The InfoSec team has directed compliance database activity monitoring without agents on a hosted database server in the public IaaS. Which of the following configurations is needed to ensure this requirement is achieved?
A. Configure the agent configuration file to log to the syslog server.
B. Configure sniffing mode on database traffic.
C. Implement built-in database tracking functionality.
D. Implement database encryption and secure copy to the NAS.
SMH… How is sniffing database traffic considered database activity monitoring? How much work would have to be done by administrators to interpret captured traffic and relate that to activity? C seems the more logical answer here as no agents would be needed to accomplish the desired objective.