Q: 19
Which security technique limits access by unauthorized users to parts of an enterprise
database?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.