Q. Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?
A. Least privileges
B. Open Design
C. Separation of Privileges
D. Both A & C
Answer: Least privileges