NAME

Question types


Start with


Question limit

of 202 available terms

Print test

198 Matching questions

  1. Full backup: ___
  2. Usually, a differential base is ___
  3. You can manage database access from either the login side or the ___
  4. A particularly powerful permissions organization technique is to design a ___ of standard database roles.
  5. Using Windows Authentication means that users must have a ___ in order to be recognized by SQL Server
  6. File backup ???
  7. Windows Authentication is very robust in that it will authenticate not only Windows users, but also users within ___
  8. Because SQL Authentication is less secure than Windows logins, avoiding mixed mode is ___ ; however, it is available for backward compatibility.
  9. Complete restore ???
  10. SQL Server includes ___ . Primarily, these roles grant permission to perform certain server-related administrative tasks.
  11. fixed database role: «db_backupoperator» ???
  12. An application role is a database-specific role intended to allow an ___
  13. It is possible for users who have not been granted direct access to a database to gain access using the ___ user account - and with this account, they can make limited changes within the database server.
  14. If a user does not have the ___ , the highest level object permission would be the Grant and Deny object permissions.
  15. Instead of granting the permission to a user from the ___ , you can also grant permissions to an object from the properties of the user.
  16. ___ only backs up data since the last full backup.
  17. The ___ is a special role that has all permissions in the database.
  18. Removes a user from an assigned role:
  19. Domain users are managed with tools such as the ___
  20. The counterpart to creating a role is removing it. A role may not be dropped if any users are currently ___ to it.
  21. When you have a ___ , you have duplicate databases on multiple servers.
  22. Remove the role from the database
  23. SQL Server offers three recovery models for each database. They are: ___
  24. The following code grants select permission to Joe for the Emails table:
  25. A login or logon is ___
  26. Granting object permission interacts with ___
  27. Fixed server role: Sysadmin ???
  28. Object permissions are permissions that allow a user to act on database objects, such as ___
  29. Windows Authentication mode is superior to ___ because users don't need to learn yet another password and because it leverages the security design of the network.
  30. fixed database role: «db_denydatareader» ???
  31. To remove Lauren's database access, the system-stored procedure DROP USER requires her database username, not her ___
  32. The sysadmin role can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides ___ on an object.
  33. Revoking a permission removes the permission that has been assigned, regardless of whether it was a ___ permission.
  34. user-defined roles are typically employed for users who need to perform ___ but to whom you don't want to grant a role that would permit them do more than what they need to.
  35. To remove a Windows user or group from SQL Server, you can also use the ___
  36. You can ___ new backups to any existing backups on a device, or you can overwrite any existing backups.
  37. A SQL Server login account and related passwords are defined on the SQL server and are not related to ___
  38. Several specific types of object permissions exist: ___
  39. A Transact-SQL command to grant database access to a user: ___
  40. In the Restore options panel, you can choose any of the following options : ___
  41. Partial restore ???
  42. fixed database role: «db_datawriter» ???
  43. Types of partial backups supported by SQL Server: ___
  44. Fixed server role: Setupadmin ???
  45. the following code adds the user login ''XPS\Lauren'' to the sysadmin role: ___
  46. Over time, as a database is updated, the amount of data that is included in differential backups increases. This makes the backup slower to create and to restore. Eventually, another ___ to provide a new differential base for another series of differential backups.
  47. There are three kinds of database server roles: fixed roles, the public role, and ___
  48. Transact-SQL syntax so that you can add the windows username: cbastiao from domain name: WS2008
  49. user-defined roles are typically employed for users who need to perform specific database functions but to whom you don't want to grant a role that would permit them do ___
  50. Object permission: Insert ???
  51. Three different types of accounts are available for the SQL Server service account: ___
  52. Creates the «database role» AUDITORS, which is owned by the «db_securityadmin» «fixed database role»:
  53. Differential base or base of the differential ???
  54. fixed database role: «db_ddladmin» ???
  55. To create a login using Transact-SQL syntax so that you can add a Windows user or group run the ___
  56. The ___ can perform any activity in the SQL Server installation, regardless of any other permission setting. The ___ even overrides denied permissions on an object.
  57. Granting permission means that a user can ___
  58. An incremental backup contains only the data that has changed since the ___
  59. Within SQL Server, users are assigned to roles, which may in turn grant permission to objects... each object has an owner, and ___ also affects permissions.
  60. Only select and update permissions can be set at the column level, because inserts
    and deletes ___
  61. A user may have multiple permission paths to an object (e.g., individually, through a standard database role, and through the public role). If any of these paths are denied, then the user is blocked from ___
  62. Each object's permission is assigned by ___
  63. Full Recovery allows you to ___
  64. At restore time, the ___ , followed by each incremental backup following the full backup.
  65. Because SQL Server is an environment within the Windows Server system, one of your primary security concerns should be ensuring that the Windows Server itself is ___
  66. fixed database role: «db_accessadmin» ???
  67. Database backup ???
  68. An incremental backup is based on the ___
  69. At the SQL Server level, where the database resides, users are known by their ___ . This can be a SQL Server login, a Windows domain login, or a username login.
  70. Fixed server role: Serveradmin ???
  71. Any user who wishes to access a database but who has not been declared a user within the database is automatically granted the privileges of the guest user, as long as ___
  72. The one user that SQL Server automatically creates during installation of the software is ___
  73. Ownership chains apply to ___
  74. Fixed server role: Securityadmin ???
  75. Within SQL Server, users are assigned to ___, which may in turn grant permission to objects... each object has an owner, and ownership also affects permissions.
  76. Guest users must be removed from a database when they are no longer welcome, as they are a ___
  77. A local user account cannot be used outside the ___
  78. The ___ is a fixed role, but it can have object permissions like a standard role. Every user is automatically a member of the ___ and cannot be removed, so the ____ serves as a baseline or minimum permission level.
  79. Regardless of an organization's size, the end result of its ___ should be to ensure that users' assigned rights and responsibilities are enforced through a security plan.
  80. A permission is used to grant an entity access to an ___
  81. Users must be explicitly granted access to ___
  82. SQL servers also support mixed mode, which allows you to connect to a SQL server using ___
  83. A user account is ___
  84. To restore the AdventureWorks database using the C:\AdventureWorks.BAK backup, you would execute the following command: ___
  85. The public role is a fixed role, but it can have object permissions like a standard role. Every user is automatically a member of the public role and cannot be removed, so the public role serves as ___
  86. At restore time, the full backup is restored ___, followed by the most recent differential backup.
  87. Partial backup ???
  88. The BUILTINS/Administrators user can be deleted or ___
  89. Object permissions are assigned with the SQL DCL commands: ___
  90. The Transact-SQL statement to provide permission to an object for a specific user and his or her role is as follows:
  91. Even though a user may belong to a fixed database role and have certain administrative level permissions, he or she still cannot access data without first being granted permission to ___ (e.g., tables, stored procedures, views, functions).
  92. The purpose of a database backup is ___
  93. To grant access from the database point of view, use the ___ under the Database > Security > Users node to open the Database User-New form.
  94. In SQL Server, «fixed database roles» include the following:
  95. You can manage database access from either the ___ or the database side.
  96. The Windows SID (___) is passed to SQL Server.
  97. Object permission: DRI (References) ???
  98. Object permission: Update ???
  99. The ___ is used to assign or check object permissions.
  100. A ___ is a logical representation of a person within an electronic system.
  101. To grant access to a database from the login side using Object Explorer, use the ___ of the Login Properties form.
  102. Simple Recovery requires the ___ since the transaction log backups are truncated on a regular basis.
  103. «Fixed database roles» can be assigned via SSMS using either of the following procedures: ___
  104. You cannot modify the permissions assigned to a ___
  105. Ownership chains are great for developing tight security where users execute stored procedures but aren't granted direct permission to ___
  106. Object permission: Select ???
  107. Fixed server role: Bulkadmin ???
  108. When you have a ___ server, you are using an active-passive cluster that consists of two or more servers.
  109. Any user who wishes to access a database but who has not been declared a user within the database is ___
  110. Restore scenarios possible in SQL Server include the following: ___
  111. The following code creates the manager role:
  112. Incremental backups are smaller and faster than ___
  113. The following code grants select and update permission to the guest user and to LRN:
  114. Domain user account is the recommended login account because the SQL Server can then use the ___ specifically created for it.
  115. Within SQL Server, users are assigned to roles, which may in turn ___ permission to objects... each object has an owner, and ownership also affects permissions.
  116. You can perform a SQL Server backup with minimal effect on ___
  117. Complete database restore ???
  118. Instead of granting the permission to a user from the properties of the object, you can also grant permissions to an object from the ___
  119. if you add a user to the sysadmin role, that user now has ___ for that server.
  120. ___ always has a higher priority than the Grant permission.
  121. In Transact-SQL code, you can add a user to a fixed database role by using the ___ system stored procedure.
  122. SQL Server includes fixed, predefined server roles. Primarily, these roles grant permission to ___
  123. To restore data through the graphical interface tool, follow these steps: ___
  124. Each object's permission is assigned through ___ , denying, or revoking user login permissions.
  125. ___ interacts with the server and database roles.
  126. Differential database backups ???
  127. Performing a backup operation has minimal effect on ___
  128. It is important to be aware of the ___ associated with each object in a database because it's possible to inadvertently grant administrative rights to objects or users that should not have them.
  129. Page restore ???
  130. Denying permission overrides ___
  131. You cannot modify ___ to a fixed server role.
  132. The most common login method involves supplying a ___
  133. Grants all permissions to the «public role» for the Contacts table:
  134. Object permissions are assigned with the SQL DCL commands GRANT, ___
  135. A Windows login can be removed from SQL Server through SSMS...this doesn't
    delete the user from ___ ; it only removes the user from SQL Server.
  136. If you add a user to the sysadmin role group, that user must reconnect to the SQL Server instance in order for the full capabilities of ___
  137. Create a mirror database ???
  138. Object permission: Delete ???
  139. Generically, to restore the database using the specified file, you would execute the following command: ___
  140. If a user does not have the sysadmin server role, the highest level object permission would be the ___
  141. Types of database backups supported by SQL Server: ___
  142. fixed database role: «db_denydatawriter» ???
  143. In the security model for a SQL Server, there are three different methods by which a user can be initially identified: ___
  144. An ___ is a database-specific role intended to allow an application to gain access regardless of the user.
  145. fixed database role: «db_securityadmin» ???
  146. Access, roles, and permissions can be assigned to the Windows user group, and they will apply to ___
  147. Steps to modify an object's permissions: ___
  148. Authentication is the act of ___
  149. The «sa account» is the built-in SQL administrator account associated with ___
  150. Types of file backups supported by SQL Server: ___
  151. Because SQL Authentication is less secure than Windows logins, avoiding mixed mode is recommended; however, it is available for ___
  152. Piecemeal restore ???
  153. The assigned permission may be ___
  154. The db_owner is a special role that has ___
  155. The sysadmin role can perform any ___ in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object.
  156. The disadvantages of Full Recovery mode is that the logs ___
  157. A differential backup contains only the data that has changed since the ___
  158. There are three kinds of database server roles: ___
  159. You can append new backups to any existing backups on a device, or you can ___ any existing backups.
  160. Revert a database to the point in time captured by a ___
  161. Local users can be managed by selecting ___
  162. Within SQL Server, users are assigned to roles, which may in turn grant ___ ... each object has an owner, and ownership also affects permissions.
  163. Each object's permission is assigned through granting, denying, or ___ user login permissions.
  164. Transaction log restore ???
  165. Fixed server role: Dbcreator ???
  166. fixed database role: «db_owner» ???
  167. Object permission: Execute ???
  168. During a backup operation, SQL Server copies the data directly from the database files to the ___
  169. Fixed server role: Processadmin ???
  170. To add a user to a «database role», follow these steps:
  171. Differential file backups ???
  172. The guest user account is not actually created when a___
  173. Fixed server role: Diskadmin ???
  174. Differential partial backup ???
  175. The Securables page is used to ___
  176. A user may have multiple permission ___ to an object (e.g., individually, through a standard database role, and through the public role). If any of these ___ are denied, then the user is blocked from accessing the object.
  177. File backups should be used only where they clearly add value to your ___
  178. Once users exist in the Windows user list or the Windows domain, SQL Server can ___
  179. Fixed server roles are set in SSMS in the Server Roles page of the ___
  180. Deny permission always has a higher priority than the ___
  181. Backups that SQL Server supports: ???
  182. The Transact-SQL RESTORE command enables you to perform the following restore scenarios: ___
  183. Revoking a permission ___ the permission that has been assigned, regardless of whether it was a denied permission or a granted permission.
  184. Bulk-Logged ???
  185. The sysadmin role is a powerful one, and you must be sure not to grant it to the ___ user login.
  186. To grant access to a database from the login side using Object Explorer, use the User Mapping page of the ___.
  187. Transact-SQL command to drop user: ___
  188. fixed database role: «db_datareader» ???
  189. Users may be assigned to multiple roles, so multiple security paths from a user to an object ___
  190. A user may have multiple permission paths to an object (e.g., ___ ). If any of these paths are denied, then the user is blocked from accessing the object.
  191. The following code sample assigns Joe to the manager role:
  192. Each object's permission is assigned through granting, ___ , or revoking user login permissions.
  193. Differential backup only backs up data since ___
  194. Recovery only ???
  195. Transactions that are running during the backup are never ___
  196. Create and maintain a standby server ???
  197. File restore ???
  198. The guest user account is ___ when a database is created;
  1. a mirror database
  2. b Differential backup
  3. c any tables.
  4. d Windows authentication or SQL Server authentication.
  5. e overwrite
  6. f Active Directory or Windows accounts.
  7. g Partial backup & Differential partial backup
  8. h Windows account
  9. i the guest user account has been created.
  10. j ALL, SELECT, INSERT, DELETE, REFERENCES, UPDATE, or EXECUTE.
  11. k Control Panel > Administrative Tools > Computer Management.
  12. l Full, differential, and incremental backups.
  13. m The right to create foreign keys.
  14. n Restores an entire database, beginning with a full database backup, which may be followed by restoring a differential database backup (and log backups).
  15. o Complete database restore, File restore, Page restore, Piecemeal restore, Recovery only, Transaction log restore, Create a mirror database, Create and maintain a standby server.
  16. p A backup of all the full data in the primary filegroup, every read/write filegroup, and any optionally specified read-only files or filegroups. A partial backup of a read-only database contains only the primary filegroup.
  17. q to have something to restore if data is lost during a business's daily routine.
  18. r full backup must be created
  19. s File backup & Differential file backups
  20. t Contains all the data in a specific database or set of filegroups or files to allow recovering that data.
  21. u database is created;
  22. v username and password.
  23. w activity
  24. x 1. SSMS »» expand the database folder »» Security folder »» Roles »» Database Roles folder.
    2. Double-click the appropriate role to open the Database Role Properties dialog box.
    3. Add or remove users from the role.
  25. y login side
  26. z database side.
  27. aa assigned
  28. ab access the object.
  29. ac Allows a user to perform backups, checkpoints, and DBCC commands,
    but not restores (Only server sysadmins can perform restores.)
  30. ad tables, stored procedures, and views.
  31. ae Restore specific files or filegroups to a database.
  32. af automatically granted the privileges of the guest user, as long as the guest user account has been created.
  33. ag hierarchical structure
  34. ah GRANT Permission, Permission
    ON Object
    TO User/role, User/role
    WITH GRANT OPTION
  35. ai EXEC sp_addsrvrolemember 'XPS\Lauren', 'sysadmin'
  36. aj Windows
  37. ak Granting object permission
  38. al a baseline or minimum permission level.
  39. am standby
  40. an all permissions in the database.
  41. ao • Restore an entire database from a full database backup.
    • Restore part of a database.
    • Restore specific files or filegroups to a database.
    • Restore specific pages to a database.
    • Restore a transaction log onto a database.
    • Revert a database to the point in time.
  42. ap paths
  43. aq Login Properties dialog box.
  44. ar Login Properties form
  45. as removes
  46. at Restore an entire database from a full database backup.
  47. au db_owner
  48. av Deny permission
  49. aw When information is written to one server, it is automatically replicated to the second server.
  50. ax New User Context Menu command
  51. ay GRANT, REVOKE, and DENY.
  52. az ownership
  53. ba a granted permission.
  54. bb the process by which individual access to a computer system is controlled by identification of the user through the credentials he or she provides.
  55. bc A full backup of the whole database.
  56. bd application to gain access regardless of the user.
  57. be granting
  58. bf server environment.
  59. bg application role
  60. bh Restores a database in stages, beginning with the primary filegroup and one or more secondary filegroups.
  61. bi properties of the object
  62. bj GRANT Select ON Emails TO Joe
  63. bk wrong
  64. bl Allows a user to write to all data in the database. This role is the equivalent of a grant on all objects, and it can be overridden by a deny permission.
  65. bm login names
  66. bn Authorizes a user to read all data in the database. This role is the equivalent of a grant on all objects, and it can be overridden by a deny permission.
  67. bo mixed mode
  68. bp Windows user groups.
  69. bq GRANT Select, Update ON Emails to Guest, LRN
  70. br database objects
  71. bs DROP LOGIN command
  72. bt CREATE ROLE Manager
  73. bu backward compatibility.
  74. bv A backup that contains only the data that were modified since the most recent partial backup of the same set of filegroups.
  75. bw Database backup & Differential database backups
  76. bx denying
  77. by Can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object.
  78. bz • Overwrite the existing database.
    • Preserve the replication settings.
    • Prompt before restoring each backup.
    • Restrict access to the restored database.
  79. ca CREATE ROLE auditors AUTHORIZATION db_securityadmin;
  80. cb grant
  81. cc affect entire rows.
  82. cd individually, through a standard database role, and through the public role
  83. ce A backup of all files in the database. This backup contains only the data that were modified since the most recent database backup of each file.
  84. cf EXEC sp_dropRoleMember Manager, Joe
  85. cg BUILTINS/Administrator
  86. ch A user «cannot» read from any table in the database. This overrides any object-level grant.
  87. ci accessing the object.
  88. cj used by several successive differential backups.
  89. ck User Mapping page
  90. cl Allows good performance while using the least log space.
  91. cm the sysadmin role to take effect.
  92. cn database snapshot.
  93. co Local user account, Local system account, Domain user account.
  94. cp the server and database roles.
  95. cq Restore specific pages to a database.
  96. cr CREATE LOGIN [WS2008\CBASTIAO] FROM WINDOWS
  97. cs CREATE USER [LRN]
    FROM LOGIN [WS2008\cbastiao]
  98. ct permission to objects
  99. cu last full or incremental backup.
  100. cv RESTORE DATABASE name_of_database FROM DISK = 'name of backup'
  101. cw Authorizes a user to issue DDL commands (create, alter, drop).
  102. cx Grant permission.
  103. cy DROP USER userTeste
  104. cz • By adding the role to the user in the user's Database User Properties form (Database » Security » Users » Properties of user )
    • By adding the user to the role in the Database Role Properties dialog (Database » Security » Roles » Database Roles » Properties of role)
  105. da sysadmin role
  106. db recognize them.
  107. dc establishing or confirming a user or system identity.
  108. dd Can create, alter, and drop disk files.
  109. de object.
  110. df Can configure the server-wide settings, including setting up full-text searches and shutting down the server.
  111. dg Under the full or bulk-logged recovery model, since the logs record each transaction, restoring from log backups is required to reach a desired recovery point.
  112. dh full backups and differential backups.
  113. di Expand Databases »» Right-click the database, point to Tasks, then click Restore »» Database »» the name of the restoring database appears in the To database list box. To create a new database, enter its name in the list box (etc)
  114. dj security identifier
  115. dk more than what they need to.
  116. dl denied permissions
  117. dm database security
  118. dn views, stored procedures, and user-defined functions.
  119. do Can manage the logins for the server.
  120. dp Can create, alter, drop, and restore databases.
  121. dq assign or check object permissions.
  122. dr Select, Insert, Update, Delete, DRI (References), Execute
  123. ds The right to select data. Select permission can be applied to specific columns.
  124. dt full access to every server function, database, and object
  125. du least administration
  126. dv secure.
  127. dw db_accessadmin,
    db_backupoperator,
    db_datareader,
    db_datawriter,
    db_ddladmin,
    db_denydatareader,
    db_denydatawriter,
    db_owner,
    db_securityadmin.
  128. dx valid Windows account
  129. dy properties of the user.
  130. dz When the active server fails, the passive server will become the active server, allowing for minimum downtime.
  131. ea Active Directory Users and Computers snap-in.
  132. eb modified as desired after installation.
  133. ec • Simple Recovery
    • Full Recovery
    • Bulk-Logged
  134. ed Can kill a running SQL Server process.
  135. ee sysadmin server role
  136. ef any user database.
  137. eg Latest full backup of the data
  138. eh user-defined roles.
  139. ei Permits a user to manage database-level security - including roles and
    permissions.
  140. ej DROP ROLE Manager
  141. ek fixed server role.
  142. el delayed
  143. em SQL authentication.
  144. en fixed roles, the public role, and user-defined roles.
  145. eo differential base.
  146. ep Can configure linked servers, extended stored procedures, and the startup stored procedure.
  147. eq revoking
  148. er risk for a security breach.
  149. es GRANT All ON Contacts TO dbcreator
  150. et server login name.
  151. eu RESTORE DATABASE AdventureWorks FROM DISK = 'C:\AventureWorks.BAK'
  152. ev The right to modify existing data. Update rights for which a WHERE clause is
    used require select rights as well. Update permission can be set on specific columns.
  153. ew Restore part of a database.
  154. ex transactions that are running;
  155. ey production workloads.
  156. ez the permissions assigned
  157. fa append
  158. fb This is a special role that has all permissions in the database. This role includes all the capabilities of the other roles and differs from the dbo user role. This is not the database-level equivalent of the server sysadmin role because an object-level deny will override membership in this role.
  159. fc The right to execute stored procedures or user-defined functions.
  160. fd not actually created
  161. fe "guest"
  162. ff roles
  163. fg granting, revoking, or denying user login permissions.
  164. fh denied or a granted
  165. fi restore plan.
  166. fj first
  167. fk Authorizes a user to access the database, but not to manage database level security.
  168. fl A backup of one or more files that contain data extents that were changed since the most recent full backup of each file.
  169. fm the last full backup.
  170. fn A full backup of all the data in one or more files or filegroups.
  171. fo REVOKE, and DENY.
  172. fp predefined server roles
  173. fq The right to insert data.
  174. fr CREATE LOGIN command.
  175. fs last backup of the data.
  176. ft user account
  177. fu Can perform bulk insert operations.
  178. fv SSMS »» database »» open the object to manage (tables, views, stored procedure, functions) »» Properties »» Click the Permissions page »» add user/role »» Select the appropriate Grant to Deny permission.
  179. fw perform certain server-related administrative tasks.
  180. fx recommended
  181. fy backup devices.
  182. fz Grant and Deny object permissions.
  183. ga • Windows user login
    • Membership in a Windows user group
    • SQL Server-specific login (if the server uses mixed-mode security)
  184. gb can grow a lot.
  185. gc Recovers data that is already consistent with the database and needs only to be made available.
  186. gd The right to delete existing data.
  187. ge sp_addrole
  188. gf full backup is restored first
  189. gg rights and permissions
  190. gh Blocks a user from modifying data in any table in the database. This overrides any object-level grant.
  191. gi any user in that group.
  192. gj Securables page
  193. gk public role
  194. gl a logical representation of a person within an electronic system.
  195. gm specific database functions
  196. gn EXEC sp_addrolemember Manager, Joe
  197. go restore to a point in time since the logs files record all SQL transactions and the time they were performed.
  198. gp may exist.