Ethical Hacking on Cyber Security related Questions and Answers


Question :   __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.
1. Database
2. Network
3. System
4. Hardware
Answer :   1 - Database  

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter