Which of the following is the process of extracting trails on a regular basis so that they can be transferred to a designated security system…?

Which of the following is the process of extracting trails on a regular basis so that they can be
transferred to a designated security system where the database administrators do not have access?

Which of the following is the process of extracting trails on a regular basis so that they can be
transferred to a designated security system where the database administrators do not have access?

A.
Native auditing

B.
Abstraction

C.
Database security

D.
Encryption

Explanation:
Native auditing is the process of extracting trails on a regular basis so that they can be transferred to
a designated security system where the
database administrators do not have access. This ensures a certain level of segregation of duties and
provides evidence that the native audit
trails were not modified by authenticated administrators.
Answer B is incorrect. Abstraction is a method of coding that enables a user to focus on the coding
rather than the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for
database access.
Answer C is incorrect. Database security refers to the system, processes, and procedures that
protect a database from unintended
activities, such as authenticated misuse, malicious attacks, or inadvertent mistakes made by
authorized individuals or processes. Database
security can begin with the process of creating and publishing appropriate security standards for the
database environment. These standards
may include specific controls for the various relevant database platforms.
Answer D is incorrect. Encryption provides an additional security layer, protecting the data from
unauthorized viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher
encrypted data into a readable form.



Leave a Reply 0

Your email address will not be published. Required fields are marked *