The principle of ________ states that each person should only get the permissions that he or she absolutely needs to do his or her job.

A. authentication
B. appropriate authorizations
C. least permissions
D. minimization


C. least permissions

Computer Science & Information Technology

You might also like to view...

Typically bulleted lists are used to indicate sequence

Indicate whether the statement is true or false

Computer Science & Information Technology

A job role that configures and maintains the web server is called:

a. Developer 

b. Information Technologist 

c. Media Specialist 

d. Network Administrator

Computer Science & Information Technology

An action used to draw interest to an object in a presentation; a movement that controls the entrance, emphasis, exit, and/or paths of objects in a slide show.

What will be an ideal response?

Computer Science & Information Technology

A banking app requires stringent access control measures for security reasons. Which of the following techniques could be used to define who can use the app and what actions they can perform?

What will be an ideal response?

Computer Science & Information Technology