• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back
Endpoints can be of two different transports: ____ and ______.
TCP
HTTP
An endpoint has two basic parts: a ____ and a _____ .
transport
payload
An endpoint can have one of three states:
STARTED
STOPPED
DISABLED.
The first layer of access security is determined by the _____ state.
endpoint
The second layer of security is permission to connect to the ______.
endpoint
You can create Transmission Control Protocol (TCP) endpoints with three different payloads:
TSQL
DATABASE_MIRRORING
SERVICE_BROKER
Because port ______ is the default TCP port number for a DATABASE_MIRRORING endpoint and _____ is the default TCP port for a TSQL endpoint, you might want to specify a different port number to avoid DOS attacks.
5022
1433
TSQL endpoints do not have any additional configuration options beyond the universal _____ settings.
TCP
When all Database Mirroring and Service Broker instances reside within a single domain or across trusted domains, you should use _____ authentication. When instances span non-trusted domains, you should use _______-based authentication.
Windows
certificate
Use _____ for minimal encryption strength and best performance. Use _____ if you require strong encryption.
RC4
AES
You can specify only one TCP endpoint with a payload of ________ for each instance of SQL Server.
DATABASE_MIRRORING
What are the two parts of an endpoint?
An endpoint has a transport defined as either TCP or HTTP and has a payload defined as TSQL, SERVICE_BROKER, DATABASE_MIRRORING, or SOAP.
What are the three states of an endpoint, and what is the difference between each state?
The three states are STARTED, STOPPED, and DISABLED. An endpoint that is STARTED listens for and allows connections. An endpoint that is STOPPED listens for connection requests and returns an error message. An endpoint that is DISABLED does not respond to any request.
What authority must be granted before an endpoint allows a connection request?
granted the CONNECT permission on the endpoint
What types of authentication are available for Service Broker and Database Mirroring endpoints?
NTML or Kerberos authentications can be specified. You can also specify an option of NEGOTIATE, which causes the specific authentication method to be negotiated between the application and the endpoint.
What are the two universal arguments for TCP endpoints?
You are required to specify a port for the endpoint to listen on. If you want, you can configure an IP address that restricts the endpoint to respond to traffic coming only from the specified IP address.
Endpoints in SQL Server act very similar to ________ by filtering out any traffic that does not meet allowed formats.
firewalls
Each endpoint has a transport that is defined as either ___ or _____.
TCP
HTTP
Endpoints have a second part called the payload, which is defined as ____, _______, _____, or ______.
tsql
database_mirroring
service_broker
soap
__________ endpoints are configured during installation to listen on the port number specified for the instance .
TSQL
_________ and _________endpoints can have an authentication method specified as well as enabled for encrypting all traffic sent based on an algorithm that you specify.
Service Broker
Database Mirroring
How do you configure an instance so that only local connections are allowed?
The TCP/IP provider enables connections to be created to the instance remotely. By disabling the TCP/IP provider, you can create only local connections to the instance.
What do you use to enable or disable features for an instance?
The sp_configure system stored procedure is used to enable or disable features.
The first surface area configuration decision that you make occurs during installation, when you decide whether to force all login access to the instance to use _______ credentials.
Windows-only
You should disable the _______ for any instance that you do not want remote connections.
TCP/IP provider
The _______ tool is used to enable or disable features.
sp_configure
Logins within SQL Server 2008 can be five different types:
Standard SQL Server login
Windows login
Windows group
Certificate
Asymmetric key
You can create SQL Server logins mapped to ____ or ______ keys.
certificates
asymmetric
Logins mapped to certificates and asymmetric keys are used internally as a ____________.
security container
When the ________ option (the default and recommended setting) is enabled, SQL Server 2008 enforces the Windows password policy settings when you create a SQL Server login.
CHECK_POLICY
____________is used to prevent brute force attacks against a login.
CHECK_EXPIRATION
Using Windows _______ provides the greatest flexibility for managing security access.
groups
role - Administer BCP and Bulk Insert operations
bulkadmin
role - Creates databases
dbcreator
role - Manage disk resources
diskadmin
role - Manage connections and start or pause an instance
processadmin
role - Create, alter, and drop logins, but can’t change passwords
securityadmin
role - Perform the same actions as diskadmin and processadmin, plus manage endpoints, change instance settings, and shut down the instance
serveradmin
role - Manage linked servers
setupadmin
role - Perform any action within the instance. Members cannot be prevented from accessing any object or performing any action.
sysadmin
______ users were added to replace application roles. Users still authenticate to the instance using their own credentials. The user’s login needs access to the database.
Loginless
Loginless users are designed to replace _____ roles. Loginless users also provide a much better audit trail than an application role because each user must authenticate to the ______ using their own credentials instead of using a generic account.
application
instance
fixed role - Add or remove users in the database
db_accessadmin
fixed role - Back up the database but cannot restore a database or view any information in the database
db_backupoperator
fixed role - Issue SELECT against all tables, views, and functions within the database
db_datareader
fixed role - Issue INSERT, UPDATE, DELETE, and MERGE against all tables within the database. Members of this role must also be members of the db_datareader role.
db_datawriter
fixed role - Execute data defi nition language (DDL) statements
db_ddladmin
fixed role - Prevent SELECT against all tables, views, and functions within the database
db_denydatareader
fixed role - Prevent INSERT, UPDATE, DELETE, and MERGE against all tables within the database
db_denydatawriter
fixed role - Owner of the database that has full control over the database and all objects contained within the database
db_owner
fixed role - Manage the membership of roles and associated permissions, but cannot manage membership for the db_owner role
db_securityadmin
fixed role - Default group in every database that all users belong to
public
Which logins cannot be used to authenticate to an instance?
You cannot use logins that are mapped to a certificate or asymmetric key to authenticate to an instance.
What database principal was created as a replacement for an application role?
Loginless users are the replacement for an application role.
Logins can be mapped to certificates or asymmetric keys, but logins mapped to certificates or asymmetric keys cannot be used to authenticate to an ________.
instance
Since the _____account cannot be locked out, you should rename the account using the ALTER LOGIN command.
sa
Loginless users, created as a replacement to application roles, are users in a database that are not mapped to a ____.
login
_____ are the objects on which you grant permissions. Every object within SQL Server, including the entire instance, is a ________.
Securables
securable
A stored procedure is nothing more than an ____ to the database, which means that developers do not even need to know the structure of the database.
API
To create a schema owned by another database principal, the user creating the schema must have ________ permission on the principal being designated as the schema owner.
IMPERSONATE
____________provide the basis for the encryption hierarchy within SQL Server and are also required to before you can create a certifi cate or asymmetric key.
Master keys
You have a single _____ for the entire instance along with a database ______ within each database.
service master key
master key
By default the _________ is used to encrypt any
database master key that is created within the instance.
service master key
A database master key must be generated explicitly using the following command:
CREATE MASTER KEY ENCRYPTION BY PASSWORD = ‘<StrongPasswrd>’
The database ________ is used to protect any certificates, symmetric keys, or asymmetric keys that are stored within a database
master key
A _________ certificate is essentially a fi le that is supplied by a certifi cate authority that validates the entity using the certifi cate
public
________certificates are generated by and used to protect data within an organization.
Private
How are principals, securables, and permissions related?
You can GRANT, REVOKE, or DENY permissions ON a securable TO a principal.
What is an ownership chain, and how can you have a broken ownership chain?
An ownership chain applies to objects that reference other objects within a database. The owner of the schema that contains the object is considered the owner of the object. SQL Server checks permissions for the first object that you access, as well as each time the owner changes within the calling stack. The chain
of object owners within a calling stack is called an ownership chain. You have a broken ownership chain when the object owner changes within a calling stack
and you have not been granted sufficient permissions to continue accessing objects within the call stack.
You GRANT permissions ON a _________TO a principal.
securable
All ________within SQL Server is secured. If you have not been granted permission on an object, you do not even see the object
metadata
Digital signatures can be applied to a code module through the ____________ statement to provide a means to escalate permissions only when you execute a specified module without allowing direct access to the underlying objects.
ADD SIGNATURE
An important feature of DDL triggers is the ability to _____ an action.
roll back
Within the execution context of the DDL trigger, you have access to a special function, __________, that provides information about the DDL action
EVENTDATA()
Which object can be used to audit as well as prevent most object changes?
DDL triggers can audit any DDL command. If the DDL command executes within a transaction, a DDL trigger can be used to roll back the DDL and prevent the can be used to roll back the DDL and prevent the
change from occurring
Which object is required before you can create a server or database audit specification?
You must create a server audit object before a server or database audit specification can be created.
_____triggers can be created to fire when specific DDL events or events within a group are executed.
DDL
If the DDL event executes within the context of a transaction, you can use a _____trigger to prevent the action from occurring.
DDL
_________creates an instance of an audit object.
CREATE SERVER AUDIT
After you create an audit object, you can hook server and database audit specifications to the audit object in order to ___________auditing.
centrally manage
________can be encrypted using a hash, passphrase, symmetric key, asymmetric key, or a certificate.
Columns
__________are commonly used encryptions since they provide the best balance between securing data and performance. __________and __________ provide
the strongest encryption and decryption method.
Symmetric keys
Asymmetric keys
certificates
A ________ is a one-way algorithm that allows you to encrypt data but does not allow decryption.
hash algorithm
SQL Server allows you to specify five different hash algorithms...
SHA, SHA1, MD2, MD4, and MD5
Hash algorithms are also platform-_______.
agnostic
A ________is a string of one or more characters that are added to the value before hashing.
salt
________keys provide the best possible performance for routine use of encrypted data.
symmetric
_______keys are generated by a key server within an organization and cannot be backed up or moved from one system to another.
Asymmetric
To prevent the theft of data as it resides on disk or within a backup, SQL Server 2008 introduced ______________
Transparent Data Encryption (TDE)
TDE provides real-time encryption and decryption services to ensure that data within the _______and ________ is encrypted.
files
backups
TDE works by using an encryption key stored within the database _________.
boot record
The TDE key is encrypted by using a certificate within the __________database.
master
The process of implementing TDE on a database is as follows:
1. Create a database master key in the master database.
2. Create a certificate in the master database.
3. Create a database encryption key in the target database using the certificate in the master database.
4. Alter the database and enable encryption.
You must back up the ______used for TDE and store the backup in a safe location. After you encrypt it, you cannot access your data without the ________.
certificate
certificate
What object is required to implement TDE?
You must create a certificate in the master database that is used to encrypt the database encryption key.
What do you need to do to a hash algorithm to increase the complexity when the range of possible encryption values is small?
If the range of possible values to encrypt is small, you need to salt the hash value in order to defeat brute force attacks.
Data can be encrypted within tables using a _______, a _____, a _______key, an ________key, or a _________.
hash algorithm
passphrase
symmetric key
asymmetric key
certificate
A hash algorithm should be used with a salt value unless the range of values being encrypted is _________ to defeat a brute force attack.
large enough
_______is used to encrypt “data at rest.” The contents of the data and transaction log, along with any backups, are encrypted by the engine.
TDE
If you implement TDE, make certain that you have a backup of the ___________along with the _____; otherwise, you will not be able to restore a backup.
certificate
private key