1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
13

Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A. Separat

ion of dutiesB. Implicit denyC. Least privilegeD. Keep it simple
Computers and Technology
1 answer:
Flura [38]3 years ago
5 0

Answer:

Least Privilege

Explanation:

The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.

You might be interested in
___operating space means there is a restriction to the drivers line of sight
Harman [31]

Answer

Closed zone operating space means there is a restriction to the drivers line of sight

Explanation

The line of sight restriction to a driver or while driving is the visible path of travel from your vehicle to your targeted area towards your destination.It is also the area that's visible to a driver while driving.

Closed zone or condition means that there is a restriction to the drivers view or that the space is unavailable in a particular zone.

5 0
3 years ago
E-mails that are mailed directly to a consumer without their knowledge or permission are called
gizmo_the_mogwai [7]
E-mails that are mailed directly to a consumer without knowledge or permission are called spam
6 0
3 years ago
Read 2 more answers
Please help me with coding!
tresset_1 [31]

Answer:

key code space

Explanation:

the transformation

6 0
3 years ago
Read 2 more answers
Whats an effective way to sort linked lists in cpp.
irina [24]

Answer:

Using Merge Sort.

Explanation:

Merge Sort is preferred for sorting the linked list because the the data stored in linked list is not in serial memory address which makes the quick sort algorithm very slow and other sorting algorithms impossible.

Merge Sort is a divide and conquer algorithm.

In this algorithms we divide the linked list into sub parts and sort the sub parts of the linked list and then we merge them in sorted order. It is a very effective approach for linked list sorting.

The time complexity of merge sort is O(NLogN).

6 0
3 years ago
How do you put pictures in your questions?
faust18 [17]

Answer:

there's a plus sign in the bottom right press it then another thing will pop up which looks like a clip then you press that

8 0
4 years ago
Other questions:
  • PLEASE HELP
    13·2 answers
  • To print the number of elements in the array named ar, you can write :
    10·1 answer
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • What are the two ways to print a document?
    11·1 answer
  • The design of a blog refers to:
    8·1 answer
  • How do l write a program which countdown from 10 to 3​
    6·1 answer
  • To override a method in a subclass, the method must be defined in the subclass using the same signature and compatible return ty
    12·1 answer
  • Which of the following is true about main and secondary memory?
    5·1 answer
  • What are the four components of security documentation?
    9·1 answer
  • leon started a project to design and create a new video game for the animation studio where he develops graphics and animations
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!