Universal Table Browser (UTB) and Data Browser are used by users to view the record contents
of tables. In order to secure users from seeing unauthorized data, which two security options
should be put in place?
A.
Application
B.
Action
C.
Column
D.
Exclusive Application
E.
Row