When a database is encrypted, data that is modified is encrypted ____.

A. after the database is updated
B. when the database is closed
C. before the database is updated
D. when the database is opened


Answer: C

Computer Science & Information Technology

You might also like to view...

The main advantage(s) of bitmapped images over vector graphics is (are) _____.

A. scalability or resolution independence of images B. ease of editing the image content pixel by pixel C. more compact file size compared to vector graphics

Computer Science & Information Technology

Which of the following is not considered an action query?

A) Append B) Make Table C) Create Table D) Update

Computer Science & Information Technology

Jane, a security administrator, has been tasked with explaining access control aspects to a peer. Which of the following is a directory service supporting both Windows and Linux authentication?

A. LDAP B. Trusted OS C. TACACS+ D. PAM

Computer Science & Information Technology

To handle multiple NOT criteria, the OUTER JOIN must be combined with a ___________.

a. Set membership predicate b. Range predicate c. Subquery d. UNION

Computer Science & Information Technology