List of questions
Related questions
Question 187 - N10-008 discussion
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
A.
Network access control
B.
Least privilege
C.
Multifactor authentication
D.
Separation of duties
Your answer:
0 comments
Sorted by
Leave a comment first