The principle of ________ states that each person should only get the permissions that he or she absolutely needs to do his or her job.
A. authentication
B. appropriate authorizations
C. minimization
D. least permissions
D. least permissions
You might also like to view...
What is the complexity of the following code?
int a = 0, i = N; while (i > 0) { a += i; i /= 2; } a. O(nlog(n)) b. O(n) c. O(n^2) d. O(2^n)
If you specify ____ as the target attribute, the linked page opens in a new browser window.
A. _new B. _self C. _blank D. _reset
By default, what is the MTU size on a typical Ethernet network?
a. 1492 bytes b. 1500 bytes c. 1518 bytes d. 1522 bytes
What network feature allows you to configure priorities for different types of network traffic so that delay-sensitive data is prioritized over regular data?
A. Data center bridging B. Switch Embedded Teaming C. NIC Teaming D. Quality of Service