You work as a database administrator for Certkiller .com. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()
A.Monitor thealert.logfile
B.Enable server-side SQL tracing for user sessions
C.Enable fine-grained auditing for the customer table
D.Enable Fine-Grained Access Control (FGAC) for the customer table
E.Write a database trigger on the customer table on the SELECT event