Authorization tables contain highly sensitive data and should be protected by stringent security rules.
Answer: A
No answer description available for this question.