Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?
A. need-to-know
B. eyes only
C. least privilege
D. separation of duties
Answer: C
You might also like to view...
MC The number in square brackets after a sequence name is the______of a particular element in the sequence.
a) subscript b) size c) value d) None of the above.
In the array implementation of the stack, top is decremented in the pop function because:
A. it is an index to the current top of the stack, and that index decreases by one on a pop B. it stores the value of the current top of the stack, and a value lower in the stack is always less C. top records the number of elements in the stack, and the number of elements decreases by one on a pop D. otherwise, there would be no way to access the array position that needs popped
Every device on the Internet has a unique network access point that identifies it in the same way that a street address identifies the location of a house.
Answer the following statement true (T) or false (F)
Design the SOFTWARE DETAILS inquiry display. The entry field is SOFTWARE INVENTORY NUMBER, and all software information, with the exception of EXPERT and MACHINES INSTALLED ON, should be displayed. Refer to the Visible Analyst (or Repository Web page) SOFTWARE DETAILS data flow repository entry.
What will be an ideal response?