Question

_____________can render data useless to unauthorized users who might have violated some of the database security layers.
a. Data encryption
b. Access rights
c. Physical security
d. Password security

Answer

This answer is hidden. It contains 1 characters.