The best tactical approach for securing database applications is:

  1. Top down

  2. Bottom up

  3. End-to-end

  4. Across the lifecycle of the application

  5. Using a combination of all of the above


Correct Option: E

Find more quizzes: