1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
4 years ago
13

While performing disk and file maintenance on the company file server, you determine a user in the accounting department has bee

n accidentally saving documents to all shared folders on the file server. The user’s computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.
Which of the following best describes this situation?

A. The user bypassed the security of the file server.
B. The principle of least privilege was not followed.
C. The firewall on the server is disabled.
D. The firewall on the user’s computer is disabled.
Computers and Technology
2 answers:
Anit [1.1K]4 years ago
5 0

Answer:

B. The principle of least privilege was not followed.

Explanation:

The principle of least privilege (POPL) also known as the principle of minimal privilege or the principle of least authority is based on the idea that a process, user or program should only be given authorization to access only resources  and files that are needed to perform their work. It can be used to restrict access rights for applications, systems, processes and devices to only those permissions required to perform authorized activities For example a user that is supposed to be a typist should not be given access to be able to install programs.

STALIN [3.7K]4 years ago
3 0

Answer:

B. The principle of least privilege was not followed.

Explanation:

From the example, too much access and privilege was given to the user and that was why he was able to share folders to all servers. The principle of least privilege, also known as the principal of least authority is used in computer security and ensures that a user is allowed the barest minimum permission required to perform their duty effectively.

You might be interested in
BRAINLIEST
Naddik [55]

Answer:

E.  \: blog

8 0
3 years ago
Read 2 more answers
Name of the best Android keyboard
mrs_skeptik [129]

I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.

But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.

5 0
3 years ago
Does anyone know a way to skip the videos on Edgnuity?
Mazyrski [523]

Answer:

Yes, there is usually a skip button in the corner.

Explanation:

when i have to watch videos on there thats how i skip it

Hope this helps!!

7 0
3 years ago
Once a virus has been removed by your anti-virus program, all traces of it are gone from your computer.
pychu [463]
Im pretty sure that is false
5 0
3 years ago
Suppose we have a 4096 byte byte-addressable memory that is 32-way high-order interleaved, what is the size of the memory addres
iogann1982 [59]

Answer:

7

Explanation:

Given that :

Byte-addressable memory = 4096

Order = 32

Rwqritying such that they have the same base ;

4096 = 2^12

32 = 2^5

2^12 - 2^5

12 - 5 = 7

4 0
3 years ago
Other questions:
  • Angela wants to give her press release an attractive and cohesive appearance. How can she quickly format her press release so it
    14·1 answer
  • Point mode allows you to select cells for use in a formula by using your finger or the pointer
    7·1 answer
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • . What is suboptimization?
    6·1 answer
  • What type of data would a RDBMS store in a linked list, two-way linked list, or B-trees? What are the advantages and disadvantag
    5·1 answer
  • Why does a bus topology require a terminator? a) because otherwise it would be a ring network b) because otherwise the packets w
    10·2 answers
  • write a program that inputs 3 numbers and prints the largest input must be transformed into a integer but printed as a string​
    11·1 answer
  • What is the name of tool
    11·1 answer
  • Do you play Rocket League
    10·2 answers
  • Area Triangolo Rettangolo in c++
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!