Ch. 12 Implementing Security and Audit Flashcards

1
Q
Authentication
Types:
Password auth.
External a
Global a
A

Validating and identity of the user and confirming the authority to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password Auth

SQL>CREATE USER inventuser IDENTIFIED BY Bcit2011;

A

Password-authenticated user accounts
- Most common
Encrypted password is stored in data dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remove user

A

User account is unlocked by default at creation

SQL>DROP USER inventuser;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can drop or drop user with all objects the user owns. When dropping a user implicitly, it drops any object privileges in which user was grantor

A

SQL>DROP USER inventuser CASCADE;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

External authentication

A

DB verifies username is a valid db account and trusts OS has performed auth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Login to db doesnt require username or pw

A

[oracle@localhost~]$ sqlplus/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Refer as OPS$ accounts

A

(legacy from version 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OS_AUTHENT_PREFIX configured in spfile, for example, to set up login_id oracle:

A

SQL>CREATE USER ops$oracle IDENTIFIED EXTERNALLY;

Typically used for admin scripts not exposing p/w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Global Authentication

A

DB verifies username is valid and passes connection info to advance security option for authentication (eg Biometrics, X.509 certificates, Radius)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dont store or validate pw in the db

A

Example set up login_id:
SQL>CREATE USER spy_master IDENTIFIED
GLOBALLY AS ‘CN=spy_master, OU=tierr2, O=security, C=Can’;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly