A company is developing a new database application. The company needs to implement a security control that is effective at preventing tampering.
Which security control is effective at preventing this threat action?
A) Role-Based Access Control (RBAC)
B) Encryption of data at rest
C) Digital signatures
D) Firewalls and intrusion detection systems





Q&A Education