Q: 6
Which two configurations can be used to protect sensitive data In a database?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.