____ utilization and sensitive data storage are two considerations that must be included in any database security audit.

A. String
B. Encryption
C. Network
D. Log


Answer: B

Computer Science & Information Technology

You might also like to view...

The designation s0/0 indicates which of the following?

A) Is not used with Cisco routers B) Serial interface zero/zero C) Ethernet serial interface zero D) Serial input zero

Computer Science & Information Technology

Which of the following descriptive statistics measures the peakedness or flatness of a distribution of data?

A. Kurtosis B. Sample Variance C. Median D. Range

Computer Science & Information Technology

The ________ describes a unique sequential or random number assigned by Access as each record is entered.

a. Yes/No b. Text c. AutoNumber d. Number

Computer Science & Information Technology

The ____________________ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology