0 votes
470 views
in General by (0 points)
closed by
Match the description to the method below for protecting databases. may match more than one description.

Method: Triggers
closed

1 Answer

0 votes
by (0 points)
 
Best answer
Activity may be monitored and acted upon

Logging is a common implementation

3.0k questions

3.0k answers

0 comments

76 users

Welcome to MCQ Village Q&A, where you can ask questions and receive answers from other members of the community.
...