

MCQOPTIONS
Saved Bookmarks
1. |
WHEN_THE_SECURITY_CONTEXT_ENABLES_CAREFULLY_WRITTEN_STORED_PROGRAMS_TO_BE_SET_UP_THAT_PROVIDE_CONTROLLED_ACCESS_TO_TABLES_FOR_USERS,_IT_IS_CALLED___________?$ |
A. | bad |
B. | good |
C. | illegal |
D. | fare |
Answer» C. illegal | |