ISC Exam Questions

If security was not part of the development of a database, how is it usually handled?

If security was not part of the development of a database, how is it usually handled?

A.
Through cell suppression

B.
By a trusted back end

C.
By a trusted front end

D.
By views

Explanation:
C: A trusted front end can be developed to implement more security that the database itself is lacking. It can require a more granular and stringent access control policy by requiring tighter identification and authorization pieces than those inherent in the database. Front ends can also be developed to provide more user friendliness and interoperability with other applications.