Administrating a Database Lesson 7 Flashcards
Security, like every other aspect of the database
project, must be carefully designed, implemented,
and tested. (True or False)
True
is used to grant an entity (such as a
user access) to an object (such as another user or
a database).
permission
In SQL Server, the security model is based on what
is referred to as ___
“securables”
is the process by which an
individual’s access to a computer system is
controlled by identification of that user using
credentials provided by that user.
login or logon
The most common login method is using a
username and password
is a logical representation of
a person within a electronic system.
user account
A security System that requires two distinct forms of identification in order to access something
Two-Factor Authentication (2FA)
The three different methods for which a user can
be initially identified include:
– Windows user login
– Membership in a Windows user group
– SQL Server-specific login (if the server uses
mixed-mode security)
It is important to remember that at the SQL Server
level, where the database resides, users are known
by their ____. This can be a SQL Server login,
Windows domain, or a username login choice.
login name
Even though a user may belong to a fixed
database role and have certain
administrative level permissions, a user still
cannot access the data without first being
granted permission to the database object
itself (True or False)
True
All users are automatically members of the
public standard database role. (True or False)
True
means the user can access
the object
–Grant permission
overrides a grant
permission.
Deny permission
removes the permission
assigned, regardless of whether it’s deny or
grant.
–Revoke permission
There are three different types of accounts
which are available for the SQL Server
service account:
– Local user account
– Local system account
–Domain user account
is the act of establishing or
confirming a user or system identity.
Authentication
is superior to
mixed mode because users don’t need to
learn yet another password and because it
leverages the security design of the network
Windows Authentication mode
Associated with SQL authentication is the ____, the built-in SQL administrator account
associated with SQL authentication.
sa account or system administrator account
A ___ and related passwords
are defined on the SQL server and are not related
to ___.
SQL Server login account, Active Directory or Windows accounts
also support mixed mode, which
allows you to connect to the SQL server using
Windows authentication or SQL Server
authentication.
SQL servers
SQL Server includes fixed, predefined server roles:
– Bulkadmin
– Dbcreator
– Diskadmin
– Processadmin
– Securityadmin
– Serveradmin
– Setupadmin
– Sysadmin
Any user who wishes to access a database but has
not been declared a user within the database will
automatically be granted the user privileges of the __
guest user
is not actually created
when a database is created. It must be specifically
added in through the SQL Server Management
Studio interface or through a Transact-SQL
statement.
The guest user account
are the permissions that allow
a user to act on the database objects (such as tables, stored procedures, and views):
– Select
– Insert
– Update
– Delete
– DRI (References)
– Execute
Object permissions
In SQL Server databases, users often access
data by going through one or several objects. (True or False)
True
apply to views, stored
procedures, and user-defined functions.
Ownership chains
If the ownership chain is broken (meaning
there’s a different owner between an object
and the next lower object), SQL Server
checks the user’s permission for every
object accessed. (True or False)
True
The purpose of a database ___ is so that you have something to restore if data is lost during a business’s daily routine.
backup
A user may accidentally delete a table or a
database administrator may need to ___
multiple tables on different servers in order to
combine them into one database.
restore
Types of Backups
Full backup
Differential backup:
Incremental backup
contains all the data in a
specific database or set of filegroups or files, and
also enough log to allow for recovering that data.
Full backup
contains only the data that has changed since the
differential base.
Differential backup
is
based on the last backup of the data.
Incremental backup
are
designed to provide more flexibility for
backing up databases that contain some
read-only filegroups under the simple
recovery model.
Partial and differential partial backups
The files in a database can be backed up
and restored ___
individually
Using___ can increase the speed of recovery by letting you restore only damaged files without requiring you to restore the rest of the database.
file backups
SQL Server backups are created on backup
devices, such as
disk files or tape media
You can append new backups to any existing
backups on a device or overwrite any
existing backups (True or False)
true