__________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud.
(a) Database
(b) Network
(c) System
(d) Hardware
This question was posed to me at a job interview.
I would like to ask this question from Ethical Hacking in section Introduction to Ethical Hacking of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,