____ applications are designed to monitor external requests that are sent to obtain access to the database, and the database environment's responses to these requests.
A. Mixed mode
B. Middleware
C. Communicator
D. Logical
Answer: B
You might also like to view...
When using the Windows 8 Search box, keep in mind that you can alter the search for all of the following specific categories, EXCEPT _____.
A. Apps B. Settings C. Pinned applications D. Files
In the equation x = y/z if all of the variables are int and the values are y = 25 and z = 11, what will be the value of the variable x?
A. 2 B. 3 C. 2.27272727 D. 2.3
Jane, the security administrator for a company, needs to assign permissions for users on her network. Which of the following would allow Jane to give ONLY the appropriate permissions necessary?
A. Separation of duties B. Job rotation C. Privilege escalation D. Least privilege
Biometrics includes the use of which of the following authentication methods?
A. Single sign-on B. Retinal scan C. Common access card D. ACLs