Which of the following is often required to ensure that Guardium can identify a user’s credentials
through the Stored Procedure Monitoring feature?

A.
A database system-specific plug-in that attaches on to the collector’s engine.
B.
A credential replication routine available for free fromGuardium.
C.
A well-configured custom identification procedure mapping.
D.
Reconfiguring the security policy so the appliance knows all the application servers that contact
the data server.