Chapter 6 Quiz Flashcards
_______ and _______can be used to simplify management of permissions
Roles , schemas
_______does not prevent data loss but can make data _______
Encryption , unintelligible
A SQL Server login may not access a database directly because it is a _______
server-level principal
Databases often contain _______ or confidential information that must be protected
sensitive
_______ keys use a public key to encrypt and a different, private key to decrypt
Asymmetric
use a public key to encrypt and a different (private) key to decrypt data
Asymmetric keys
_______are the objects in a database and on a SQL Server instance that can be secured
Securables
TDE uses a _______ key called the _______ to encrypt individual pages within data and log files
symmetric ,DEK
use the same key to encrypt and decrypt data
Symmetric keys
SQL Server _______operate at the level of the SQL Server _______and are server-level security principals
logins , instance
a symmetric key used to protect asymmetric private keys and certificates stored in the database
– Database master key (DMK)
SQL function that uses a passphrase to generate a key and uses the Triple DES algorithm to encrypt data
EncryptByPassphrase()
SQL function that encrypts data using a key that has been registered with the database
– EncryptByKey() -
Client/server messages are susceptible to _______
interception
A user connecting to SQL server must have an _______ that specifies the type of authentication used by that login
associated SQL Server login
key management system within Windows OS
Windows Data Protection API (DPAPI)
A ____ is used in conjunction with a ____ to encrypt data
key , cipher
a block cipher that translates fixed-size blocks of unencrypted data into corresponding fixed-sized blocks of encrypted data
Advanced Encryption Standard (AES)
uses a symmetric key (called the database encryption key - DEK) to encrypt pages within the physical data and log files
Transparent Data Encryption (TDE)
another column value that is unique to the row and used in conjunction with the key to secure data
Authenticator
_______ keys use the same key to encrypt and decrypt data
Symmetric
feature that enables third-party key management solutions to be used in conjunction with SQL Server
Encryption key management (EKM)
SQL Server uses a _______ approach to encrypt
hierarchical
_______ enables third-party key management in conjunction with SQL Server
Encryption key management (EKM)