The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.prevent brute force attacksprevent email spoofingprevent unauthorized encryptionprovide physical security stopSQL injection attacks