a. For database security |
b. For reporting data security to the auditor |
c. For understanding which data is going through secured traffic and which is not |
d. For checking unused data traffic |
Answer: For understanding which data is going through secured traffic and which is not |