____ reduces the chance of an individual violating information security by increasing the scrutiny on any one user.
A. Need to know
B. Least privilege
C. Access control
D. Separation of duties
Answer: D
Computer Science & Information Technology
You might also like to view...
An (analog) telephone call is "circuit based," meaning that the system chooses a wire path from sender to receiver and that path or circuit is dedicated to the call until it is complete. What are two disadvantages of circuit switching?
What will be an ideal response?
Computer Science & Information Technology
The _______ property of an event stores a reference to the control that triggered the event.
a) Target b) Source c) SourceControl d) EventTarget
Computer Science & Information Technology