A developer has recently created a temporary database to test her new human resources management application. To test it in a production-like environment she copies the MANAGERS table from the production server into her test database. This table includes sensitive personal information. Which of the following will help the database auditor identify this new database?
Which of the following components collects and parses the live database traffic used to trigger a real- time alert when a security policy rule is broken?
Data is collected through a security policy using non-selective audit trail that only consists of rules with alert action. Which of the following cannot be viewed when reporting on these data?