Jane, the security administrator for a company, needs to assign permissions for users on her network. Which of the following would allow Jane to give ONLY the appropriate permissions necessary?
A. Separation of duties
B. Job rotation
C. Privilege escalation
D. Least privilege
Ans: D. Least privilege
Computer Science & Information Technology
You might also like to view...
In Word, what is not true about a Text box?
A) It can contain text or graphics. B) You can use several on a page at the same time. C) It is movable and resizable. D) It can only contain text.
Computer Science & Information Technology
The coherent application of methodical investigatory techniques to collect, preserve, and present evidence of crimes in a court or court-like setting is known as _________.
A. evidentiary material B. forensics C. crime scene investigation D. data imaging
Computer Science & Information Technology