Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

Q. Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

A. Least privileges

B. Open Design

C. Separation of Privileges

D. Both A & C

Answer: Least privileges

We will be happy to hear your thoughts

Leave a reply

Gkseries.com
Logo
Register New Account