Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

Q. Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

A.            Least privileges

B.            Open Design

C.            Separation of Privileges

D.            Both A & C

Answer: Least privileges

We will be happy to hear your thoughts

Leave a reply

Gkseries.com
Logo
Register New Account