
DLL triggers are used to ________.
A) maliciously attack databases
B) produce automatic responses if the data of the database has been altered.
C) Both A and B
D) Neither A nor B
Correct Answer:
Verified
Q83: Trusting users to do key escrow is
Q84: Most companies are quick to enforce strict
Q85: Profiling uses _ to find patterns in
Q86: Adding invisible information to a file that
Q87: Changing the default listening port is an
Q89: Data destruction is _.
A) optional
B) necessary
C) Both
Q90: One of the most often overlooked mechanisms
Q91: _ is the process of obscuring data
Q92: The most common form of deletion in
Q93: Restrictions on removable media should be enforced
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents