CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE EVENT_CODE SMUJAN15 ASSESSMENT_CODE BB0025_SMUJAN15 QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 45983 QUESTION_TEXT Explain SQL server agent and SQL server authentication mode SCHEME OF EVALUATION SQL server agent 1. Alert management 2. Notification 3. Job execution 4. Replication management (2M each) SQL server authentication made (2 M) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 45985 QUESTION_TEXT Briefly explain Secure socket layer and set protocol. SCHEME OF EVALUATION Secure Socket layer (SSL) (8 M) Secure electronic transaction(SET) (2 M) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 102445 QUESTION_TEXT What is Microsoft search service? Explain the components of communication architecture. MICROSOFT SEARCH SERVICE (1 mark) The Microsoft search service is a full-text engine that runs as a windows NT service. Full- text support involves the ability to issue queries against character data and the creation and the maintenance of the indexes that facilitate these queries SCHEME OF EVALUATION Components of Communication Architecture (1.5X6=9) 1. Application: An application is developed using a database applicationprogramming interface (API). A database API defines how to code an application to connect to a database and pass commands to the database. The application has no knowledge of the underlying network protocols used to communicate with the SQL Server. 2. Database Interface: This is an interface used by an application to send request to SQL Server and process results returned by SQL Server. 3. Network Library: This is a communication software component that packages the database requests and results for transmission by the appropriate network protocol. The network library is also known as Net- Library and must be installed on both the client and the server. 4. Clients and servers can use more than one Net-Library simultaneously, but they must use a common network library in order to communicate successfully. SQL Server supports network protocols such as TCP/IP, Named Pipes, NOVELL IPX/SPX, Banyan VINES/IP and AppleTalk ADS P. 5. Tabular Data Stream: Tabular Data Stream (TDS) is an application level protocol used for communication between the client and SQL Server. TDS packets are encapsulated in the network packets built for the protocol stack used by the Net-Libraries. 6. Open Data services: This component handles network connections, passing client requests to SQL Server for processing and returning any results and replies to SQL Server clients. Open Data Services automatically listens on all server Net-Libraries that are installed on the server. QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 102446 QUESTION_TEXT Write a note on some security threats and solution and also discuss message security. SCHEME OF EVALUATION 1. Threat: Data Intercepted, read or modified illicitly 2. Threat: False identity with an intention of fraud 3. Threat: Unauthorized user on one network gains access to another (4.5 marks) Message Security Encryption is a cryptographic technology to scramble the data with a key so that no one can make sense of it while it’s being transmitted. When data reaches its destination, the information unscrambled using same or different key. There are two types of crypto-systems: secret key and public key. In secret key cryptography also referred to as symmetric cryptography, the same key is used for both encryption and decryption. The most popular secret key crypto-system in use today is known as DES, the Data Encryption Standard. IBM developed DES. In public key cryptography, each user has a public key and a private key. The public key is made public while the private key remains secret. Encryption is performed with the public key while decryption is done with the private key. The RSA public cryptosystem is the most popular form of public key cryptography. RSA stands for Rivest, Shamir, Adleman the inventors of RSA cryptosystem (5.5 marks) (4.5 + 5.5 = 10 marks)