Q: 14
You must implement GoldenGate in a secure environment. How should you proceed in order to
protect
GoldenGate data from theft?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.