Multiple Choice
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
A) stop SQL injection attacks
B) protect against email spoofing
C) prevent brute force attacks
D) provide physical security
Correct Answer:

Verified
Correct Answer:
Verified
Q16: Define encryption and explain symmetric and asymmetric
Q47: A _ pretends to be a legitimate
Q55: What are spyware and adware programs?
Q69: Which of the following usually happens in
Q70: _ are small files that the browser
Q71: Data safeguards are measures used to protect
Q74: Firewalls produce _ which include lists of
Q75: Which of the following statements is true
Q76: Which of the following statements is true
Q77: Which of the following is considered a