Refer to the exhibit.
Two types of clients are accessing the front ends and the core database that manages transactions, access control, and atomicity .
What is the threat model for the SQL database?
A . An attacker can initiate a DoS attack.
B . An attacker can read or change data.
C . An attacker can transfer data to an external server.
D . An attacker can modify the access logs.
Answer: A
Latest 350-201 Dumps Valid Version with 139 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund