Which one of the following security principles explains a practice that security administrators should NOT follow when designing an information security program for their organization?

a. Defense in depth
b. Least privilege
c. Security through obscurity
d. Separation of privileges


Answer: c. Security through obscurity

Computer Science & Information Technology

You might also like to view...

How is it possible for your program to obtain the data you type in from the keyboard? Explain.

What will be an ideal response?

Computer Science & Information Technology

To advance from one cell to the next, you press the:

A) Tab key. B) Enter key. C) Alt and Tab keys. D) Ctrl and Enter keys.

Computer Science & Information Technology

To begin to record audio for a presentation, click the ________ tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

How many variables does Goal Seek change with each time it is run?

A) up to 3 B) 1 C) 2 D) unlimited

Computer Science & Information Technology