Multiple Choice
_____ can render data useless to unauthorized users who might have violated some of the database security layers.
A) Data encryption
B) Access rights
C) Physical security
D) Password security
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q10: The Systems Development Life Cycle (SDLC) is
Q11: The traditional Systems Development Life Cycle (SDLC)
Q12: In DBLC, the phase after the database
Q13: _ is a technique that creates logical
Q14: Evaluation of database performance is rendered easier
Q16: A(n) _ is a carefully designed and
Q17: _ allow end users to access the
Q18: In the detailed systems design phase of
Q19: Because real-world database design is generally done
Q20: The last step in the Database Life