Answer:
Monitoring of user access to aid in the investigation of database use.
Previous Question | Next Question |
Explain What are the system resources that can be controlled through Profile? | Explain What is an Object Auditing? |
Previous Question | Next Question |
Explain What are the system resources that can be controlled through Profile? | Explain What is an Object Auditing? |