Between Windows Authentication and SQL Server Authentication, which one is trusted and which one is untrusted?

1 Answer

Answer :

Windows Authentication is trusted because the username and password are checked with the Active Directory, the SQL Server authentication is untrusted, since SQL Server is the only verifier participating in the transaction.

Related questions

Description : Between Windows Authentication and SQL Server Authentication, which one is trusted and which one is untrusted?

Last Answer : Windows Authentication is trusted because the username and password are checked with the Active Directory, the SQL Server authentication is untrusted, since SQL Server is the only verifier participating in the transaction.

Description : What connections does Microsoft SQL Server support? 

Last Answer : Windows Authentication (via Active Directory) and SQL Server authentication (via Microsoft SQL Server username and password). 

Description : What connections does Microsoft SQL Server support?

Last Answer : Windows Authentication (via Active Directory) and SQL Server authentication (via Microsoft SQL Server username and password).

Description : A _____ is a computer, appliance, or router that sits between the trusted and untrusted systems. (1) bridge (2) switch (3) firewall (4) hub

Last Answer : firewall

Description : Define what is Authentication and Authorization?

Last Answer : Authentication is the process of identifying users. Authentication is identifying/validating the user against the credentials (username and password). Authorization performs after authentication. Authorization ... on identity. Authorization allowing access to the specific resource to the user.

Description : What is meant by a SQL injection attack? How can you prevent them from occurring in your application? 

Last Answer : SQL injection attacks occur when a malicious user attempts to execute SQL code by passing a SQL string to the application through user input. You can guard against SQL injection attacks by validating the format of all strings derived from user input that are used to form ad hoc SQL statements.

Description : In Visual Basic .NET or Visual C# programming, when would you use Structured Query Language (SQL)? How are they executed? 

Last Answer : ADO.NET handles most of the database communication for you behind-thescenes. You would only use SQL statements when generating ad-hoc queries for the database. You execute SQL statements by ... returning statements, such as DELETE, INSERT INTO, or UPDATE statements, use the ExecuteNonQuery method.

Description : What are the four major parts of a SQL SELECT statement? Briefly describe each one.

Last Answer : The four major parts of a SELECT statement are SELECT, FROM, WHERE, and ORDER BY. SELECT specifies the fields to be retrieved. FROM specifies the table from which the records are to be retrieved. WHERE ... the records to be retrieved, and ORDER BY allows you to specify a sort order for the records.

Description : What is the wildcard character in SQL?

Last Answer : Let’s say you want to query database with LIKE for all employees whose name starts with La. The wildcard character is %, the proper query with LIKE would involve ‘La%’. 

Description : What is the wildcard character in SQL? 

Last Answer : Let’s say you want to query database with LIKE for all employees whose name starts with La. The wildcard character is %, the proper query with LIKE would involve ‘La%’.

Description : SSL is not responsible for a. Mutual authentication of client & server b. Secret communication c. Data Integrity protection d. Error detection and correction

Last Answer : d. Error detection and correction

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : What is true about SSO? A. SSO has multiple authentication server B. SSO managing single accesses to other systems C. In SSO, User sends the ticket to intranet server. D. All of the above

Last Answer : In SSO, User sends the ticket to intranet server.

Description : _____ has single authentication server, managing multiple accesses to other systems A. SSO B. IDaaS C. SOAP D. SOA

Last Answer : SSO

Description : Briefly describe the five accessibility requirements of the Certified for Windows logo program.

Last Answer : The five requirements are o Support standard system settings. This requires your application to be able to conform to system settings for colors, fonts, and other UI elements. o Be ... information by sound alone. This requirement can be met by providing redundant means of conveying information.

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : Why can I not install MS SQL Server Express 2008 R2?

Last Answer : Please provide details on what and how it fails the precheck.

Description : Where can I learn quickly the differences between using SQL Server 2008 and Toad for Oracle?

Last Answer : answer:The SQL code IS different. Oracle and SQL Server syntax can differ from the ANSI version of SQL. For example, when you write a JOIN in SQL, you MUST use the OUTER JOIN ON syntax, where ... can also use the Query Builder to write queries for you by dragging and dropping - just like Access.

Description : How to solve this problem I have with a restore (backup) file I made in SQL Server 2008?

Last Answer : try to see if you have volume optimization enabled, it prevents certain changes from happening and really gives the user a hell of alot more trouble than it is worth.

Description : When to use stored procedure and when function in SQL Server 2008?

Last Answer : There’s no technically right answer here – I think I’d do the SP calling SP.

Description : Learning SQL Server 05

Last Answer : http://www.sqlcourse.com/

Description : Points to resolve corruption of SQL server database?

Last Answer : Often the corruption for the SQL server database can't be resolved. And the best thing one can do is just roll over the past backup. And by that there is going to be certain amount of the data loss. But you have to make use of that instead of losing everything.

Description : what are the features and data management strategies of SQL Server?

Last Answer : SQL is one of the most demanding skill in the current world. Every day a huge amount of data is collected and one have to deal with these databases to make an ... : High Performance High Availability Scalability and Flexibility Robust Transactional Support High Security Management Ease Open Source

Description : How does one use ORADEBUG from Server Manager/ SQL*Plus? (for DBA

Last Answer : Execute the "ORADEBUG HELP" command from svrmgrl or sqlplus to obtain a list of valid ORADEBUG commands. Look at these examples: SQLPLUS> REM Trace SQL statements with bind variables SQLPLUS> oradebug ... oradebug lkdebug -a convres SQLPLUS> oradebug lkdebug -r (i.e 0x8066d338 from convres dump)

Description : Where is a procedure return in an external pl/sql library executed at the client or at the server?

Last Answer : At the client.

Description : The most open source DBMS. A) Microsoft SQL Server B) Microsoft Access C) MySQL D) Oracle

Last Answer : MySQL

Description : The most popular commercial DBMS. A) Microsoft SQL Server B) Microsoft Access C) MySQL D) Oracle

Last Answer : Oracle

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : n which SQL Server version report builder introduced?

Last Answer : Report builder introduced in SQL Server 2005. While creating or deploying report model project on report server you can get error or it might not get created. For this you need to

Description : ............... joins are SQL server default A) Outer B) Inner C) Equi D) None of the above

Last Answer : B) Inner

Description : SQL server stores index information in the ………… system table A) systindexes B) systemindexes C) sysind D) sysindexes

Last Answer : D) sysindexes

Description : ………….. is a utility to capture a continuous record of server activity and provide auditing capability. A) SQL server Profile B) SQL server service manager C) SQL server setup D) SQL server wizard.

Last Answer : B) SQL server service manager

Description : ………………… is a full form of SQL. A) Standard query language B) Sequential query language C) Structured query language D) Server side query language

Last Answer : A) Standard query language

Description : Can you create subscription using windows authentication?

Last Answer : No.

Description : What si the difference between interface and abstractclass Select Answer:  1. interface contain only methods  2. we can't declare a variable for interface  3. interface contain only events  4. None  5. All

Last Answer : Ans : 2 The only Difference between Interface and Abstract class is we can declare a variable in abstract class but we can't declare in variable interface

Description : What is the lifespan for items stored in ViewState? Select Answer:  1. Item stored in ViewState exist for the life of the current page  2. Item stored in ViewState exist for the life ... of the current Applicaiton  4. Item stored in ViewState exist for the life of the current configuration

Last Answer : 1. Item stored in ViewState exist for the life of the current page AS any web application works on request and response basis ,so on every post backs, The data in control gets lost. To retain page ... control with data. The life cycle of the view state exist for life of current running page only. 

Description : Which one of the following tools is used to view the metadata information contained in a .NET assembly? Select Answer:  1. al.exe  2. ilasm.exe  3. vbx.exe  4. csc.exe  5. ildasm.exe

Last Answer :  5. ildasm.exe

Description : How would you ensure that all relevant registry entries were removed in the event that installation of your application failed?

Last Answer : You can ensure that registry entries are removed, as well as perform any other “clean-up” tasks, by creating an Installer class and writing the appropriate code in the Rollback event handler. Then create a new Custom Action and set the InstallerClass, and EntryPoint properties to appropriate values.

Description : Describe a general strategy for creating a setup project that terminates installation if a specific file is not already installed on the target machine.

Last Answer : First, create a file search to search the file system for the specific file. Then create a launch condition to evaluate the results of the search. You can connect the launch condition to ... in the search's Property property in the expression specified by the launch condition's Condition property. 

Description : What is the purpose of a bootstrapper application? When do you not need to create one?

Last Answer : A bootstrapper application automatically detects if Windows Installer is installed on the target machine. If Windows Installer is not present, it installs Windows Installer before proceeding with the rest ... Installer 1.5 already installed) or have had Microsoft Installer 1.5 installed previously.

Description : What is a native image? How do you create one?

Last Answer : A native image is a precompiled version of a .NET assembly. You can create a native image of your application by using the Ngen.exe utility.

Description : Describe XCOPY deployment. Under what conditions is it useful? When can it not be used?

Last Answer : XCOPY deployment is a simple method of deployment where the DOS command XCOPY is used to copy the application directory and any subdirectories to the target machine. You can use XCOPY ... an application requires a more complex deployment or references shared assemblies, you cannot use XCOPY.

Description : What is a shared assembly? How would you create one?

Last Answer : An assembly is an assembly of which only a single copy is installed per machine. This copy can be shared by multiple applications. To make an assembly a shared assembly, you must first assign it a strong name, and then install it to the global assembly cache.

Description : Briefly highlight the differences between imperative and declarative security as they pertain to code access security.

Last Answer : Imperative security is implemented by calling methods of Permission objects in code at run time. Declarative security is configured by attaching attributes representing permissions to classes ... request assembly-wide permissions using the Assembly (assembly) directive with declarative security.

Description : Explain how to retrieve information from the configuration file at run time. How would you store information in the configuration file at design time?

Last Answer : You must first create an instance of AppSettingsReader to read the configuration file. You can then call the GetValue method to read values represented in the configuration file. To add configuration ... used to retrieve the entry. The value can be changed between executions of the application.

Description : Describe how to use code to retrieve resources at run time.

Last Answer : You must first create an instance of the ResourceManager class that is associated with the assembly that contains the desired resource. You can then use the GetString method to retrieve string resources or the GetObject method to retrieve object resources.

Description : Describe how to sign your assembly with a strong name. Why would you want to do this?

Last Answer : To sign your assembly with a strong name, you must have access to a key file or create one with the strong name utility (sn.exe). You then specify the key file in the AssemblyInfo file and ... identity, a strong name is required if you want to install your assembly to the Global Assembly Cache.