An employee is granted access to only areas of a network folder needed to perform their job. Which of the following describes this form of access control?
A. Separation of duties
B. Time of Day restrictions
C. Implicit deny
D. Least privilege
Answer: D. Least privilege
Computer Science & Information Technology
You might also like to view...
MC There is a________relationship between a primary key and its corresponding foreign key.
a) many-to-many. b) one-to-one. c) one-to-many. d) None of the above.
Computer Science & Information Technology
The ________ data type is usually used for values such as True/False or On/Off
A) Binary B) Logical C) Yes/No D) T/F
Computer Science & Information Technology
The Remove Duplicates tool is used to remove duplicate ________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A customer states that since the new firewall has been installed, the customer has not been able to send email. Which of the following ports on the firewall should be checked?
A. 21 B. 25 C. 110 D. 443
Computer Science & Information Technology