Which two technologies use the ENCRYPT_MAC configuration parameter to control the level of message authentication code (MAC) generation? (Choose two.)

Which two technologies use the ENCRYPT_MAC configuration parameter to control the level of message authentication code (MAC) generation? (Choose two.)
A . On-disk encryption
B . Enterprise Replication
C . Column level encryption
D . High-Availability Data Replication
E . Server-to-server distributed query communication

Answer: B,D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments