1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
13

Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A. Separat

ion of dutiesB. Implicit denyC. Least privilegeD. Keep it simple
Computers and Technology
1 answer:
Flura [38]3 years ago
5 0

Answer:

Least Privilege

Explanation:

The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.

You might be interested in
Algorithm that has been coded into something that can be run by a machine.
hram777 [196]
The answer is program
8 0
3 years ago
What is your favorite LEGO set
alekssr [168]

Answer:

star wars death star....

4 0
3 years ago
Read 2 more answers
A network that has locations in different countries is considered a WAN.<br> a. Trueb. False
fiasKO [112]

Answer:

True.

Explanation:

Wide area network (WAN) can be defined as a telecommunication network that covers a wide range of geographical locations such as countries or regions across the world for the purpose of communication and sharing information and data between different users.

Hence, a network that has locations in different countries is considered a wide area network (WAN).

Generally, wide area network (WAN) makes it possible for various organizations to interconnect with their branch offices, headquarters and other multiple locations across the globe. Wide area network (WAN) usually span over a distance of 50 kilometers.

6 0
4 years ago
The________ format is usually used to store data
Nikitich [7]
The answer is BCD; The BCD format is usually used to store data
5 0
3 years ago
How would I copy this image?
Dahasolnce [82]

Question: <em>How would I copy this image?</em>

Answer: Either screenshot it, or CTRL C ± CTRL V it. To screenshot something, open 'snipping tool' and pull up the PDF, then box in whatever you are trying to copy. You can also reverse image search it to find it somewhere on the web.

Uplifting Note: To you, smiling at someone may mean nothing, but to them, it might be their whole world.

3 0
3 years ago
Other questions:
  • Which of the following are true statements about collisions in hashing? Linear probing can cause secondary collisions. Higher sp
    6·1 answer
  • What does the group on option do?
    10·1 answer
  • 12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)
    15·2 answers
  • The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int
    9·1 answer
  • Select the correct text in the passage. George is working as a lead team lead. Which statements correctly describes the skills t
    12·1 answer
  • Answer the following questions: • What is the source of the user’s request? Can a technical solution solve his problem? Perhaps
    10·1 answer
  • Intel Centrino Technology is the combinatin of wirelesstechnology with the previous HT technology.
    14·1 answer
  • Select the correct answer.
    9·1 answer
  • Sketch f(x) = 5x2 - 20 labelling any intercepts.​
    13·1 answer
  • What sort of negative outcomes are possible for this type of risk?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!