Which of the following security concepts establishes the notion that a user should only be given sufficient access to the resources they need to perform their job funciton?

a. Deny all
b. Allow all
c. Most privilege
d. Least privilege


Answer: d. Least privilege

Computer Science & Information Technology

You might also like to view...

______ is the number of bytes (characters) a storage medium can hold.

A. Capacity B. File size C. Capability D. Disk dimension

Computer Science & Information Technology

Under the ____ model, each Java class executes within one and only one protection domain.

A. graybox B. sandbox C. protection-mapping D. domain

Computer Science & Information Technology

How does a Top-N query work?

What will be an ideal response?

Computer Science & Information Technology

If the name of your table is 06092003Cd'About, to find the purpose of the table you will need to look at the design value of the table under the description column

Indicate whether the statement is true or false

Computer Science & Information Technology