Gkseries.com

Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

Suppose an employee demands the root access to a UNIX system

Q. Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

A.            Least privileges

B.            Open Design

C.            Separation of Privileges

D.            Both A & C

Answer: Least privileges

Exit mobile version