When protecting a database ________
A) use multiple passwords
B) split it
C) lock all forms
D) use a strong password
D
Computer Science & Information Technology
You might also like to view...
You have to name your database and select a location to save your database file before you can create a blank database
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following attacks does not directly recover a WEP key and requires at least one data packet from a target AP for initiation?
A. MAC spoofing attack B. Evil twin attack C. Fragmentation attack D. De-authentication attack
Computer Science & Information Technology