162 Chapter4•ManagingSecurity Self Test 1. Which of the following is considered a Principal? A. SQL Server B. SQL Server Integration Services C. SQL Server Login D. SQL Server Agent 2. Which of the following is a securable object in a database schema? A. Database User B. Database C. Service D. Procedure 3. Which of the following fixed server-level roles enables a member to add and remove linked servers? A. Securityadmin B. Setupadmin C. Serveradmin D. Dbcreator 4. You have a team member who needs the ability to manage SQL Server logins and you do not want them to have permissions to perform any task on the server. Their responsibilities include resetting logins as well as granting, denying, and revoking database-level and server-level permissions. Which of the following server-level roles best fits their permissions requirement? A. Serveradmin B. Sysadmin C. Securityadmin D. Processadmin 5. Which of the following can be added to a server-level role? A. Windows group B. Database User ManagingSecurity•Chapter4 163 C. Database-level role D. Domain server account 6. Which of the following database-level roles limits a user’s permissions to reading all data from all user tables? A. db_owner B. db_datareader C. db_datawriter D. db_securityadmin 7. You have a user that requires the permissions to drop a database and perform any configuration and maintenance tasks. Which of the following actions would violate “The Principle of Least Privilege”? A. Adding the user to the db_datareader role B. Adding the user to the db_owner role C. Adding the user to the sysadmin role D. Giving the user permission to modify tables 8. Which of the following can be mapped to a database User? A. Windows account B. Login C. Windows group D. Domain account 9. Although T-SQL can be used to create database users, which of the following SQL Server management tools can also be used? A. SQL Server Configuration Manager B. The Surface Area Configuration Fact C. Microsoft Visual Studio D. SQL Server Management Studio 10. Which of the following defines mixed mode authentication? A. Connections can only be made using Windows accounts. B. Connections to SQL Server can be made with either Windows accounts or with SQL Server Logins. 164 Chapter4•ManagingSecurity C. Connections can only be made using SQL Server Logins. D. Connections can only be made using database Users. 11. Which of the following is an advantage to using mixed mode authentication? A. Users can connect from unknown or untrusted domains B. The Kerberos security protocol C. Windows password policies D. Windows accounts are maintained outside of SQL Server 12. Which SQL Server tool is changed in the Authentication Mode? A. SQL Server Configuration Manager B. Visual Studio C. SQL Server Management Studio D. The Surface Area Configuration Facet 13. When you change the Authentication Mode, what action do you need to perform before the mode change takes effect? A. Reboot the server operating system. B. Lock out all the database users. C. Restart SQL Server Agent. D. Restart the SQL Server Instance. 14. Jose has ownership of database tables in database A and database B, both of which reside in the same instance of SQL Server where cross database ownership chaining has been enabled. Jose uses a database view in database A to join both tables in order to retrieve the needed data. Jose grants Jack permission to use her database view. What other permissions need to be granted in order for Jack to retrieve data using Jose’s view? A. Jack needs to be granted read permissions to the table in database B that is used by the view. B. Since cross database ownership chaining is enabled in this instance, no additional permissions need to be granted. C. The tables used by the view in database A and B need read permissions granted to Jack. ManagingSecurity•Chapter4 165 D. Jack cannot use Jose’s view since she is the owner. Jack will need his own view and permissions. 15. Which of the following is an Execution Context? A. Execute sp_srvrolepermission B. Execute sp_dbfixedrolepermission C. Execute sp_addrole D. Execute AS user_name 16. Which of the following is captured when using CDC? A. SELECT B. ALTER C. EXECUTE D. UPDATE 17. You want to prevent changes to tables in one of the databases in your SQL Server instance since changes to any of the tables can cause the associated client application to stop functioning. What can be implemented to prevent any tables from being changed? A. A stored procedure B. A database-level DDL trigger C. A DML trigger D. A server-level DDL trigger 18. Which tool is used to enable SQL Server features not automatically enabled, such as Database Mail, when SQL Server is installed. A. SQL Server Configuration Manager B. Visual Studio C. Surface Area Configuration Facet D. SQL Server Installation Center 19. What is used to apply appropriate subsystem permissions to SQL Server Agent tasks? A. Database-level roles B. Proxies 166 Chapter4•ManagingSecurity C. Server-level roles D. Credentials 20. Which SQL Server tool is use to manage SQL Server services such as the SQL Server Agent and SQL Server Integration services? A. Surface Area Configuration Manager Facet B. SQL Server Management Studio C. Visual Studio D. SQL Server Configuration Manager . maintained outside of SQL Server 12. Which SQL Server tool is changed in the Authentication Mode? A. SQL Server Configuration Manager B. Visual Studio C. SQL Server Management Studio D. The Surface Area. Chapter4•ManagingSecurity Self Test 1. Which of the following is considered a Principal? A. SQL Server B. SQL Server Integration Services C. SQL Server Login D. SQL Server Agent 2. Which of the following is a securable. Chapter4•ManagingSecurity C. Server- level roles D. Credentials 20. Which SQL Server tool is use to manage SQL Server services such as the SQL Server Agent and SQL Server Integration services? A.