Lisa is a training instructor and she maintains a training lab with 18 computers. She has enough rights and permissions on these machines so that she can configure them as needed for classes. However, she does not have the rights to add them to the organization's domain. Which of the following choices BEST describes this example?

A. Least Privilege

B. Need to Know

C. Group-based Privileges

D. Location-based Policies


A. Least Privilege

Computer Science & Information Technology

You might also like to view...

It is essential that the people responsible for assuring information follow a disciplined and well-defined ____.

A. evacuation B. pattern C. hierarchy D. process

Computer Science & Information Technology

The ____________ works like this: The smallest value in the array is located and moved to element 0. The next smallest value is located and moved to element 1. This process continues until all the elements have been placed in their proper order.

a. bubble sort b. binary search c. Boolean swap d. selection sort

Computer Science & Information Technology

Modify the changeLittle function to use readLines instead of read.

Note: The question refers to the “readlines” method.

Computer Science & Information Technology

Which of the following is not a control structure?

a. sequence b. selection c. syntax d. repetition

Computer Science & Information Technology