When protecting a database ________

A) use multiple passwords
B) split it
C) lock all forms
D) use a strong password

D

Computer Science & Information Technology

You might also like to view...

You have to name your database and select a location to save your database file before you can create a blank database

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following attacks does not directly recover a WEP key and requires at least one data packet from a target AP for initiation?

A. MAC spoofing attack B. Evil twin attack C. Fragmentation attack D. De-authentication attack

Computer Science & Information Technology