Which of the following best describes the difference between symmetric and asymmetric keys?. An asymmetric key uses the same password to encrypt and decrypt the data and a symmetric key
Trang 1192 Chapter 5 • Managing Data Encryption
14 Which of the following best describes the difference between symmetric and asymmetric keys?
A An asymmetric key uses the same password to encrypt and decrypt the data and a symmetric key uses a public key to encrypt the data and a private key to decrypt the data
B An asymmetric key uses the same password to encrypt and decrypt the data and a symmetric key uses a private key to encrypt and a public key to decrypt the data
C A symmetric key uses the same password to encrypt and decrypt the data and an asymmetric key uses a public key to encrypt and a different password/ private key to decrypt the data
D A symmetric key uses the same password to encrypt and decrypt the data and
an asymmetric key uses a private key to encrypt and a different password/ public key to decrypt the data
15 Which of the following best describes EFS encryption?
A Encryption occurs at the file-level
B Encryption occurs at the database-level
C Encryption occurs at the cell-level
D Encryption occurs at the server-level
16 When you are using Encrypting File System (EFS) with SQL Server, which SQL server account must have access to file encryption keys encrypting any database files?
A SQL Server agent account
B Database server, service account
C SA account
D SQL executive account
17 In which of the following is EFS best used?
A Web server
B Database server
C Workstation
D Application server
Trang 2Managing Data Encryption • Chapter 5 193
18 Which of the following best describes SQL Server 2008 Extensible Key
Management?
A Enables third-party EKM/HSM vendors to register their modules in
SQL Server
B Enables easy management of Encrypting File System (EFS) encryption
C Enables easy creation of an EKM key with another EKM key
D Enables easy back up of a database encryption key
19 In which of the following editions of SQL Server 2008 is Extensible Key
Management available?
A Workgroup edition
B Web edition
C Enterprise edition
D Express edition
20 Which system stored procedure is used to enable Extensible Key Management?
A Sys.dboption
B Sys.sp_configure
C Sys.sp_helpdb
D Sys.sp_addextendedproc
Trang 3194 Chapter 5 • Managing Data Encryption
Self Test Quick Answer Key
1 C
2 B
3 D
4 C
5 A
6 B
7 D
8 A
9 B
10 D
11 D
12 B
13 C
14 C
15 A
16 B
17 C
18 A
19 C
20 B
Trang 4Exam objectives review:
˛ Summary of Exam Objectives
˛ Exam Objectives Fast Track
˛ Exam Objectives Frequently Asked Questions
˛ Self Test
˛ Self Test Quick Answer Key
Exam objectives in this chapter:
Defining High Availability
■
■
SQL High-Availability Options
■
■
Expandability
■
■
Managing High
Availability
Chapter 6
MCTS SQL Server 2008
Exam 432
Trang 5196 Chapter 6 • Managing High Availability
Introduction
This chapter focuses on how high availability ensures that your application is always available High availability incorporates such technologies as clustering, log shipping, and replication These will all be covered in detail, along with the pros and cons
of each, in the following chapter Clustering has improved in SQL 2008, and these improvements are discussed in this chapter
It’s important to have a good understanding of the differences between each technology, as each has its own advantages and disadvantages
Hot-add CPU support and hot-add memory support will also be explained in this chapter
We will also touch on fault tolerant disk subsystems, like RAID 5 and
mirroring It’s important to understand the performance implications of using different disk systems
Defining High Availability
The basic definition of high availability is a solution that allows for a hardware or software failure but continues to run Simple high-availability solutions include using redundant hard drives, redundant memory, or redundant CPUs in your server
As you get into more advanced solutions you will have redundant servers to provide redundancy in the event of a software problem on one of the servers In this case the backup server will take over for the failed server either manually or
automatically
When you are dealing with redundant hard drives you have several options When you configure redundant hard drives you can create what is called a RAID array—a Redundant Array of Inexpensive Disks (or Redundant Array of Independent Disks) The exact array depends on the number of disks you have, the protection level you want, and the performance that you want to get from the system
All RAID levels require at least two disks, and some require three or four disks Each RAID level has its strengths and weaknesses Understanding these strengths and weaknesses is key in deciding which RAID level you should select
RAID 0 (also called a stripe set) is where all the disks are written to at the same time The upside to this RAID level is that it is very fast, and you get the most amount of storage for your money The downside to this system is that there is no redundancy Because there is no redundancy in a RAID 0 array, if any disk in the RAID array fails then all data on the RAID array is lost
RAID 1 (also called a mirror set) is where you have two disks, and as data is written to the first disk, it is also written to the second disk at the same time