Term
A(n) ____ can be assigned permissions and used by applications to access databases.
A) Authentication Roles B) Authorization Roles C) Class Roles D) None Of The Above |
|
Definition
|
|
Term
____ is responsible for verifying that a user can connect to a SQL Server 2000 instance.
A) Authorization B) Authentication C) Application Roles D) Guest Roles |
|
Definition
|
|
Term
____ is responsible for checking permissions that determine which actions a particular user can perform within a database.
A) Application Roles B) Authentication Roles C) Authorization D) Ownership Roles |
|
Definition
|
|
Term
Which of the following is a security rating granted by the National Computer Security Center for products that have been evaluated against the Department of Defense Trusted Computer System Evaluation Criteria?
A) Class C2 B) Class C3 C) Class C4 D) Class C5 |
|
Definition
|
|
Term
Which of the following exists in every database and has permissions that perform all activities on that database?
A) Database User B) Database Owner C) Guest User D) Login User |
|
Definition
|
|
Term
Which of the following is an account within a database that is mapped to a login to provide access to the database?
A) Login User B) Database User C) Database Owner D) Object User |
|
Definition
|
|
Term
Which of the following are available in SQL Server 2000 instances to provide access to common instance wide administrative functionality?
A) Fixed Server Roles B) Mixed Server Roles C) Implied Server Roles D) Ownership Roles |
|
Definition
|
|
Term
Which of the following is a special account that can be used by people who have a login on an instance but do NOT have a mapped database user for the database they wish to access?
A)Fixed User B) Ownership Permission C) Guest User D) None Of The Above |
|
Definition
|
|
Term
Which of the following are special privileges that are provided by membership to a user-defined role?
A) Object Permissions B) Implied Permissions C) Fixed Permissions D) Ownership Permissions |
|
Definition
|
|
Term
Which of the following is an object that provides connection access to an instance of SQL Server 2000?
A) Object Permission B) Ownership Permission C) Guest Permission D) Login |
|
Definition
|
|
Term
Which of the following are applied to a user to control insert, update, and delete actions against tables?
A) Implied Statements B) Statement Permissions C) Object Permissions D) None Of The Above |
|
Definition
|
|
Term
Which of the following would be a hierarchy of dependent objects?
A) Implied chain B) Roles chain C) Statement Chain D) Ownership Chain |
|
Definition
|
|
Term
____ are used to administer permissions in a single location for multiple users.
A) Permissions B) Roles C) Fixed Roles D) None Of The Above |
|
Definition
|
|
Term
Which of the following permissions allows users to execute certain T-SQL statements, like create table and create view?
A) Object Permissions B) Implied Permissions C) Statement Permissions D) All Of The Above |
|
Definition
|
|
Term
Which of the following is NOT considered a benefit of Windows Authentication?
A) Automatic updating of accounts. B) Secure validation of credentials. C) Automatic locking out of accounts that repeatedly fail. D) Native auditing capabilities of Windows accounts. |
|
Definition
A) Automatic updating of accounts. |
|
|
Term
Which of the following is considered to be the first stage of security for SQL Server 2000?
A) Authorization B) Authentication C) Login Verification D) All Of The Above |
|
Definition
|
|
Term
Which of the following is the second stage of SQL Server 2000 security?
A) Authorization B) Authentication C) Statement Permissions D) Login Verification |
|
Definition
|
|
Term
If Windows Authentication is selected under the SQL Server login properties in the login tab, which of the following are specified to provide access to an instance?
A) Windows Domain B) User C) Group D) All Of The Above |
|
Definition
|
|
Term
When Windows groups are added as logins to SQL Server 2000 instances, which of the following statements is considered true?
A) It can help aid in organizing and controlling access for multiple users. B) It can hinder the ability of organizing and controlling access for multiple users. C) It can help aid in organizing and controlling access for single users only. D) None Of The Above |
|
Definition
A) It can help aid in organizing and controlling access for multiple users. |
|
|
Term
Which of the following would be considered a fixed server role?
A) sysadmin B) serveradmin C) securityadmin D) All Of The Above |
|
Definition
|
|