0 votes
456 views
in General by (0 points)
closed by
Match the description to the method below for protecting databases. may match more than one description.

Method: Triggers
closed

1 Answer

0 votes
by (0 points)
 
Best answer
Activity may be monitored and acted upon

Logging is a common implementation

2.8k questions

2.8k answers

0 comments

76 users

Welcome to MCQ Village Q&A, where you can ask questions and receive answers from other members of the community.
...