Watch this video on YouTube
Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database?