The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
A) stop SQL injection attacks
B) prevent email spoofing
C) prevent brute force attacks
D) provide physical security
E) prevent unauthorized encryption
Answer :

Leave a Comment