
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
A) stop SQL injection attacks
B) prevent email spoofing
C) prevent brute force attacks
D) provide physical security
E) prevent unauthorized encryption
Correct Answer:
Verified
Q76: _ are viruses that masquerade as useful
Q77: Which of the following is likely to
Q78: A Trojan horse is a virus that
Q79: Most spyware programs are benign in that
Q80: A magnetic strip holds far more data
Q82: PL Technologies suffered considerable data loss when
Q83: Discuss some human safeguards for employees that
Q84: Which of the following statements is True
Q85: Key escrow is a(n) _.
A) protocol used
Q86: What is key escrow?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents