Quiz

QUESTION 1

Randomized encryption is more secure and prevents users from deducing other values in the same column:

a. True
b. False

4 points   

QUESTION 2

Which is not a disadvantage of Transparent Database Encryption (TDE)?

a. Consumes more processor resources
b. Does not encrypt data in the database engine’s pool
c. Encryption is transparent to applications that do not have to be modified
d. Solely works with Enterprise Edition

4 points   

QUESTION 3

What are the steps to encrypt data?

a. Encrypt the column using the symmetric key, create a certificate that will protect the DMK, create the DMK, and create symmetric key using the certificate that will be used for column encryption
b. Create the DMK, create a certificate that will protect the DMK, create symmetric key using the certificate that will be used for column encryption, encrypt the column using the symmetric key
c. Create a certificate that will protect the DMK, create the DMK, create symmetric key using the certificate that will be used for column encryption, encrypt the column using the symmetric key,
d. Create symmetric key using the certificate that will be used for column encryption, encrypt the column using the symmetric key, create a certificate that will protect the DMK, create the DMK

4 points   

QUESTION 4

This is generated automatically the first time it is needed to encrypt another key:

a. Automated key processor (AKP)
b. Security Optimizer
c. Service Master Key
d. System .ini file

4 points   

QUESTION 5

Always Encrypted uses three key types: (Master data encryption key, SSO, and scrambler wizard)

a. True
b. False

4 points   

QUESTION 6

________________encryption allows for transparent retrieval of data through equality comparisons:

a. Selective
b. Randomized
c. Determined
d. Optimistic

4 points   

QUESTION 7

___________ is a feature in SQL Server 2016 that allows you to encrypt data at rest and in flight:

a. Extensible key management (EKM)
b. Always Encrypted (AE)
c. Encryption Management Services (EMS)
d. Enterprise Planning System (EPS)

4 points   

QUESTION 8

Asymmetric keys can be used to protect column level encryption

a. True
b. False

4 points   

QUESTION 9

Which method is not a resource for troubleshooting encryption errors?

a. Data dictionary
b. Error log
c. Event logs
d. sys.security policies

4 points   

QUESTION 10

Which of the following is not a part of the encryption and key management hierarchy?

a. Symmetric key
b. Database Master Key
c. Certificate
d. Encryption Key

 

"Get Help With Your Essay
. If you need assistance with writing your essay, our professional essay writing service is here to help!

Order Now