Looking for CCS6344-DATABASE AND CLOUD SECURITY test answers and solutions? Browse our comprehensive collection of verified answers for CCS6344-DATABASE AND CLOUD SECURITY at ebwise.mmu.edu.my.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Which of the following statements are true?
Use allcaps for T-SQL command keywords and encapsulate strings in single quotes ('). eBwise autograding is case sensitive, so take note of this. You should also test your query in SSMS to see if it runs correctly.
Write the T-SQL statement to create a login for Anwar with the password 'S5CUR3TY' with WideWorldImporters as his default database.
Is it possible to create a custom audit event?
There is little a database administrator can do against SQL Injection.
Which of the following hash functions ARE RECOMMENDED FOR USE on SQL Server?
In a recent security breach, Microsoft exposed millions of personal identifiable information in a vulnerability that exploited default settings of Power Apps. If Microsoft's revenue in 2021 was 45.3 billion USD, what is the maximum penalty they will be charged with under GDPR?
https://en.wikipedia.org/wiki/2021_Microsoft_Exchange_Server_data_breach
Which of the following is a administrative control to protect against code injection attacks?
HASHBYTES() uses CRYPT_GEN_RANDOM() function from the WINDOWS DPAPI library to generate random hex numbers.
Instance hijacking is possible due to Microsoft's own backdoor implemented to allow DBAs to recover access database instances.
What are the two requirements to implement Row-Level Security (RLS)?