Which cyber defense concept suggests limiting permissions to only what is necessary to perform a particular task?
A. Authentication
B. Authorization
C. Defense in depth
D. Principle of least privilege
Answer: D. Principle of least privilege
You might also like to view...
Compute the internal volume of a cube with outside edges of 8 inches and walls 1 4-inch thick.
The following problems are solved using the formal IPO Method, although it was not required.
You have a database that contains information about all of the employees from your company. There is a table containing basic demographic information called Employees and a table containing salary information called Pay. The two tables are related by the field called Emp ID. Your supervisor wants to see a list of employees who are making over $25,000.00 and have a last name of a "Wilson." Describe how to accomplish this.
What will be an ideal response?
AC Case 2-1Darius is organizing his five-year high school reunion. He is creating an Access table to organize the classmate information, email list, and event reservations. When creating a table in Design view for reunion data, what will Darius press after typing the field name in the Field Name column?
A. [Ctrl][F] B. [Alt] C. [Enter] D. [*]
An electronic mail system could be used to leak information. First, explain how the leakage could occur. Then, identify controls that could be applied to detect or prevent the leakage.
What will be an ideal response?