Multiple Choice
DDL triggers are used to ________.
A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B.
D) Neither A nor B.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q52: Which of the following database events should
Q53: Properly hardened hosts and securely coded applications
Q54: Full backups are _.<br>A) performed on all
Q55: File/directory data backup copies _.<br>A) programs<br>B) data<br>C)
Q56: CDP is inexpensive to use.
Q58: Mesh backup is where client PCs in
Q59: Losing an encryption key is not a
Q60: Retaining data can be _.<br>A) expensive<br>B) susceptible
Q61: With centralized backup, each location backs up
Q62: Backup onto another hard drive is a