Answer:
1. Data classification scheme
Explanation:
<h2><u>Choose an answer from the options. </u></h2>
A<u> data classification scheme</u> formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it
Answer:
achieve physical security
Explanation:
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to <u>achieve physical security </u>
Answer:
I don't know
Explanation:
is about knowing how to make use of the refinery
Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.