1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stira [4]
4 years ago
6

An access control system that grants users only those rights necessary for them to perform their work is operating on which secu

rity principle?
A. Discretionary Access
B. Least Privilege
C. Mandatory Access
Computers and Technology
1 answer:
solmaris [256]4 years ago
7 0

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
You might be interested in
The formula for the trajectory of a ball is given by f(x)=xtanθ−12v20gx2cos2θ+y0 where x is a coordinate along the ground, g=9.8
Andre45 [30]

Answer:

The program in python is as follows:

import math

def traj ect ory(th e ta,x,y,v):

   t = ma th . tan(m ath . radians(theta))

   c = math . cos(math . radians(theta))

   g = 9 . 8

   fx = x * t - (1/(2*v**2)) * ((g*x**2)/(c**2))+y

   return round(fx,3)

   

print("x\t f(x)")

for x in range(0,17):

   theta = 50

   y= 10

   v = 10

   print(str(x)+"\t"+str(tr aje ctory (the ta,x,y,v)))

Explanation:

The question is incomplete. However, I have written the program to calculate the trajectory values f(x).

<em>See attachment for complete program where comments were used as explanation</em>

Download txt
6 0
3 years ago
QUESTION 2 Fruit is an enumerated type with values apple, banana, grape, and orange, in that order. Which of the following state
Llana [10]

Answer:

Option A i.e., snack = Fruit.orange;

Explanation:

It is the user-defined data type which is mainly used to initialize the names or titles to integral constants so in the following statement 'Fruit' is the enumerate data type function and its values are the followings given in the statement, 'snack' is the variable of the function 'fruit' that is an enum type, so the initialization is done by the following type in the Java Programming Language.

6 0
3 years ago
When should students practice netiquette in an online course? Check all that apply.
ser-zykov [4K]

Answer:

The answer to this question is given below in the explanation section. However, the correct answer is: student should practice netiquette in an online course when they are participating in online discussion board.

Explanation:

It is important for you as a student to recognize that the online classroom is in fact a classroom, and certain behaviors are expected when you communicate with both your peers and your instructors. These guidelines for online behavior and interaction are known as “netiquette”.

So, the correct option of this question is: students should practice netiquette in an online course when they are participating in an online discussion board. Because the discussion board is opened by the instructor/tutor, he constantly looking for student behavior throughout the discussion. so, students should use netiquette practice during the discussion in the online class.

However, other options are not correct because, in these options, there is not the presence of teacher/instructor. And, also noted that netiquette is practiced in online class by the student.  

8 0
3 years ago
Read 2 more answers
What would be the purpose of grouping worksheets in a workbook?
Nikolay [14]

Answer: A

Explanation:

3 0
3 years ago
An administrator deploys a basic network intrusion detection (NID) device to block common patterns of attacks. What detection me
shusha [124]

The type of detection method that this basic network intrusion detection (NID) device use is Signature-based.

<h3>What is signature-based detection?</h3>

A Signature-based detection is known to be a term that is often referenced to cybersecurity.

Note that it involves the use of footprints to recognize any form of malware. It is known that have programs, apps, software, etc., often consist of a digital footprint and as such the use of this detection can be able to identify the attack.

Learn more about  network intrusion from

brainly.com/question/26199042

8 0
2 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • Your game design company has recently asked all employees to use a specific personal information management application (PIM) to
    6·1 answer
  • The Mesozoic is known as the _________
    7·1 answer
  • What is cutting-edge technology
    6·1 answer
  • For an alternative to the String class, and so that you can change a String's contents, you can use_________ .
    12·1 answer
  • 5.19 LAB: Countdown until matching digits Write a program that takes in an integer in the range 20-98 as input. The output is a
    14·1 answer
  • Accessing disk is much slower than accessing memory. As a result, many file systems have been designed with various optimization
    7·1 answer
  • What's the answer plssss​
    10·1 answer
  • Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum s
    12·1 answer
  • Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!