Administrating a Database Lesson 7 Flashcards

(38 cards)

1
Q

Security, like every other aspect of the database
project, must be carefully designed, implemented,
and tested. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is used to grant an entity (such as a
user access) to an object (such as another user or
a database).

A

permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In SQL Server, the security model is based on what
is referred to as ___

A

“securables”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the process by which an
individual’s access to a computer system is
controlled by identification of that user using
credentials provided by that user.

A

login or logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most common login method is using a

A

username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a logical representation of
a person within a electronic system.

A

user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security System that requires two distinct forms of identification in order to access something

A

Two-Factor Authentication (2FA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three different methods for which a user can
be initially identified include:

A

– Windows user login
– Membership in a Windows user group
– SQL Server-specific login (if the server uses
mixed-mode security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is important to remember that at the SQL Server
level, where the database resides, users are known
by their ____. This can be a SQL Server login,
Windows domain, or a username login choice.

A

login name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Even though a user may belong to a fixed
database role and have certain
administrative level permissions, a user still
cannot access the data without first being
granted permission to the database object
itself (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All users are automatically members of the
public standard database role. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

means the user can access
the object

A

–Grant permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

overrides a grant
permission.

A

Deny permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

removes the permission
assigned, regardless of whether it’s deny or
grant.

A

–Revoke permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There are three different types of accounts
which are available for the SQL Server
service account:

A

– Local user account
– Local system account
–Domain user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the act of establishing or
confirming a user or system identity.

A

Authentication

17
Q

is superior to
mixed mode because users don’t need to
learn yet another password and because it
leverages the security design of the network

A

Windows Authentication mode

18
Q

Associated with SQL authentication is the ____, the built-in SQL administrator account
associated with SQL authentication.

A

sa account or system administrator account

18
Q

A ___ and related passwords
are defined on the SQL server and are not related
to ___.

A

SQL Server login account, Active Directory or Windows accounts

19
Q

also support mixed mode, which
allows you to connect to the SQL server using
Windows authentication or SQL Server
authentication.

20
Q

SQL Server includes fixed, predefined server roles:

A

– Bulkadmin
– Dbcreator
– Diskadmin
– Processadmin
– Securityadmin
– Serveradmin
– Setupadmin
– Sysadmin

21
Q

Any user who wishes to access a database but has
not been declared a user within the database will
automatically be granted the user privileges of the __

22
Q

is not actually created
when a database is created. It must be specifically
added in through the SQL Server Management
Studio interface or through a Transact-SQL
statement.

A

The guest user account

23
Q

are the permissions that allow
a user to act on the database objects (such as tables, stored procedures, and views):
– Select
– Insert
– Update
– Delete
– DRI (References)
– Execute

A

Object permissions

24
In SQL Server databases, users often access data by going through one or several objects. (True or False)
True
25
apply to views, stored procedures, and user-defined functions.
Ownership chains
26
If the ownership chain is broken (meaning there’s a different owner between an object and the next lower object), SQL Server checks the user’s permission for every object accessed. (True or False)
True
27
The purpose of a database ___ is so that you have something to restore if data is lost during a business’s daily routine.
backup
28
A user may accidentally delete a table or a database administrator may need to ___ multiple tables on different servers in order to combine them into one database.
restore
29
Types of Backups
Full backup Differential backup: Incremental backup
30
contains all the data in a specific database or set of filegroups or files, and also enough log to allow for recovering that data.
Full backup
31
contains only the data that has changed since the differential base.
Differential backup
32
is based on the last backup of the data.
Incremental backup
33
are designed to provide more flexibility for backing up databases that contain some read-only filegroups under the simple recovery model.
Partial and differential partial backups
34
The files in a database can be backed up and restored ___
individually
35
Using___ can increase the speed of recovery by letting you restore only damaged files without requiring you to restore the rest of the database.
file backups
36
SQL Server backups are created on backup devices, such as
disk files or tape media
37
You can append new backups to any existing backups on a device or overwrite any existing backups (True or False)
true