The principle of ________ states that each person should only get the permissions that he or she absolutely needs to do his or her job.

A. authentication
B. appropriate authorizations
C. minimization
D. least permissions


D. least permissions

Computer Science & Information Technology

You might also like to view...

What is the complexity of the following code?

int a = 0, i = N; while (i > 0) { a += i; i /= 2; } a. O(nlog(n)) b. O(n) c. O(n^2) d. O(2^n)

Computer Science & Information Technology

If you specify ____ as the target attribute, the linked page opens in a new browser window.

A. _new B. _self C. _blank D. _reset

Computer Science & Information Technology

By default, what is the MTU size on a typical Ethernet network?

a. 1492 bytes b. 1500 bytes c. 1518 bytes d. 1522 bytes

Computer Science & Information Technology

What network feature allows you to configure priorities for different types of network traffic so that delay-sensitive data is prioritized over regular data?

A. Data center bridging B. Switch Embedded Teaming C. NIC Teaming D. Quality of Service

Computer Science & Information Technology