a. List two elements of a database security plan.
b. Describe the advantages and disadvantages of DBMS-provided and application-provided security
c. What is an SQL injection attack and how can it be prevented?
d. Explain how a database could be recovered via reprocessing. Why is this generally not feasible?
e. Define rollback and roll forward.