Your enterprise is developing a database system that will contain highly sensitive data. Security of
the data will take priority over database processing speed. Which database protection technique
should be employed?
A.
Backups
B.
User views
C.
Encryption
D.
Integrity controls