LESSON 7 Flashcards

1
Q

used to grant an entity (such as a user access) to an object (such as another user or a database).

A

permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

In SQL Server, the security model is based on what is referred to as

A

Securables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the process by which an individual’s access to a computer system is controlled by identification of that user using credentials provided by that user

A

login or logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most common login method is

A

username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a logical representation of a person within an electronic system.

A

user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security system that requires two distinct forms of identification in order to access something

A

Two-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The three different methods for which a user can be initially identified include:

A

Windows user login
– Membership in a Windows user group
– SQL Server-specific login (if the server uses mixed-mode security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is important to remember that at the SQL Server level, where the database resides, users are known by their login name. This can be a SQL Server login, Windows domain, or a username login choice.

A

Server-Level Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

object Permissions
* Each object’s permission is assigned through either

A

granting, revoking, or denying user login permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

means the user can access the object.

A

Grant permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

overrides a grant permission.

A

Deny permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

removes the permission assigned, regardless of whether it’s deny or grant.

A

Revoke permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are three different types of accounts which are available for the SQL Server service account:

A
  • Local user account
    – Local system account
    – Domain user account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the act of establishing or confirming a user or system identity

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is superior to mixed mode because users don’t need to learn yet another password and because it leverages the security design of the network.

A

Windows Authentication mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are the permissions that allow a user to act on the database objects (such as tables, stored procedures, and views):

A

Object Permissions

13
Q

In SQL Server databases, users often access data by going through one or several objects.
* Ownership chains apply to views, stored procedures, and user-defined functions.

A

Ownership Chains

13
Q

you have something to restore if data is lost during a business’s daily routine.

A

Backups

14
Q

contains all the data in a specific database or set of filegroups or files, and also enough log to allow for recovering that data

A

Full backup

14
Q

A differential backup contains only the data that has changed since the differential base.

A

Differential backup

15
Q

An incremental backup is based on the last backup of the data. An incremental backup contains only the data that has changed since the last full or incremental backup.

A

Incremental backup

15
Q

are designed to provide more flexibility for backing up databases that contain some read-only filegroups under the simple recovery model.

A

Partial and differential partial backups

16
Q

can increase the speed of recovery by letting you restore only damaged files without requiring you to restore the rest of the database.

A

File Backups

16
Q

he files in a database can be backed up and restored _____

A

individually

17
Q

You can append new backups to any existing backups on a device or overwrite any existing backups.

A

Backup Devices

18
Q

are created on backup devices, such as disk files or tape media.

A

SQL Server backups

18
Q

is used to grant an entity (such as a user) access to an object (such as another user or a database).

A

permission

18
Q

is the process by which individual access to a computer system is controlled by identification of the user using credentials provided by the user. The most common login method is using a username and password.

A

login or logon

19
Q

is a logical representation of a person within a electronic system.

A

user account

19
Q

is the act of establishing or confirming a user or system identity

A

Authentication

20
Q

is superior to mixed mode because users don’t need to learn yet another password and because it leverages the security design of the network.

A

Windows Authentication mode

21
Q

fixed, predefined server roles. Primarily, these roles grant permission to perform certain server-related administrative tasks.

A

SQL Server

22
Q

can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object.

A

Sysadmin

22
Q

a fixed role, but it can have object permissions like a standard role. Every user is automatically a member of the public role and cannot be removed, so the public role serves as a baseline or minimum permission level.

A

public role

22
Q

must be explicitly granted access to any user database.

A

Users

22
Q

is a special role that has all permissions in the database.

A

db_owner

23
Q

a database-specific role intended to allow an application to gain access regardless of the user.

A

application role

24
Q
A