Which security technique limits access by unauthorized users to parts of an enterprise database?

Which security technique limits access by unauthorized users to parts of an enterprise database?

Which security technique limits access by unauthorized users to parts of an enterprise database?

A.
Views

B.
Concurrency

C.
Locking

D.
Integrity controls



Leave a Reply to mr_tienvu Cancel reply1

Your email address will not be published. Required fields are marked *

twelve − 1 =