What is the term that describes an approach that uses tight control over what a user account can do on a network, allowing the user to only do what he or she needs to do for the job, and no more?
A. user account control
B. least privilege
C. group permissions
D. administrative access control
Answer: B
You might also like to view...
When joining tables, the _________ clause specifies the columns from each table that are com¬pared to determine which rows are merged.
a. ON b. WHERE c. LIKE d. GROUP
Why is it not necessary to write a function prototype and function header line/body when using a function from a standard library?
A. You have to use the prototype and function header line. B. The prototype isn’t defined until the code is compiled/ C. The library substitutes compiled code for the linker. D. The library defines the function, so the program can just use it.
Phishing is a malicious attack using social skills directed at a person who has access to sensitive data
Indicate whether the statement is true or false
Which part of a MAC address is unique to each manufacturer?
A. The network identifier B. The OUI C. The device identifier D. The physical address