Which database protection technique should be employed?

Your enterprise is developing a database system that will contain highly sensitive data. Security of the data will take priority over database processing speed. Which database protection technique should be employed?

Your enterprise is developing a database system that will contain highly sensitive data. Security of the data will take priority over database processing speed. Which database protection technique should be employed?

A.
Backups

B.
User views

C.
Encryption

D.
Integrity controls



Leave a Reply to networkmanagers Cancel reply1

Your email address will not be published. Required fields are marked *

17 − five =


networkmanagers

networkmanagers

C