Untitled Deck Flashcards

1
Q

What is authentication?

A

Authentication is the process of validating user credentials to prevent unauthorized users from accessing a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What question does authentication evaluate?

A

Authentication evaluates the question: ‘Does this user have a legitimate right to access the system?’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can authentication be checked?

A

Authentication can be checked by requesting the user to provide:
- Something the user knows (usually a password)
- Something the user owns (e.g., a magnetic card or badge)
- Physical characteristics of the user (e.g., signature or fingerprints)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common method of authentication?

A

The most common method of authentication is using a name and a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two security subsystems in the Database Engine?

A

The two security subsystems are:
- Windows security
- SQL Server security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Windows security specify?

A

Windows security specifies security at the operating system level, using Windows user accounts for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SQL Server security?

A

SQL Server security specifies additional security at the system level for users who have logged on to the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a SQL Server login?

A

A SQL Server login is created within the system and is associated with a password, allowing access to the database server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data encryption?

A

Data encryption is the process of scrambling information so that it is incomprehensible until decrypted by the intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the components of the Database Engine’s encryption layers?

A

The components include:
- Symmetric keys
- Asymmetric keys
- Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a public key certificate?

A

A public key certificate is a digitally signed statement that binds the value of a public key to the identity of the holder of the corresponding private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information does a certificate contain?

A

A certificate contains:
- The subject’s public key value
- The subject’s identifier information
- Issuer identifier information
- The digital signature of the issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the first barrier to accessing SQL Server data?

A

The first barrier is the network logon, where a user must log on to the network before proceeding with the SQL Server login process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the second barrier to accessing SQL Server data?

A

The second barrier is logging into SQL Server, where a user must be authenticated by SQL Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the third barrier to accessing SQL Server data?

A

The third barrier is gaining access to a specific database managed by SQL Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the final barrier to accessing SQL Server data?

A

The final barrier is gaining access to tables and other objects within the database, accomplished with permissions.

17
Q

What is authorization?

A

Authorization is the process applied after authentication, determining what resources a user can access.

18
Q

What does tracking changes mean?

A

Tracking changes means documenting the actions of unauthorized users on the system to protect against users with elevated privileges.