Which security technique limits access by unauthorized users to parts of an enterprise database?

Which security technique limits access by unauthorized users to parts of an enterprise database?

Which security technique limits access by unauthorized users to parts of an enterprise database?

A.
Views

B.
Concurrency

C.
Locking

D.
Integrity controls



Leave a Reply 1

Your email address will not be published. Required fields are marked *