannot be used?

A)Active Directory domains
B)Windows-only networks
C)Web applications
D)multi-domain forests
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Which term is best described as a way to group together users for the purposes of managing database permissions?

A)schema
B)role
C)right
D)principal
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
Security principals can be either users or groups.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
What happens when a users requests access to a SQL Server using Windows authentication?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
How is authentication performed using security principals?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
Which type of encryption uses public and private keys?

A)symmetric
B)point-to-point
C)asymmetric
D)digital
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
_____________ is designed to render data in the physical data and log files unusable should someone gain unauthorized access.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is true about asymmetric encryption algorithms?

A)they use a secret key
B)the same key is used to encrypt and encrypt data
C)the performance is slower than with symmetric algorithms
D)it is the most commonly used form of encryption
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
What is a symmetric key and what are its advantages and disadvantages?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What is the IPSec protocol and under what conditions is its use most appropriate?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
What is the Service Master Key?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
How do secure Internet transactions use encryption keys?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
The default role assigned to every login is the __________ role.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
List and describe three fixed roles that are associated with performing administrative functions on the server.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
What SQL function should you use to encrypt an individual data item in a column that lets you choose the encryption algorithm?

A)EncryptByPhrase
B)EncryptColumn
C)EncryptSymmetric
D)EncryptByKey
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
Which encryption algorithm is a block cipher that uses a 128-bit block cipher with varying key sizes?

A)AES
B)3-key Triple DES
C)DPAPI
D)EncryptByPhrase
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
How is a user granted permission to access a database?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
What are two reasons that Windows authentication is considered to be the most secure method of authenticating with SQL Server?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
SQL Server can generate a self-signed ______________ to encrypt data.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
Use of a third-party product can improve the ________ management function that encompasses their generation, storage, distribution and retrieval.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is NOT true about roles?

A)there are several predefined database level roles
B)the scope of a role is confined to each table in a database
C)a single user can be assigned to a role
D)roles are used to manage permissions for groups of users
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
What is a permission? Provide examples of permissions for database access.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
__________ authentication mode includes both Windows and SQL Server authentication.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
a type of key that uses the same key to encrypt and decrypt data
database master key
a type of key that uses the same key to encrypt and decrypt data
access token
a type of key that uses the same key to encrypt and decrypt data
trusted connection
a type of key that uses the same key to encrypt and decrypt data
certificate authority
a type of key that uses the same key to encrypt and decrypt data
securable
a type of key that uses the same key to encrypt and decrypt data
encryption
a type of key that uses the same key to encrypt and decrypt data
symmetric key
a type of key that uses the same key to encrypt and decrypt data
cipher
a type of key that uses the same key to encrypt and decrypt data
authenticator
a type of key that uses the same key to encrypt and decrypt data
key
the various objects in a database and a SQL Server instance that can be secured
database master key
the various objects in a database and a SQL Server instance that can be secured
access token
the various objects in a database and a SQL Server instance that can be secured
trusted connection
the various objects in a database and a SQL Server instance that can be secured
certificate authority
the various objects in a database and a SQL Server instance that can be secured
securable
the various objects in a database and a SQL Server instance that can be secured
encryption
the various objects in a database and a SQL Server instance that can be secured
symmetric key
the various objects in a database and a SQL Server instance that can be secured
cipher
the various objects in a database and a SQL Server instance that can be secured
authenticator
the various objects in a database and a SQL Server instance that can be secured
key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
database master key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
access token
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
trusted connection
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
certificate authority
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
securable
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
encryption
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
symmetric key
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
cipher
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
authenticator
a column value that is unique to the row and is used in conjunction with the key to secure the data being encrypted
key
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
database master key
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
access token
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
trusted connection
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
certificate authority
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
securable
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
encryption
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
symmetric key
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
cipher
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
authenticator
a symmetric key used to protect asymmetric private keys and certificates that are stored in the database
key
it is established using Windows authentication
database master key
it is established using Windows authentication
access token
it is established using Windows authentication
trusted connection
it is established using Windows authentication
certificate authority
it is established using Windows authentication
securable
it is established using Windows authentication
encryption
it is established using Windows authentication
symmetric key
it is established using Windows authentication
cipher
it is established using Windows authentication
authenticator
it is established using Windows authentication
key
a user identifier from the Windows operating system that is created when the user initially logs on
database master key
a user identifier from the Windows operating system that is created when the user initially logs on
access token
a user identifier from the Windows operating system that is created when the user initially logs on
trusted connection
a user identifier from the Windows operating system that is created when the user initially logs on
certificate authority
a user identifier from the Windows operating system that is created when the user initially logs on
securable
a user identifier from the Windows operating system that is created when the user initially logs on
encryption
a user identifier from the Windows operating system that is created when the user initially logs on
symmetric key
a user identifier from the Windows operating system that is created when the user initially logs on
cipher
a user identifier from the Windows operating system that is created when the user initially logs on
authenticator
a user identifier from the Windows operating system that is created when the user initially logs on
key
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
database master key
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
access token
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
trusted connection
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
certificate authority
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
securable
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
encryption
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
symmetric key
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
cipher
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
authenticator
a reversible process involving the use of a key or passcode and an algorithm to convert data into an unreadable form
key
an external entity that issues and verifies digital certificates used for encrypting data
database master key
an external entity that issues and verifies digital certificates used for encrypting data
access token
an external entity that issues and verifies digital certificates used for encrypting data
trusted connection
an external entity that issues and verifies digital certificates used for encrypting data
certificate authority
an external entity that issues and verifies digital certificates used for encrypting data
securable
an external entity that issues and verifies digital certificates used for encrypting data
encryption
an external entity that issues and verifies digital certificates used for encrypting data
symmetric key
an external entity that issues and verifies digital certificates used for encrypting data
cipher
an external entity that issues and verifies digital certificates used for encrypting data
authenticator
an external entity that issues and verifies digital certificates used for encrypting data
key
a parameter used in conjunction with a cryptographic algorithm to encrypt data
database master key
a parameter used in conjunction with a cryptographic algorithm to encrypt data
access token
a parameter used in conjunction with a cryptographic algorithm to encrypt data
trusted connection
a parameter used in conjunction with a cryptographic algorithm to encrypt data
certificate authority
a parameter used in conjunction with a cryptographic algorithm to encrypt data
securable
a parameter used in conjunction with a cryptographic algorithm to encrypt data
encryption
a parameter used in conjunction with a cryptographic algorithm to encrypt data
symmetric key
a parameter used in conjunction with a cryptographic algorithm to encrypt data
cipher
a parameter used in conjunction with a cryptographic algorithm to encrypt data
authenticator
a parameter used in conjunction with a cryptographic algorithm to encrypt data
key
a cryptographic algorithm used in conjunction with a key to encrypt data
database master key
a cryptographic algorithm used in conjunction with a key to encrypt data
access token
a cryptographic algorithm used in conjunction with a key to encrypt data
trusted connection
a cryptographic algorithm used in conjunction with a key to encrypt data
certificate authority
a cryptographic algorithm used in conjunction with a key to encrypt data
securable
a cryptographic algorithm used in conjunction with a key to encrypt data
encryption
a cryptographic algorithm used in conjunction with a key to encrypt data
symmetric key
a cryptographic algorithm used in conjunction with a key to encrypt data
cipher
a cryptographic algorithm used in conjunction with a key to encrypt data
authenticator
a cryptographic algorithm used in conjunction with a key to encrypt data
key
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 41 flashcards in this deck.