1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
4 years ago
13

While performing disk and file maintenance on the company file server, you determine a user in the accounting department has bee

n accidentally saving documents to all shared folders on the file server. The user’s computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.
Which of the following best describes this situation?

A. The user bypassed the security of the file server.
B. The principle of least privilege was not followed.
C. The firewall on the server is disabled.
D. The firewall on the user’s computer is disabled.
Computers and Technology
2 answers:
Anit [1.1K]4 years ago
5 0

Answer:

B. The principle of least privilege was not followed.

Explanation:

The principle of least privilege (POPL) also known as the principle of minimal privilege or the principle of least authority is based on the idea that a process, user or program should only be given authorization to access only resources  and files that are needed to perform their work. It can be used to restrict access rights for applications, systems, processes and devices to only those permissions required to perform authorized activities For example a user that is supposed to be a typist should not be given access to be able to install programs.

STALIN [3.7K]4 years ago
3 0

Answer:

B. The principle of least privilege was not followed.

Explanation:

From the example, too much access and privilege was given to the user and that was why he was able to share folders to all servers. The principle of least privilege, also known as the principal of least authority is used in computer security and ensures that a user is allowed the barest minimum permission required to perform their duty effectively.

You might be interested in
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
The AND operator is a disjunction and the OR operator is a conjunction.
qwelly [4]

Answer:

True but it might be false but i think is true

8 0
3 years ago
You can change the ____ or position of text within a document's margins.
ahrayia [7]

Answer:

Alignment

Explanation:

That should be correct

7 0
3 years ago
Microsoft words spell checker
Virty [35]
To check spelling<span> in a </span>Word<span> document, open up the document, head to the “Review” tab, then click on “</span>Spelling<span> & Grammar” (part of the “Proofing” group of tools). 

</span>
4 0
3 years ago
Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
Sindrei [870]

Option B

Synchronous replication modes of replication requires a very low latency network connection and ensures data remains in synch with zero data loss in the event of a failure at the source site

<u>Explanation:</u>

Synchronous replication, information is replicated to a subsequent remote place at the identical period as fresh information is implying generated or renewed in the original datacenter.  Actually, both master and target roots endure effectively synchronized, which is vital for triumphant crash restoration.

In the circumstances of synchronous replication, this indicates that the write is deemed ended barely when both local and isolated warehouses approve its fulfillment. Therefore, nullity data failure is assured, but the overall execution is regulated down.

5 0
3 years ago
Other questions:
  • After an extruded feature has been created, you can always go back and edit the feature. When you edit an existing extrude featu
    11·1 answer
  • A database with a(n) _______________ data structure can easily handle a many-to-many data relationship. hierarchical network rel
    5·1 answer
  • Describing Editing Task
    6·1 answer
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • Anyone else getting 502 bad gateway on here?
    7·1 answer
  • When a cells number format is “time” it will show a value in what format
    5·1 answer
  • 20 Points! What are some ways to insert a row or column? Check all that apply.
    14·2 answers
  • Import java.util.ArrayList;
    14·1 answer
  • Histogram 9AMAA 12/01/2021.
    9·1 answer
  • A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of cust
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!