Administrating a Database Lesson 7 Flashcards

1
Q

Security, like every other aspect of the database
project, must be carefully designed, implemented,
and tested. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is used to grant an entity (such as a
user access) to an object (such as another user or
a database).

A

permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In SQL Server, the security model is based on what
is referred to as ___

A

“securables”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the process by which an
individual’s access to a computer system is
controlled by identification of that user using
credentials provided by that user.

A

login or logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most common login method is using a

A

username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a logical representation of
a person within a electronic system.

A

user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security System that requires two distinct forms of identification in order to access something

A

Two-Factor Authentication (2FA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three different methods for which a user can
be initially identified include:

A

– Windows user login
– Membership in a Windows user group
– SQL Server-specific login (if the server uses
mixed-mode security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is important to remember that at the SQL Server
level, where the database resides, users are known
by their ____. This can be a SQL Server login,
Windows domain, or a username login choice.

A

login name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Even though a user may belong to a fixed
database role and have certain
administrative level permissions, a user still
cannot access the data without first being
granted permission to the database object
itself (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All users are automatically members of the
public standard database role. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

means the user can access
the object

A

–Grant permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

overrides a grant
permission.

A

Deny permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

removes the permission
assigned, regardless of whether it’s deny or
grant.

A

–Revoke permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There are three different types of accounts
which are available for the SQL Server
service account:

A

– Local user account
– Local system account
–Domain user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the act of establishing or
confirming a user or system identity.

A

Authentication

17
Q

is superior to
mixed mode because users don’t need to
learn yet another password and because it
leverages the security design of the network

A

Windows Authentication mode

18
Q

Associated with SQL authentication is the ____, the built-in SQL administrator account
associated with SQL authentication.

A

sa account or system administrator account

18
Q

A ___ and related passwords
are defined on the SQL server and are not related
to ___.

A

SQL Server login account, Active Directory or Windows accounts

19
Q

also support mixed mode, which
allows you to connect to the SQL server using
Windows authentication or SQL Server
authentication.

A

SQL servers

20
Q

SQL Server includes fixed, predefined server roles:

A

– Bulkadmin
– Dbcreator
– Diskadmin
– Processadmin
– Securityadmin
– Serveradmin
– Setupadmin
– Sysadmin

21
Q

Any user who wishes to access a database but has
not been declared a user within the database will
automatically be granted the user privileges of the __

A

guest user

22
Q

is not actually created
when a database is created. It must be specifically
added in through the SQL Server Management
Studio interface or through a Transact-SQL
statement.

A

The guest user account

23
Q

are the permissions that allow
a user to act on the database objects (such as tables, stored procedures, and views):
– Select
– Insert
– Update
– Delete
– DRI (References)
– Execute

A

Object permissions

24
Q

In SQL Server databases, users often access
data by going through one or several objects. (True or False)

25
Q

apply to views, stored
procedures, and user-defined functions.

A

Ownership chains

26
Q

If the ownership chain is broken (meaning
there’s a different owner between an object
and the next lower object), SQL Server
checks the user’s permission for every
object accessed. (True or False)

27
Q

The purpose of a database ___ is so that you have something to restore if data is lost during a business’s daily routine.

28
Q

A user may accidentally delete a table or a
database administrator may need to ___
multiple tables on different servers in order to
combine them into one database.

29
Q

Types of Backups

A

Full backup
Differential backup:
Incremental backup

30
Q

contains all the data in a
specific database or set of filegroups or files, and
also enough log to allow for recovering that data.

A

Full backup

31
Q

contains only the data that has changed since the
differential base.

A

Differential backup

32
Q

is
based on the last backup of the data.

A

Incremental backup

33
Q

are
designed to provide more flexibility for
backing up databases that contain some
read-only filegroups under the simple
recovery model.

A

Partial and differential partial backups

34
Q

The files in a database can be backed up
and restored ___

A

individually

35
Q

Using___ can increase the speed of recovery by letting you restore only damaged files without requiring you to restore the rest of the database.

A

file backups

36
Q

SQL Server backups are created on backup
devices, such as

A

disk files or tape media

37
Q

You can append new backups to any existing
backups on a device or overwrite any
existing backups (True or False)