Skip to main content

DATABSE SECURITY

1.       What are the security architecture of sql server ? Principal, securable and permission .
2.       What are authentication modes of sql server ? Windows mode, and mixed modes ?
3.       What is principal and what are principals ?
4.       What is securable and what are securable ?
5.       What is permissions and what are permissions ?
6.       What is roles in sql server ? Fixed server and fixed database role ?
7.       What are fixed database roles in sql server ?
8.       What are principals at various levels ?
9.       What are securable at various levels ?
10.   What are major permissions ?
11.   What are fixed servers – bulk_admin, sys_admin, disk_admin, server_admin,security_admin
12.   What are fixed db Roles – Backup_operator,Data_reader,Data_Writer,Deny_datareader,deny_datawriter,
13.   What is difference between GRANT, Deny and Revoke ?
14.   What are orphaned users ?
15.   How to handle or manage orphaned users ?
16.   Explain the process to make logins, create users and give permission to objects ?
17.   What is difference between login and users ?
18.   What is SSO ?
19.   What is Ownership Chain ?
20.   Where does Login Stores in Database ?
21.   How to give roles or access a login to take backup only .
22.   What is the Security Architecture of your organization ?
23.   How to transfer logins from one server to another server ?
24.   What is difference between Authentication and Authorization ?
25.   What is SSCM, SAC and SNAC ?
26.   What is default PORT of SQL Server and How to configure ?
27.   Can we configure sql port other than 1433. how and why...?
28.   What is TDE and How to implement it ?
29.   What is Encryption and what are the data encryption method in SQL 2008 ?
30.   What is Surface Area Configuration in sql server 2005 ? What we can do with this ?
31.   What are Endpoints in SQL Server ? How to configure ?
32.   What are the major security Artifacts we should to follow to create a secured Database Environment ?

33.   Can we give permission for insert/update without giving select permission to users.

Popular posts from this blog

History of MySQL from AB Corp to Cloud Database

MySQL was created by a Swedish company, MySQL AB, founded by David Axmark, Allan Larsson and Michael "Monty" Widenius. Original development of MySQL by Widenius and Axmark began in 1994. The first version of MySQL appeared on 23 May 1995. Its name is a combination of "My", the name of co-founder Michael Widenius's daughter,and "SQL", the abbreviation for Structured Query Language. ·          23 May 1995 - First internal release ·          Year 1996 - Version 3 o     Simple CRUD operations o     January 1997 Windows version was released on 8 January 1998 for Windows 95 and NT o     production release 1998, from www.mysql.com ·          Year 2002 - Version 4 o     MyISAM o     unions o     Tracking o     B-trees o     s...

How to add an article in Transactional Replication

If we have a set-up of Transactional Replication for Data Distribution running and wanting to add new object to replication on other server we can follow below process. To add an article In Transaction replication with PUSH Subscription 

Configure Impersonation Authentication in IIS8 for MVC Application

Impersonation is when ASP.NET executes code in the context of an authenticated and authorized client. By default, ASP.NET does not use impersonation and instead executes all code using the same user account as the ASP.NET process, which is typically the ASPNET account. There are 5 below steps by which we can establish Impersonation configuration in our secured application environment. 1.)    Creation of Application/Proxy user where Application is hosted. 2.)    Give appropriate access to the user. 3.)    Create Database Login user on database. 4.)    Authenticate User and provide credential on IIS. 5.)    Then Configure web.config on Application.