Match the description to the method below for protecting database. Method may match more than one description.
Method: Triggers
1. Records may be restricted
2. permissions are set via internal access control
3. activity may be monitored and acted upon
4. integration with system security is possible
5. logging is a common implementation
6. Data is extracted from tables
Answer:
— Activity may be monitored and acted upon
— Logging is a common implementation
Explanation: