When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________
(a) bad
(b) good
(c) illegal
(d) fare
(a) bad
(b) good
(c) illegal
(d) fare
Right choice is (b) good
To elaborate: The security context is good if it enables carefully written stored programs to be set up that provide controlled access to tables for users who are not able to access them directly.