• A Database logging
  • B Segregation of duties
  • C Extensible Data Security (XDS) policies
  • D Role-based security
  • Share this MCQ