0 votes
567 views
in General by (0 points)
closed by
Match the description to the method below for protecting databases. Methods may match more than one description.

Method: Privilege management
closed

1 Answer

0 votes
by (0 points)
 
Best answer
Permissions are set via internal access controls Integration with system security is possible

2.8k questions

2.8k answers

0 comments

76 users

Welcome to MCQ Village Q&A, where you can ask questions and receive answers from other members of the community.
...