An employee is granted access to only areas of a network folder needed to perform their job. Which of the following describes this form of access control?

A. Separation of duties
B. Time of Day restrictions
C. Implicit deny
D. Least privilege


Answer: D. Least privilege

Computer Science & Information Technology

You might also like to view...

MC There is a________relationship between a primary key and its corresponding foreign key.

a) many-to-many. b) one-to-one. c) one-to-many. d) None of the above.

Computer Science & Information Technology

The ________ data type is usually used for values such as True/False or On/Off

A) Binary B) Logical C) Yes/No D) T/F

Computer Science & Information Technology

The Remove Duplicates tool is used to remove duplicate ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A customer states that since the new firewall has been installed, the customer has not been able to send email. Which of the following ports on the firewall should be checked?

A. 21 B. 25 C. 110 D. 443

Computer Science & Information Technology