Which of the following access control methodologies provides an individual with the most restrictive access rights to successfully perform their authorized duties?

A. Mandatory Access Control
B. Rule Based Access Control
C. Least Privilege
D. Implicit Deny
E. Separation of Duties

Answer: C. Least Privilege

Computer Science & Information Technology

You might also like to view...

What are four methods for adding actions to a macro with the Macro Designer?

What will be an ideal response?

Computer Science & Information Technology

You are deploying an application to track GPS coordinates of delivery trucks in the United States. Coordinates are transmitted from each delivery truck once every three seconds. You need to design an architecture that will enable real-time processing of these coordinates from multiple consumers. Which service should you use to implement data ingestion?

A. Amazon Kinesis B. AWS Data Pipeline C. Amazon AppStream D. Amazon Simple Queue Service

Computer Science & Information Technology