- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q: Marty discovers that his organization allows any user to log into the workstation assigned to any other user, even if they are from completely different departments. This type of access violates which information security principle?
A: Least privilege
Explanation: According to the scenario, this type of access is most directly a violation of least privilege because it grants users privileges that they do not need for their job functions. Using the least privilege concept gives a privileged account only the minimum rights and capabilities required for the role.Answer A is incorrect. Provisioning starts with the initial claim of identity and a request to create a set of credentials for that identity.Answer B is incorrect. Revocation is the formal process of terminating access privileges for a specific identity in a system.Answer C is incorrect. Aggregation is the accumulation of privileges over time.
- Get link
- X
- Other Apps
Comments
Post a Comment