1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
13

Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A. Separat

ion of dutiesB. Implicit denyC. Least privilegeD. Keep it simple
Computers and Technology
1 answer:
Flura [38]3 years ago
5 0

Answer:

Least Privilege

Explanation:

The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.

You might be interested in
Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
ad-work [718]

Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, etc then TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests.

<h3>Which TCP IP software layer protocol is generally used to map IP addresses to the Web pages?</h3>

FTP (File Transfer Protocol) It is one of the extensively used software layer protocols of the TCP/IP protocol suite. FTP is largely used to change facts among host gadgets over the Internet or Intranet securely.

TCP and UDP vacation spot port numbers are dynamically generated with the aid of using the sending tool that allows you to music the responses to requests. TCP mechanisms retransmit facts while an acknowledgment isn't always acquired from the vacation spot device inside a hard and fast duration of time,.

Read more about the L2TP:

brainly.com/question/15327815

#SPJ1

3 0
2 years ago
A large amount of data is stored in secondary storage is it true<br>​
Mice21 [21]
Since it’s more cost efficient, it’s better to store more data in the secondary storage. Yes true!
6 0
3 years ago
Read 2 more answers
Write a recursive function sumAll that accepts an integer argument and returns the sum of all the integers from 1 up to the numb
slavikrds [6]

Answer:

int sumAll(int n)//function definition.

{

   if(n==1)//if condition.

   return 1;

   else//else condition.

   {

       return n+sumAll(n-1);//return the value and call the function in recursive manner.

   }

}

Explanation:

  • The above-defined function is a recursive type function that is written in the c language, which holds the if and else condition.
  • When the user passes the largest value from 1, then the else condition will be executed which adds the largest value and pass the value after the decrement of the value as an argument.
  • When the value will become 1, then the function if-block will be executed which returns the value and ends the calling function recursively.
8 0
3 years ago
5. Are you more honest in your online communication? Explain your response.
Sati [7]
Multiple research has been conducted with regards to this point of view, but the common conclusion is that it depends more on the platform. People tend to be more dishonest when not comfortable and when given the chance live off their fantasy even for short while online. We all do agree that an example is the social media where in order to get attention we only share positive things. You might want to check speaker Simon Sinek and see rich views and in depth understanding of how technology has changed us.
5 0
3 years ago
Ill give you brainiest.
quester [9]
Hey there,

I believe that your correct answer would be that "<span> some people will tell you what they think you want to hear </span>". When you ask someone about the perceptions of your person trait, they will most likely <span>tell you what they think you want to hear because its what they want to make you happy. 

For example: Jimmy ask billy "Am I fat Billy"

                      Billy tells Jimmy "No, Your not fat, you look just great".

                         But really, Jimmy is very fat.

The point is that people are going to say things that make you feel happy and something that you want to hear.

~Jurgen</span>
6 0
3 years ago
Other questions:
  • Define the following term: - hue
    11·2 answers
  • AYUDAAA..... DARÉ TODOS LOS PUNTOS QUE PUEDA.
    15·1 answer
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 fai
    14·1 answer
  • Which element would the search element be compared to first, if abinary search were used on the list above?
    6·1 answer
  • To convert microseconds to nanoseconds: a. Take the reciprocal of the number of microseconds. b. Multiply the number of microsec
    13·1 answer
  • Accessing a computer system by using several words is known as​
    13·2 answers
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
  • Which of the following is an example of machine learning?
    5·1 answer
  • What is computer viras? Loist 2 preventive measures against it​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!