What is the transaction to maintain and activate the security audit log?
Which of the authorization objects protect transaction code execution?
How is it called when programs can be written that modify the IP address of the source of the TCP/IP packet, to fool the network into thinking that the packet is coming from within the network.