Computer Science, asked by rpsrhp, 2 months ago

Match the description to the method below for protecting database. Method may match more than one description.

Method: Triggers

1. Records may be restricted
2. permissions are set via internal access control
3. activity may be monitored and acted upon
4. integration with system security is possible
5. logging is a common implementation
6. Data is extracted from tables​

Answers

Answered by jiveshranjan7
61

Answer:

3. activity may be monitored and acted upon
5. logging is a common implementation

Explanation:

Trigger is used for monitor or audit purpose.
When we create a trigger, we can have control to capture the action on DML operation.

Answered by anvitanvar032
18

Answer:

Explanation:

Given - Protecting database and method triggers match more than one description.

Triggers are used to track or audit data. We can have control over the action on DML operations when we establish a trigger.

The description to the method below for protecting database is -

Activity may be monitored and acted upon.

Logging is a common implementation.

Similar questions