
202 True/False questions
-
Object permissions are permissions that allow a user to act on ___ , such as tables, stored procedures, and views. → database objects
-
Ownership chains apply to ___ → The right to modify existing data. Update rights for which a WHERE clause is
used require select rights as well. Update permission can be set on specific columns. -
The sysadmin role is a powerful one, and you must be sure not to grant it to the ___ user login. → assigned
-
Fixed server role: Serveradmin ??? → Can perform bulk insert operations.
-
Within SQL Server, users are assigned to roles, which may in turn ___ permission to objects... each object has an owner, and ownership also affects permissions. → grant
-
Access, roles, and permissions can be assigned to the Windows user group, and they will apply to ___ → GRANT, REVOKE, and DENY.
-
Fixed server role: Securityadmin ??? → Can manage the logins for the server.
-
To remove a Windows user or group from SQL Server, you can also use the ___ → server environment.
-
Within SQL Server, users are assigned to ___, which may in turn grant permission to objects... each object has an owner, and ownership also affects permissions. → Securables page
-
An ___ is a database-specific role intended to allow an application to gain access regardless of the user. → application role
-
Instead of granting the permission to a user from the properties of the object, you can also grant permissions to an object from the ___ → properties of the user.
-
SQL Server includes ___ . Primarily, these roles grant permission to perform certain server-related administrative tasks. → • Simple Recovery
• Full Recovery
• Bulk-Logged -
Incremental backups are smaller and faster than ___ → the last full backup.
-
fixed database role: «db_denydatawriter» ??? → Blocks a user from modifying data in any table in the database. This overrides any object-level grant.
-
Partial restore ??? → Contains all the data in a specific database or set of filegroups or files to allow recovering that data.
-
Backups that SQL Server supports: ??? → Full, differential, and incremental backups.
-
A ___ is a logical representation of a person within an electronic system. → last backup of the data.
-
Recovery only ??? → Recovers data that is already consistent with the database and needs only to be made available.
-
Differential file backups ??? → A backup of one or more files that contain data extents that were changed since the most recent full backup of each file.
-
Bulk-Logged ??? → Allows good performance while using the least log space.
-
Because SQL Authentication is less secure than Windows logins, avoiding mixed mode is ___ ; however, it is available for backward compatibility. → recommended
-
Object permission: Insert ??? → The right to delete existing data.
-
Object permission: Update ??? → The right to delete existing data.
-
You can manage database access from either the ___ or the database side. → login side
-
___ interacts with the server and database roles. → Granting object permission
-
Guest users must be removed from a database when they are no longer welcome, as they are a ___ → risk for a security breach.
-
The ___ is used to assign or check object permissions. → SSMS »» database »» open the object to manage (tables, views, stored procedure, functions) »» Properties »» Click the Permissions page »» add user/role »» Select the appropriate Grant to Deny permission.
-
Three different types of accounts are available for the SQL Server service account: ___ → Local user account, Local system account, Domain user account.
-
If you add a user to the sysadmin role group, that user must reconnect to the SQL Server instance in order for the full capabilities of ___ → full access to every server function, database, and object
-
An incremental backup is based on the ___ → full backups and differential backups.
-
Differential partial backup ??? → A backup of one or more files that contain data extents that were changed since the most recent full backup of each file.
-
To remove Lauren's database access, the system-stored procedure DROP USER requires her database username, not her ___ → the guest user account has been created.
-
An application role is a database-specific role intended to allow an ___ → fixed server role.
-
Local users can be managed by selecting ___ → Control Panel > Administrative Tools > Computer Management.
-
The disadvantages of Full Recovery mode is that the logs ___ → can grow a lot.
-
Because SQL Authentication is less secure than Windows logins, avoiding mixed mode is recommended; however, it is available for ___ → recommended
-
To add a user to a «database role», follow these steps: → DROP ROLE Manager
-
Any user who wishes to access a database but who has not been declared a user within the database is ___ → modified as desired after installation.
-
fixed database role: «db_datawriter» ??? → Allows a user to write to all data in the database. This role is the equivalent of a grant on all objects, and it can be overridden by a deny permission.
-
Fixed server role: Dbcreator ??? → Can create, alter, drop, and restore databases.
-
Transact-SQL command to drop user: ___ → DROP USER userTeste
-
Piecemeal restore ??? → Restore specific files or filegroups to a database.
-
The following code grants select permission to Joe for the Emails table: → GRANT Select ON Emails TO Joe
-
Object permissions are assigned with the SQL DCL commands GRANT, ___ → GRANT, REVOKE, and DENY.
-
Creates the «database role» AUDITORS, which is owned by the «db_securityadmin» «fixed database role»: → CREATE ROLE auditors AUTHORIZATION db_securityadmin;
-
A user may have multiple permission ___ to an object (e.g., individually, through a standard database role, and through the public role). If any of these ___ are denied, then the user is blocked from accessing the object. → paths
-
In the security model for a SQL Server, there are three different methods by which a user can be initially identified: ___ → Latest full backup of the data
-
___ always has a higher priority than the Grant permission. → Deny permission
-
A user may have multiple permission paths to an object (e.g., individually, through a standard database role, and through the public role). If any of these paths are denied, then the user is blocked from ___ → paths
-
Instead of granting the permission to a user from the ___ , you can also grant permissions to an object from the properties of the user. → properties of the object
-
Regardless of an organization's size, the end result of its ___ should be to ensure that users' assigned rights and responsibilities are enforced through a security plan. → backward compatibility.
-
Differential backup only backs up data since ___ → establishing or confirming a user or system identity.
-
You cannot modify ___ to a fixed server role. → the permissions assigned
-
Within SQL Server, users are assigned to roles, which may in turn grant ___ ... each object has an owner, and ownership also affects permissions. → EXEC sp_addrolemember Manager, Joe
-
fixed database role: «db_ddladmin» ??? → Authorizes a user to issue DDL commands (create, alter, drop).
-
The ___ is a special role that has all permissions in the database. → db_owner
-
A particularly powerful permissions organization technique is to design a ___ of standard database roles. → fixed server role.
-
You cannot modify the permissions assigned to a ___ → granting, revoking, or denying user login permissions.
-
Page restore ??? → A backup of all the full data in the primary filegroup, every read/write filegroup, and any optionally specified read-only files or filegroups. A partial backup of a read-only database contains only the primary filegroup.
-
File restore ??? → Restore part of a database.
-
File backups should be used only where they clearly add value to your ___ → restore plan.
-
Transaction log restore ??? → Restore part of a database.
-
Because SQL Server is an environment within the Windows Server system, one of your primary security concerns should be ensuring that the Windows Server itself is ___ → secure.
-
Fixed server role: Diskadmin ??? → Can configure the server-wide settings, including setting up full-text searches and shutting down the server.
-
Full backup: ___ → Restores a file or filegroup in a multi-filegroup database. After a full file restore, a differential file backup can be restored.
-
Using Windows Authentication means that users must have a ___ in order to be recognized by SQL Server → access the object.
-
fixed database role: «db_denydatareader» ??? → Authorizes a user to read all data in the database. This role is the equivalent of a grant on all objects, and it can be overridden by a deny permission.
-
To restore the AdventureWorks database using the C:\AdventureWorks.BAK backup, you would execute the following command: ___ → database snapshot.
-
Restore scenarios possible in SQL Server include the following: ___ → Complete database restore, File restore, Page restore, Piecemeal restore, Recovery only, Transaction log restore, Create a mirror database, Create and maintain a standby server.
-
If a user does not have the ___ , the highest level object permission would be the Grant and Deny object permissions. → sysadmin server role
-
A permission is used to grant an entity access to an ___ → database snapshot.
-
The following code sample assigns Joe to the manager role: → EXEC sp_addrolemember Manager, Joe
-
In the Restore options panel, you can choose any of the following options : ___ → Complete database restore, File restore, Page restore, Piecemeal restore, Recovery only, Transaction log restore, Create a mirror database, Create and maintain a standby server.
-
You can ___ new backups to any existing backups on a device, or you can overwrite any existing backups. → overwrite
-
Full Recovery allows you to ___ → Can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object.
-
Several specific types of object permissions exist: ___ → The right to delete existing data.
-
At the SQL Server level, where the database resides, users are known by their ___ . This can be a SQL Server login, a Windows domain login, or a username login. → login names
-
Complete database restore ??? → Restores individual pages.
-
At restore time, the full backup is restored ___, followed by the most recent differential backup. → first
-
Each object's permission is assigned through granting, ___ , or revoking user login permissions. → object.
-
Steps to modify an object's permissions: ___ → ALL, SELECT, INSERT, DELETE, REFERENCES, UPDATE, or EXECUTE.
-
Only select and update permissions can be set at the column level, because inserts
and deletes ___ → granting, revoking, or denying user login permissions. -
Fixed server role: Processadmin ??? → Can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object.
-
Object permission: Select ??? → Can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object.
-
Remove the role from the database → Can kill a running SQL Server process.
-
In SQL Server, «fixed database roles» include the following: → Authorizes a user to read all data in the database. This role is the equivalent of a grant on all objects, and it can be overridden by a deny permission.
-
Over time, as a database is updated, the amount of data that is included in differential backups increases. This makes the backup slower to create and to restore. Eventually, another ___ to provide a new differential base for another series of differential backups. → full backup must be created
-
Object permissions are assigned with the SQL DCL commands: ___ → The right to execute stored procedures or user-defined functions.
-
The Securables page is used to ___ → assign or check object permissions.
-
Users must be explicitly granted access to ___ → any user database.
-
Granting object permission interacts with ___ → The right to modify existing data. Update rights for which a WHERE clause is
used require select rights as well. Update permission can be set on specific columns. -
A user account is ___ → a logical representation of a person within an electronic system.
-
The sysadmin role can perform any ___ in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object. → activity
-
Revoking a permission removes the permission that has been assigned, regardless of whether it was a ___ permission. → denied or a granted
-
It is important to be aware of the ___ associated with each object in a database because it's possible to inadvertently grant administrative rights to objects or users that should not have them. → rights and permissions
-
There are three kinds of database server roles: ___ → assign or check object permissions.
-
The ___ is a fixed role, but it can have object permissions like a standard role. Every user is automatically a member of the ___ and cannot be removed, so the ____ serves as a baseline or minimum permission level. → public role
-
Transaction log restore ??? → Under the full or bulk-logged recovery model, since the logs record each transaction, restoring from log backups is required to reach a desired recovery point.
-
In Transact-SQL code, you can add a user to a fixed database role by using the ___ system stored procedure. → sp_addrole
-
Revert a database to the point in time captured by a ___ → Authorizes a user to read all data in the database. This role is the equivalent of a grant on all objects, and it can be overridden by a deny permission.
-
It is possible for users who have not been granted direct access to a database to gain access using the ___ user account - and with this account, they can make limited changes within the database server. → "guest"
-
Windows Authentication is very robust in that it will authenticate not only Windows users, but also users within ___ → Windows user groups.
-
fixed database role: «db_owner» ??? → Authorizes a user to read all data in the database. This role is the equivalent of a grant on all objects, and it can be overridden by a deny permission.
-
The one user that SQL Server automatically creates during installation of the software is ___ → BUILTINS/Administrator
-
Create and maintain a standby server ??? → When the active server fails, the passive server will become the active server, allowing for minimum downtime.
-
Grants all permissions to the «public role» for the Contacts table: → GRANT All ON Contacts TO dbcreator
-
fixed database role: «db_datareader» ??? → Can manage the logins for the server.
-
Fixed server role: Setupadmin ??? → Can configure the server-wide settings, including setting up full-text searches and shutting down the server.
-
Performing a backup operation has minimal effect on ___ → transactions that are running;
-
Domain user account is the recommended login account because the SQL Server can then use the ___ specifically created for it. → Active Directory Users and Computers snap-in.
-
Differential base or base of the differential ??? → full backups and differential backups.
-
At restore time, the ___ , followed by each incremental backup following the full backup. → delayed
-
Each object's permission is assigned by ___ → The right to delete existing data.
-
Types of partial backups supported by SQL Server: ___ → Partial backup & Differential partial backup
-
Revoking a permission ___ the permission that has been assigned, regardless of whether it was a denied permission or a granted permission. → denied or a granted
-
Object permission: DRI (References) ??? → The right to insert data.
-
Transact-SQL syntax so that you can add the windows username: cbastiao from domain name: WS2008 → database snapshot.
-
The guest user account is not actually created when a___ → database is created;
-
Usually, a differential base is ___ → used by several successive differential backups.
-
Object permissions are permissions that allow a user to act on database objects, such as ___ → modified as desired after installation.
-
Ownership chains are great for developing tight security where users execute stored procedures but aren't granted direct permission to ___ → Granting object permission
-
A Windows login can be removed from SQL Server through SSMS...this doesn't
delete the user from ___ ; it only removes the user from SQL Server. → the permissions assigned -
A user may have multiple permission paths to an object (e.g., ___ ). If any of these paths are denied, then the user is blocked from accessing the object. → individually, through a standard database role, and through the public role
-
Complete restore ??? → Restores individual pages.
-
Simple Recovery requires the ___ since the transaction log backups are truncated on a regular basis. → least administration
-
Generically, to restore the database using the specified file, you would execute the following command: ___ → RESTORE DATABASE name_of_database FROM DISK = 'name of backup'
-
the following code adds the user login ''XPS\Lauren'' to the sysadmin role: ___ → EXEC sp_addsrvrolemember 'XPS\Lauren', 'sysadmin'
-
The guest user account is ___ when a database is created; → not actually created
-
The ___ can perform any activity in the SQL Server installation, regardless of any other permission setting. The ___ even overrides denied permissions on an object. → Granting object permission
-
___ only backs up data since the last full backup. → Differential backup
-
Within SQL Server, users are assigned to roles, which may in turn grant permission to objects... each object has an owner, and ___ also affects permissions. → Deny permission
-
Database backup ??? → A full backup of the whole database.
-
The purpose of a database backup is ___ → to have something to restore if data is lost during a business's daily routine.
-
Create a mirror database ??? → When the active server fails, the passive server will become the active server, allowing for minimum downtime.
-
Fixed server roles are set in SSMS in the Server Roles page of the ___ → assign or check object permissions.
-
«Fixed database roles» can be assigned via SSMS using either of the following procedures: ___ → • By adding the role to the user in the user's Database User Properties form (Database » Security » Users » Properties of user )
• By adding the user to the role in the Database Role Properties dialog (Database » Security » Roles » Database Roles » Properties of role) -
The following code grants select and update permission to the guest user and to LRN: → GRANT Select, Update ON Emails to Guest, LRN
-
To create a login using Transact-SQL syntax so that you can add a Windows user or group run the ___ → differential base.
-
To grant access to a database from the login side using Object Explorer, use the User Mapping page of the ___. → 1. SSMS »» expand the database folder »» Security folder »» Roles »» Database Roles folder.
2. Double-click the appropriate role to open the Database Role Properties dialog box.
3. Add or remove users from the role. -
Differential database backups ??? → Restores an entire database, beginning with a full database backup, which may be followed by restoring a differential database backup (and log backups).
-
The most common login method involves supplying a ___ → username and password.
-
The db_owner is a special role that has ___ → ALL, SELECT, INSERT, DELETE, REFERENCES, UPDATE, or EXECUTE.
-
When you have a ___ server, you are using an active-passive cluster that consists of two or more servers. → standby
-
Even though a user may belong to a fixed database role and have certain administrative level permissions, he or she still cannot access data without first being granted permission to ___ (e.g., tables, stored procedures, views, functions). → database objects
-
Transactions that are running during the backup are never ___ → Database backup & Differential database backups
-
The «sa account» is the built-in SQL administrator account associated with ___ → object.
-
There are three kinds of database server roles: fixed roles, the public role, and ___ → db_accessadmin,
db_backupoperator,
db_datareader,
db_datawriter,
db_ddladmin,
db_denydatareader,
db_denydatawriter,
db_owner,
db_securityadmin. -
A local user account cannot be used outside the ___ → server environment.
-
If a user does not have the sysadmin server role, the highest level object permission would be the ___ → Grant and Deny object permissions.
-
Types of file backups supported by SQL Server: ___ → File backup & Differential file backups
-
Removes a user from an assigned role: → assign or check object permissions.
-
The Windows SID (___) is passed to SQL Server. → File backup & Differential file backups
-
You can manage database access from either the login side or the ___ → database side.
-
A login or logon is ___ → Recovers data that is already consistent with the database and needs only to be made available.
-
A differential backup contains only the data that has changed since the ___ → the last full backup.
-
The BUILTINS/Administrators user can be deleted or ___ → security identifier
-
Object permission: Execute ??? → The right to execute stored procedures or user-defined functions.
-
SQL servers also support mixed mode, which allows you to connect to a SQL server using ___ → Windows authentication or SQL Server authentication.
-
Each object's permission is assigned through ___ , denying, or revoking user login permissions. → granting
-
Windows Authentication mode is superior to ___ because users don't need to learn yet another password and because it leverages the security design of the network. → mixed mode
-
Granting permission means that a user can ___ → access the object.
-
Object permission: Delete ??? → The right to delete existing data.
-
File backup ??? → A full backup of all the data in one or more files or filegroups.
-
user-defined roles are typically employed for users who need to perform ___ but to whom you don't want to grant a role that would permit them do more than what they need to. → fixed roles, the public role, and user-defined roles.
-
fixed database role: «db_securityadmin» ??? → Authorizes a user to access the database, but not to manage database level security.
-
During a backup operation, SQL Server copies the data directly from the database files to the ___ → backup devices.
-
Domain users are managed with tools such as the ___ → Active Directory Users and Computers snap-in.
-
The following code creates the manager role: → EXEC sp_addrolemember Manager, Joe
-
The sysadmin role can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides ___ on an object. → activity
-
SQL Server offers three recovery models for each database. They are: ___ → • Simple Recovery
• Full Recovery
• Bulk-Logged -
To grant access from the database point of view, use the ___ under the Database > Security > Users node to open the Database User-New form. → User Mapping page
-
user-defined roles are typically employed for users who need to perform specific database functions but to whom you don't want to grant a role that would permit them do ___ → more than what they need to.
-
Page restore ??? → Allows good performance while using the least log space.
-
Users may be assigned to multiple roles, so multiple security paths from a user to an object ___ → database snapshot.
-
To grant access to a database from the login side using Object Explorer, use the ___ of the Login Properties form. → database snapshot.
-
Each object's permission is assigned through granting, denying, or ___ user login permissions. → denying
-
Partial backup ??? → A full backup of the whole database.
-
Deny permission always has a higher priority than the ___ → access the object.
-
When you have a ___ , you have duplicate databases on multiple servers. → security identifier
-
Once users exist in the Windows user list or the Windows domain, SQL Server can ___ → Partial backup & Differential partial backup
-
The Transact-SQL RESTORE command enables you to perform the following restore scenarios: ___ → • Overwrite the existing database.
• Preserve the replication settings.
• Prompt before restoring each backup.
• Restrict access to the restored database. -
Types of database backups supported by SQL Server: ___ → security identifier
-
A SQL Server login account and related passwords are defined on the SQL server and are not related to ___ → Active Directory or Windows accounts.
-
An incremental backup contains only the data that has changed since the ___ → differential base.
-
if you add a user to the sysadmin role, that user now has ___ for that server. → Active Directory Users and Computers snap-in.
-
Authentication is the act of ___ → a logical representation of a person within an electronic system.
-
The Transact-SQL statement to provide permission to an object for a specific user and his or her role is as follows: → GRANT Select, Update ON Emails to Guest, LRN
-
Denying permission overrides ___ → a granted permission.
-
You can append new backups to any existing backups on a device, or you can ___ any existing backups. → full backups and differential backups.
-
File restore ??? → Restores individual pages.
-
To restore data through the graphical interface tool, follow these steps: ___ → 1. SSMS »» expand the database folder »» Security folder »» Roles »» Database Roles folder.
2. Double-click the appropriate role to open the Database Role Properties dialog box.
3. Add or remove users from the role. -
Any user who wishes to access a database but who has not been declared a user within the database is automatically granted the privileges of the guest user, as long as ___ → database snapshot.
-
SQL Server includes fixed, predefined server roles. Primarily, these roles grant permission to ___ → perform certain server-related administrative tasks.
-
The assigned permission may be ___ → ALL, SELECT, INSERT, DELETE, REFERENCES, UPDATE, or EXECUTE.
-
You can perform a SQL Server backup with minimal effect on ___ → production workloads.
-
fixed database role: «db_backupoperator» ??? → Allows a user to perform backups, checkpoints, and DBCC commands,
but not restores (Only server sysadmins can perform restores.) -
fixed database role: «db_accessadmin» ??? → Can kill a running SQL Server process.
-
Fixed server role: Sysadmin ??? → Can perform any activity in the SQL Server installation, regardless of any other permission setting. The sysadmin role even overrides denied permissions on an object.
-
The public role is a fixed role, but it can have object permissions like a standard role. Every user is automatically a member of the public role and cannot be removed, so the public role serves as ___ → GRANT Permission, Permission
ON Object
TO User/role, User/role
WITH GRANT OPTION -
Fixed server role: Bulkadmin ??? → Can create, alter, and drop disk files.
-
A Transact-SQL command to grant database access to a user: ___ → CREATE USER [LRN]
FROM LOGIN [WS2008\cbastiao] -
The counterpart to creating a role is removing it. A role may not be dropped if any users are currently ___ to it. → assigned