Data Access and Auditing Flashcards

1
Q

What permissions does the fixed sever role sysadmin have?

A

Members of the sysadmin fixed server role can perform any activity in the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

serveradmin

A

Members of the serveradmin fixed server role can change server-wide configuration options and shut down the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

securityadmin

A

Members of the securityadmin fixed server role manage logins and their properties. They can GRANT, DENY, and REVOKE server-level permissions. They can also GRANT, DENY, and REVOKE database-level permissions if they have access to a database. Additionally, they can reset passwords for SQL Server logins. IMPORTANT: The ability to grant access to the Database Engine and to configure user permissions allows the security admin to assign most server permissions. The securityadmin role should be treated as equivalent to the sysadmin role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

processadmin

A

Members of the processadmin fixed server role can end processes that are running in an instance of SQL Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

setupadmin

A

Members of the setupadmin fixed server role can add and remove linked servers by using Transact-SQL statements. (sysadmin membership is needed when using Management Studio.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

bulkadmin

A

Members of the bulkadmin fixed server role can run the BULK INSERT statement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

diskadmin

A

The diskadmin fixed server role is used for managing disk files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dbcreator

A

Members of the dbcreator fixed server role can create, alter, drop, and restore any database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

public

A

Every SQL Server login belongs to the public server role. When a server principal has not been granted or denied specific permissions on a securable object, the user inherits the permissions granted to public on that object. Only assign public permissions on any object when you want the object to be available to all users. You cannot change membership in public. Note: public is implemented differently than other roles, and permissions can be granted, denied, or revoked from the public fixed server roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the features of the Service Master Key? (4 features)

A
  • The Service Master Key is the root of the database engines encyption hierarchy.
  • Generated the first time it is need to encrypt another key.
  • By default the Service Management key is encrypted by the Windows data protection API (DPAPI) at the operating system level, which uses the local machine key.
  • The Service Management Key can only be opened by the Windows Service Account that created it, or by a principal that knows the service account name and its password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the features of Extensible Key Management (EKM)?

A
  • SQL Server EKM enables encryption keys that protect database files to be stored outside of the SQL Server environment e.g. smartcard, USB, or EKM module of a Hardware Security Module (HSM).
  • Helps secure SQL Server instance from database administrators as they will not necessarily have access to the EKM/HSM module.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the features of the Database Master Key (DMK)?

A
  • Symmetric key used to protect the private keys of certificates and asymmetric keys present in database.
  • Created used AES_246 and a password that is provided.
  • Query the sys.symmetric_keys to get information about the DMK.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the features of an Asymmetric Key?

A
  • Consists of a private and corresponding public key.
  • Asymmetric encryption is more computationally expensive than symmetric encryption.
  • Asymmetric encryption is more secure than symmetric encryption.
  • An Asymmetric key can be used to encrypt a symmetric key in a database.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the features of a Symmetric key?

A
  • A symmetric key is a single key that uses encryption.
  • Symmetric encryption is generally used over asymmetric encryption as it is faster and less computationally expensive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the features of certificates for encryption?

A
  • Digitally signed object.
  • Contain a public and optionally a private key for SQL Server which can generate certificates.
  • Can be used in asymmetric encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Draw the SQL Server encryption hierarchy.

A

See attached image.

17
Q

Can encrypted data be compressed?

A

No. You should compress the data before encrypting.

18
Q

Which encryption algorithms are supported from SQL Server 2016 onwards?

A

Starting with SQL Server 2016 the only algorithms that are supported with database
compatibility 130 or above are AES-128, AES_192, and AES_256.