Match the description to the method below for protecting database. Method may match more than one description.
Method: Triggers
1. Records may be restricted
2. permissions are set via internal access control
3. activity may be monitored and acted upon
4. integration with system security is possible
5. logging is a common implementation
6. Data is extracted from tables
Answers
Answered by
61
Answer:
3. activity may be monitored and acted upon
5. logging is a common implementation
Explanation:
Trigger is used for monitor or audit purpose.
When we create a trigger, we can have control to capture the action on DML operation.
Answered by
18
Answer:
Explanation:
Given - Protecting database and method triggers match more than one description.
Triggers are used to track or audit data. We can have control over the action on DML operations when we establish a trigger.
The description to the method below for protecting database is -
Activity may be monitored and acted upon.
Logging is a common implementation.
Similar questions