Match the description to the method below for
protecting databases. Methods may match more than
one description.
Method: Views
Records may be restricted
Logging is a common implementation
Activity may be monitored and acted upon
Permissions are set via internal access controls
Data is extracted from tables
Integration with system security is possible
Answer:
This is the right answer:
1st and 5th
Answer:
— Activity may be monitored and acted upon
— Logging is a common implementation
Explanation: