Obi-Wan Kenobi Full Season Download

 As a student, I get bored. I find stuff to watch or play and this show has me hooked. Liked it so much I decided to share it with you guys. Enjoy. S1.1   S1.2   S1.3   S1.4   S1.5   S1.6  

 CYB 205 Infrastructure Administration

Q: Marty discovers that his organization allows any user to log into the workstation assigned to any other user, even if they are from completely different departments. This type of access violates which information security principle?

A: Least privilege

Explanation: According to the scenario, this type of access is most directly a violation of least privilege because it grants users privileges that they do not need for their job functions. Using the least privilege concept gives a privileged account only the minimum rights and capabilities required for the role.Answer A is incorrect. Provisioning starts with the initial claim of identity and a request to create a set of credentials for that identity.Answer B is incorrect. Revocation is the formal process of terminating access privileges for a specific identity in a system.Answer C is incorrect. Aggregation is the accumulation of privileges over time.

Comments

Popular posts from this blog

NTC/362: Fundamentals of Networking