After opening the audit log, user information, execution time and execution commands will be recorded, which can effectively improve database security.
A . True
B . False
Answer: A
After opening the audit log, user information, execution time and execution commands will be recorded, which can effectively improve database security.
A . True
B . False
Answer: A