70-764 Administering a SQL Database Infrastructure Flashcards

1
Q

What is one of the most important assets to an organization?

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 3 ways can you protect your organization’s data?

A

protect sensitive data through encryption, to control data access, and importantly to audit data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 4 forms does data loss come in?

A

hardware failure, database corruption, malicious activity, and user error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the is a critical capability in any modern database engine?

A

The ability to encrypt data at the column level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When did Column-level encryption become available?

A

Column-level encryption has been supported since SQL Server 2005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are layers of encryption protected?

A

Layers of encryption are protected by preceding layers of encryption that can use asymmetric keys, certificates, and symmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Key Management

A
SQL Server EKM enables the encryption keys that
protect the database files to be stored outside of the SQL Server environment such as a smartcard, a USB device, and the EKM module of Hardware Security Module (HSM). It also helps secure the SQL Server instance from database administrators because they
will not necessarily have access to the external EKM/HSM module.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service Master Key

A

The Service Master Key (SMK) is the root of the database engine’s encryption hierarchy and is generated automatically the first time it is needed to encrypt another key. By default, the SMK is encrypted using the Windows data protection API (DPAPI) at the operating system level, which uses the local machine key. The SMK can only be opened by the Windows service account that created it, or by a principal that knows the service account name and its password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Database Master Key

A

The Database Master Key (DMK) is a symmetric key used to protect the private keys of certificates and asymmetric keys that are present in the database.
When created it is encrypted using AES_256 and a password you provide. Query the [sys].[symmetric_keys] catalog view to get information about the DMK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric Key

A

An asymmetric key consists of a private and corresponding public key. Asymmetric encryption is computationally more expensive, but more secure than
symmetric encryption. You can use an asymmetric key to encrypt a symmetric key within a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric Key

A

A symmetric key is a single key that uses encryption. Symmetric encryption is generally used over asymmetric encryption because it is faster and less computationally expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Certificate

A

Certificates are a digitally signed security object that contain a public (and ptionally a private) key for SQL Server, which can generate certificates. You can also
use externally generated certificates, and just like with asymmetric keys, certificates cane used in asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can encrypted data be compressed?

A

Encrypted data cannot be compressed, but compressed data can be encrypted. When using compression, you should compress data before encrypting it for optimal results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does stronger encryption affect processor resources?

A

Stronger encryption algorithms consume more processor resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can the database engine take advantage of hardware acceleration?

A

Starting with SQL Server 2016 the database engine can take advantage of hardware acceleration, using Intel AES-NI, when performing encryption/decryption tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which algorithms does SQL Server 2016 support?

A

Starting with SQL Server 2016 the only algorithms that are supported with database compatibility 130 or above are AES-128, AES_192, and AES_256.

17
Q

How are older encryption algorithms supported?

A

Older encryption algorithms, including DES, Triple DES, TRIPLE_DES_3KEY, RC2, RC4, 128-bit RC4, and DESX are only supported under a database compatibility level of 120 or lower.

18
Q

Why should you not use the older encryption algorithms?

A

You should not use these older, unsupported encryption algorithms because they are
fundamentally less secure.

19
Q

How should you encrypt a lot of data?

A

If you are encrypting a lot of data it is recommended that you encrypt the data using a symmetric key, and then encrypt the symmetric key with an asymmetric key.

20
Q

What happens to the indexes on a column once you encrypt the column?

A

For all intents and purposes, once you encrypt a column, indexes on that column typically become useless for searching. Consider removing the indexes. In some cases you can add a helper column to the table, such as in the example of the last 4 digits of a
credit card.

21
Q

Does the DBA still have control over the SQL Server environment after data has been encrypted?

A

The database administrator generally still has complete control over the SQL Server environment and consequently the ability to potentially view the encrypted data.

22
Q

In order to encrypt data what are some tasks you can perform?

A
  1. Create DMK
  2. Create a certificate that will be protected by the DMK
  3. Create Symmetric Key using the certificate that will be used by column encryption
  4. Encrypt the column using the Symmetric Key