A foreign key should have the same or comparable _________ as its related primary key.
a. string length
b. data type
c. name
d. column order
b. data type
You might also like to view...
Two different passwords can be set for a file
Indicate whether the statement is true or false
Remote control malware was found on a client device, and an unknown attacker was manipulating the network from afar. The attack resulted in the network switches reverting to flooding mode, thereby enabling the attacker to eavesdrop on a significant portion of network communications. After reviewing IDS and traffic logs, you determine that this was accomplished by an attack utility which generated a constant Ethernet frames with random source MAC addresses. What can be done to prevent this attack from occurring in the future?
A Restrict access to DHCP. B Use a static HOSTS file. C Use MAC limiting on the switch ports. D Implement an ARP monitor.