Answer:
ensure database integrity by recording intermediate states of the database as it is modified
o Remain Operational During A Denial Of Service Attack
Step-by-step explanation:
7.2m questions
9.6m answers