What security principle tells the developer to check every access to every object for authority?

A. Complete mediation
B. Least privilege
C. Keep It Simple
D. Separation of Privilege

Answer: A

Computer Science & Information Technology

You might also like to view...

All shapes in PowerPoint 2010 are geometric shapes

Indicate whether the statement is true or false

Computer Science & Information Technology

________ are pre-built documents provided by Microsoft or users

Fill in the blank(s) with correct word

Computer Science & Information Technology