Which one of the following security principles explains a practice that security administrators should NOT follow when designing an information security program for their organization?
a. Defense in depth
b. Least privilege
c. Security through obscurity
d. Separation of privileges
Answer: c. Security through obscurity
Computer Science & Information Technology
You might also like to view...
How is it possible for your program to obtain the data you type in from the keyboard? Explain.
What will be an ideal response?
Computer Science & Information Technology
To advance from one cell to the next, you press the:
A) Tab key. B) Enter key. C) Alt and Tab keys. D) Ctrl and Enter keys.
Computer Science & Information Technology
To begin to record audio for a presentation, click the ________ tab
Fill in the blank(s) with correct word
Computer Science & Information Technology
How many variables does Goal Seek change with each time it is run?
A) up to 3 B) 1 C) 2 D) unlimited
Computer Science & Information Technology