Which of the following is the process of extractingtrails on a regular basis so that they can be transferred to a designated security system…?

Which of the following is the process of extractingtrails on a regular basis so that they can be transferred to a
designated security system where the database administrators do not have access?

Which of the following is the process of extractingtrails on a regular basis so that they can be transferred to a
designated security system where the database administrators do not have access?

A.
Native auditing

B.
Abstraction

C.
Database security

D.
Encryption

Explanation:
Native auditing is the process of extracting trailson a regular basis so that they can be transferredto a
designated security system where the
database administrators do not have access. This ensures a certain level of segregation of duties and provides
evidence that the native audit
trails were not modified by authenticated administrators. Answer B is incorrect. Abstraction is a method of
coding that enables a user to focus on the coding rather than the syntax for a specific
database API. A user can use generic methods to access a database. In order to perform database
abstraction, a user requires additional
code or libraries. The benefit of database abstraction is that it provides a uniform interface for database
access.
Answer C is incorrect. Database security refers to the system, processes, and procedures that protect a
database from unintended
activities, such as authenticated misuse, maliciousattacks, or inadvertent mistakes made by authorized
individuals or processes. Database
security can begin with the process of creating andpublishing appropriate security standards for the database
environment. These standards
may include specific controls for the various relevant database platforms. Answer D is incorrect. Encryption
provides an additional security layer, protecting the data from unauthorized viewing with the help of
an algorithm called cipher. Even if access to the database is obtained, it will not be easy to decipher encrypted
data into a readable form.



Leave a Reply 1

Your email address will not be published. Required fields are marked *