Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job funciton?
a. Deny all
b. Allow all
c. Most privilege
d. Least privilege
Answer: d. Least privilege
Computer Science & Information Technology
You might also like to view...
______ is the number of bytes (characters) a storage medium can hold.
A. Capacity B. File size C. Capability D. Disk dimension
Computer Science & Information Technology
Under the ____ model, each Java class executes within one and only one protection domain.
A. graybox B. sandbox C. protection-mapping D. domain
Computer Science & Information Technology
How does a Top-N query work?
What will be an ideal response?
Computer Science & Information Technology
If the name of your table is 06092003Cd'About, to find the purpose of the table you will need to look at the design value of the table under the description column
Indicate whether the statement is true or false
Computer Science & Information Technology