MCQOPTIONS
Bookmark
Saved Bookmarks
→
Rdbms
→
Features Good Relational Design
→
A log of all changes to the application data is c...
1.
A log of all changes to the application data is called as __________
A.
Audit trail
B.
Audit log
C.
Audit lead
D.
Data log
Answer» B. Audit log
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
Which of the following is a valid encryption technique?
A log of all changes to the application data is called as __________
________________ALLOWS_A_SYSTEM_ADMINISTRATOR_TO_ASSOCIATE_A_FUNCTION_WITH_A_RELATION;_THE_FUNCTION_RETURNS_A_PREDICATE_THAT_MUST_BE_ADDED_TO_ANY_QUERY_THAT_USES_THE_RELATION.?$
A_LOG_OF_ALL_CHANGES_TO_THE_APPLICATION_DATA_IS_CALLED_AS___________?$
VPD provides authorization at the level of specific tuples, or rows, of a relation, and is therefore said to be a _____________ mechanism.$
Which_of_the_following_is_a_valid_encryption_technique?$
The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in recent years?
What is the standard for exchanging authentication and authorization information between two different security domains?
The ___________________ is a standard for exchanging authentication and authorization information between different security domains, to provide cross-organization single sign-on.
What are phishing attacks?
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies