PrepAway - Latest Free Exam Questions & Answers

Which of the following types of logs could provide clues that someone has been attempting to compromise the SQ

Which of the following types of logs could provide clues that someone has been attempting to
compromise the SQL Server database?

PrepAway - Latest Free Exam Questions & Answers

A.
Event

B.
SQL_LOG

C.
Security

D.
Access

Explanation:
Event logs include Application logs, such as those where SQL Server would write entries. This is
where you would see logs with details of someone trying to access a SQL database.

2 Comments on “Which of the following types of logs could provide clues that someone has been attempting to compromise the SQ

  1. meac says:

    This is a bit of a tricky question with a red herring thrown in. The thing to remember is that we are speaking about TYPES OF LOGS. The four answers are in fact LOGS, so I must choose the most relevant.
    Three of them are Microsoft Logs which can be viewed using “Event Viewer”.
    Note that EVENT is not a log as such. It is a COLLECTION of LOGS.
    Under such EVENT, we have the following types of logs: Application, Security, Setup, System and Forwarded Events.
    INCORRECT ANSWERS:
    B.SQL_LOG – This is a red herring. Every SQL Server database has a transaction log that records all transactions and the database modifications made by each transaction. The transaction log is a critical component of the database. If there is a system failure, you will need that log to bring your database back to a consistent state.
    C.Security – This is one type of logs under the EVENT logs, and it has to do with user access. In itself, it is not the best set of logs to be used to “provide clues that someone has been attempting to compromise the SQL Server database”. We would also need the Application and System logs to have a more clear picture.
    D.Access An access log is a list of all the requests for individual files that people have requested from a Web site. These files will include the HTML files and their imbedded graphic images and any other associated files that get transmitted.
    So the correct answer is indeed: A.Event – Event logs include Application logs, such as those where SQL Server would write entries. This is where you would see logs with details of someone trying to access a SQL database.




    0



    0

Leave a Reply