An administrator responsible for building and validating security configurations is a violation of which of the following security principles?

A. Least privilege
B. Job rotation
C. Separation of duties
D. Best business practices


Answer: C. Separation of duties

Computer Science & Information Technology

You might also like to view...

Based on the information below, which of the following sets the tenth element of the array to 20643?Declare Numeric custNumber[10]

A. custNumber[10] = 20643 B. custNumber[9] = 20643 C. custNumber[8] = 20643 D. custNumber[7] = 20643

Computer Science & Information Technology

A(n) _________ specific item that can be cataloged in Active Directory

a. Object b. Class c. Attribute d. None of the above.

Computer Science & Information Technology

By default, the page title prints in the header and the page ____________________ prints in the footer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What can be used as a type of "fingerprint" for an object, due to the fact that it is unique?

A. property B. hash code C. derived code D. new property

Computer Science & Information Technology