CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
SMUJAN15
ASSESSMENT_CODE BB0025_SMUJAN15
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
45983
QUESTION_TEXT
Explain SQL server agent and SQL server authentication
mode
SCHEME OF
EVALUATION
SQL server agent
1. Alert management
2. Notification
3. Job execution
4. Replication management (2M each)
SQL server authentication made (2 M)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
45985
QUESTION_TEXT
Briefly explain Secure socket layer and set protocol.
SCHEME OF EVALUATION
Secure Socket layer (SSL) (8 M)
Secure electronic transaction(SET) (2 M)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
102445
QUESTION_TEXT
What is Microsoft search service? Explain the components of
communication architecture.
MICROSOFT SEARCH SERVICE (1 mark)
The Microsoft search service is a full-text engine that runs as a
windows NT service. Full- text support involves the ability to issue
queries against character data and the creation and the maintenance of
the indexes that facilitate these queries
SCHEME OF
EVALUATION
Components of Communication Architecture (1.5X6=9)
1. Application:
An application is developed using a database applicationprogramming interface (API). A database API defines how to code an
application to connect to a database and pass commands to the
database. The application has no knowledge of the underlying network
protocols used to communicate with the SQL Server.
2. Database Interface:
This is an interface used by an application to send request to SQL
Server and process results returned by SQL Server.
3. Network Library:
This is a communication software component that packages the
database requests and results for transmission by the appropriate
network protocol. The network library is also known as Net- Library
and must be installed on both the client and the server.
4. Clients and servers can use more than one Net-Library
simultaneously, but they must use a common network library in order
to communicate successfully. SQL Server supports network protocols
such as TCP/IP, Named Pipes, NOVELL IPX/SPX, Banyan VINES/IP
and AppleTalk ADS P.
5. Tabular Data Stream:
Tabular Data Stream (TDS) is an application level protocol used
for communication between the client and SQL Server. TDS packets
are encapsulated in the network packets built for the protocol stack
used by the Net-Libraries.
6. Open Data services:
This component handles network connections, passing client
requests to SQL Server for processing and returning any results and
replies to SQL Server clients. Open Data Services automatically listens
on all server Net-Libraries that are installed on the server.
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
102446
QUESTION_TEXT
Write a note on some security threats and solution and also discuss
message security.
SCHEME OF
EVALUATION
1.
Threat: Data Intercepted, read or modified illicitly
2.
Threat: False identity with an intention of fraud
3.
Threat: Unauthorized user on one network gains access to
another
(4.5 marks)
Message Security
Encryption is a cryptographic technology to scramble the data with a
key so that no one can make sense of it while it’s being transmitted.
When data reaches its destination, the information unscrambled using
same or different key. There are two types of crypto-systems: secret
key and public key. In secret key cryptography also referred to as
symmetric cryptography, the same key is used for both encryption and
decryption. The most popular secret key crypto-system in use today is
known as DES, the Data Encryption Standard. IBM developed DES. In
public key cryptography, each user has a public key and a private key.
The public key is made public while the private key remains secret.
Encryption is performed with the public key while decryption is done
with the private key. The RSA public cryptosystem is the most popular
form of public key cryptography. RSA stands for Rivest, Shamir,
Adleman the inventors of RSA cryptosystem
(5.5 marks)
(4.5 + 5.5 = 10 marks)
Download