Which of the following should a company develop to ensure preparedness for a fire in a data center?
Which of the following is an attack in which an attacker hopes to profit from locking the database software?
A programmer wants to configure a database to only allow read or write access when requests are coming from specific IP addresses. Which of the following can be used to configure IP addresses to allow access to the database?
Which of the following is the deployment phase in which a DBA ensures the most recent patches are applied to the new database?
Which of the following resources is the best way to lock rows in SQL Server?