A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him
administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.
Which of the following security practices was violated?
Principle of least privilege
Strong password policy
Entry control roster
Multifactor authentication

Answers

Answer 1

Answer:

Principle of least privilege

Explanation:

The principle of least privilege means the user has only access to that data which is required to complete the task

Therefore as per the given situation, Joe who is an emloyee wants to access the client data base but later on he needs to access the payroll data base

So as per the given situation, the first option should be violated

Hence, the same is to be considered


Related Questions

PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT

Answers

Answer:

B

Explanation:

I think that is the right answer

How is opera diffrerent from blues,gospel,and country music?

Answers

Answer: Opera has its roots in Europe; the other styles are American

Explanation:

Design an algorithm that takes in a stream z1, . . . , zM of M integers in [n] and at any time t can output a uniformly random element in z1, . . . , zt . Your algorithm may use at most polynomial in log n and log M space. Prove the correctness and analyze the space complexity of your algorithm. Y

Answers

Answer:

import random

def rand_select(*args):

   selected = random.choice(args)

   print( selected)

rand_select(12,32,43,54,2,34,65,2,64,74,97)

The space complexity of this program is O(1)

Explanation:

The list of arguments to the function is assigned to the variable "args" and the random's choice method randomly picks an item and assigns it to the variable "selected", then the variable is printed out on the screen. The memory used is 1 + 1 = 2, which is a constant, therefore making the space complexity to be O(1).

Cyberbullying can negatively impact a victim’s
well-being.

Answers

Answer:

whats the questions

Explanation:

Answer:

Physical

Explanation:

took the test

Write a Java program that launches 1000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.

Answers

Java is a 3D mental breakdown in the sim game and he has to play the game and play it with the same thing he has been doing wrong and he is a queen and he is

list down four ways to start word 2010​

Answers

1Locate the Word icon on the Start button's All Programs menu. Don't click to start Word now!
2Right-click the Microsoft Word 2010 menu item. A pop-up menu appears.
3Choose Send To→Desktop (Create Shortcut).
4Press the Esc key to hide the Start button menu and view the desktop.

Database are pranized in
consist of a series of
which consist of a senes of​

Answers

Answer:

fields and records I guess is the answer

a clearly stated objective that how program should work and how it respond to a error is called??

Answers

Answer:

A Problem statement

Explanation:

I hope this is right

A Boolean expression is one that is either: Group of answer choices x or y None of the answers are correct Positive or negative True or False

Answers

Answer:

True or False

Explanation:

Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.

Additionally, Boolean logic allow users to combine keywords with Boolean operators (quotes, AND, OR, near/n) to give a more personalized and relevant search results.

Hence, a Boolean expression is one that is either True or False and it is also known as logical expression.

What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?

* (an asterisk)

# (a pound sign)

$ (a dollar sign)

_ (an underscore)

Answers

Answer:

_ (an underscore)

Explanation:

The underscore character.

__init_ and __str__ have double underscore characters at the beginning and end of the function name.

Correct answer edge 2020

Answer:

The answer to your question is _ (an underscore).

I hope this helps you out and I hope that you have a wonderful day.<3<3<3

Explanation:

Which steps can you take to remove all the data you've just typed from a cell?
Click the cell, then press Delete.
Click Undo on the Quick Access Toolbar.
Click Cut on the Clipboard group.
Press Ctrl+Z.
Press Ctrl+Shift.

Answers

Explanation:

Ctrl+Z

Click and press Delete

Click Undo

The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resends lost packets. It attempts to fix bad packets but does not resend lost packets. It does not attempt to fix bad packets or resend lost packets. It fixes bad packets and resends lost packets.

Answers

Answer:

The User Datagram Protocol (UDP) is called the connectionless protocol because:

It does not attempt to fix bad packets or resend lost packets.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

8.3.9 Text to Binary Python

Answers

Using the knowledge in computational language in python it is possible to write a code that write the binary code

Writting the code:

#function that will convert the text to binary

def text_to_binary(text):

   #variable to store the converted binary value

   binary_text = ""

   #iterate for each character in the text

   for i in text:

       #get the ASCII value of that character

       ascii = ord(i)

       #call the function to get the value of the

       #current ascii number and append it to the

       #binary_text

       binary_text += decimal_to_binary(ascii)

   #return the final converted binary value

   return binary_text

def decimal_to_binary(decimal_value):

   binary_base = 2

   num_bits_desired = 8

   binary_value = str(bin(decimal_value))[2:]

   while len(binary_value) < num_bits_desired:

       binary_value = "0" + binary_value

   return binary_value

text = input("Input the string you would like to encode: ")

binary = text_to_binary(text)

print(binary)

See more about python at brainly.com/question/18502436

#SPJ1

To specify your preferred colors, fonts, and effects for a document, which of the following should be done?

1.Create custom theme fonts

2.Create custom theme

3.Create a custom paragraph style

4.Create a custom character style

Answers

Answer: crest custom theme

Explanation:

Answer:

crest custom theme

Explanation:

select the correct answer​

Answers

Could you possibly get a clearer picture, and also the options for the answer?

africans are unique people they are rich culture and a glorious history​

Answers

Explanation:

In Africa art including crafts and culture, mythology and faith, clothes, lifestyle, music and tongues, African pixel is influenced. In Africa, social identities are plentiful, with vast quantities of multiculturalism being discovered not only through various continents, as well as within individual nations.

Question # 6
Dropdown
Choose the line of code that completes this program.

Output:

dog named Tiger

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

def changeName(self, newName):
self.petName = newName

# main program
myPetA = pet('dog', 'Spot')


print(myPetA)

Answers

Answer:

myPetA.changeName('Tiger') should be it

Explanation:

Answer:

myPetA.changeName('Tiger')

Explanation:

Correct answer edge 2020

how do i create a business process flow chart?

Answers

Answer:

Determine the main components of the process. ...

Order the activities. ...

Choose the correct symbols for each activity. ...

Make the connection between the activities. ...

Indicate the beginning and end of the process. ...

Review your business process diagram.

Explanation:

What is included in a linked list node?

I a reference to the next node
II an array reference
III a data element

Answers

Answer: I a reference to the next node

III a data element

Explanation:

A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.

In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.

Therefore, based on the explanation above, the correct option will be:

I. a reference to the next node

III a data element

A graph shows the relationship between two or more variables that?
a. can be represented by any of these
b. are represented by circles
c. are represented by dots
d. are represented by bars
Please Answer I really would like to know!!!

Answers

Answer:

A. can be represented by any of these

Explanation:

A document template is a___

preformatted structure for a document
read-only document
type of reference for a document
passcode assigned to access a hidden document

Answers

The remember good thing about you you know that I don’t know but I love the internet to you see you I don’t know how you are to document your

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Answers

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

the acronym PC stands of​

Answers

Answer:

personal computer

Explanation:

It stands for personal computer

Which of these is an example of collective voice?
A. He hopes to make the world better for his children.
B. I have always dreamed of a kinder and better world.
C. We are here to make a better world for our children.
D. Your purpose is to make the world a better place.

Answers

Answer:

option C

hope it helps! please mark me brainliest..

Merry Christmas good day

Answer:

c

Explanation:

The Internet began when a large company wanted to sell products online.

True
or
False

Answers

Answer:

True

Explanation:

Answer:

It would be true

Explanation:

Which sentence indicates that Jeff is mentioning the visual synopsis in his proposal while planning a media project?

In the proposal, Jeff states the reason to create the project. He also explains how his project will conclude with a perfect takeaway point. Jeff describes how he is going to tell the story through photography. He then mentions various strategies to engage his audience and describes plans to make sure that the project reaches his intended audience.

Answers

Answer:

I believe its the last question

Explanation:

Answer:

I would say describes plans to make sure that the project reaches his intended audience

Explanation:

none needed

You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used to save these settings?
a. Disk
b. Does not matter
c. SRAM
d. Flash
e. DRAM

Answers

Answer:

d. Flash

Explanation:

A flash memory can be defined as an electronic non-volatile memory chip (storage medium) that is typically used on computer systems and other digital devices such as routers, USB flash drives, switches, digital cameras, mp3 players etc. A flash memory is an electronically erasable programmable read only memory (EEPROM) and as such data saved (written) on it can be erased electronically. Also, a flash memory do not require a source of power (electricity) to save or retain data through the use of a floating gate MOSFET (FGMOS) or floating gate transistor.

In this scenario, you are designing an internet router that will need to save it's settings between reboots. The type of memory that should be used to save these settings is a flash memory because it does not require power to write or save data.

Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way for her to do this? Use an existing template. Design a new theme for the presentation. Create a custom template for the presentation. Search for a design template online.

Answers

Answer:

The answer is A

Explanation:

Edge 2020

assembly language uses _____ coder for programming.

Answers

Answer:

Assembly language uses alphabetic codes in place of binary numbers used in machine language. assembly language code is converted into executable machine code by a utility program referred as assembler.

While gaming online, Julian receives several insulting comments from another player. This is an example of
O denigration
O cyberstalking
harassment
O outing

Answers

Answer:

cyberstalking harassment

Explanation:

since Julian is being harrased or bullied online by someone

Other Questions
The Etruscans, who may have originated in what is now _____ advanced people for the time. They lived on the _____ bank of the _____ River. Ions:Ex: Aluminum has ___3___ valence electrons. It will ______lose 3__ electrons and become an ion with a _____3+_____ charge. (dont just say + or -)Chlorine (Cl) has 7 valence electrons. It will _____________ electron(s) and become an ion with a _____________ charge.Iron (Fe) has 2 valence elecatrons. It will _____________ electron(s) and become an ion with a ______________ charge.Sulfur (S) has _____________ valence electrons. It will ___________ electron(s) and become an ion with a ________________ charge.Neon (Ne) has __________ valence electrons. Its valence shell is ___________ so it will neither __________ nor ___________ electrons. It will not become an ion and it will not bond with another atom. It is stable by itself.Copper (Cu) has 1 valence electron. It will _____________electron(s) and become an ion with a __________ charge. Proportional graphs can be straight or curved. .O TrueO False answer both of these correctly PLEASE i'll give u so many bonus point + brainliest What is meant if someone asks you, "What is the mood of a story/text?" You wouldanswer that the mood is...The mood is how you use details to find the main idea(s)The mood is the author's attitude toward the topicThe setting is the mood and the character are the moodThe mood is a literary element that make a reader feel (evoke) feelings in thereading through words and descriptions. Usually the mood is described as theatmosphere Which is the correct answer? meaning of strategies when the forces of supply and demand lead to an inefficient outcome the economic surplus is maximized. economists call this a market failure. it is a signal that the government needs to take ownership of that market including all the resources involved. economists call this a deadweight loss. b. classify each scenario as to whether it is likely to result in an efficient or inefficient market outcome. Physical map for the western U.S. labelled, Western United States map. The map includes the Mississippi River on the eastern side of the map and the Pacific Ocean on the western side of the map.The Rocky Mountains run through the center of the western part of the map. West of the Rocky Mountains the area is brown. East of the Rocky Mountains the area is green. Unlabled rivers run through the entire map.Using the map and your knowledge of U.S. history, what do the details of the Rocky Mountains suggest about the Lewis and Clark expedition? The group made a grave mistake in not turning back in Missouri. The group really could have traveled by river all the way to the west coast. The group would have been better off traveling by horseback the entire journey. The group most definitely needed a guide to find the easiest route through the mountains. What happened in the beginning of the teleplay that caused all of the chaos? 1. Classify the triangle shown to the right.A. Right, ScaleneB. Acute, Isosceles97C. Obtuse, Scalene1370D. Equiangular, Equilateral Look at The Silver Goblet by Chardin. This painting is intended to find beautyin: Help a brother out please Find the equation of the line that passes through the given points. Write the equation in slope-intercept form.(-2.7) and (-1,5) If an atom has an atomic number of 16, the number of electrons it wouldhave in its outer most shell would be The number of a certain bacteria in a sample of refrigerated food product is given by, n(c)=10c2-20c+600, where c is degrees Celsius. Evaluate n(5) and describe the meaning of your answer. The cell membrane has____. a) polar heads on the outside and nonpolar fatty acids on the inside b) nonpolar fatty acids on the outside and a polar heads on the inside c) polar heads on both inside and outside d) nonpolar fatty acids on both inside and outside Find the solution of the system of equations.8x + 6y = 289x + 3y = 39 What were some reasons American settlers wanted to settle the West?Write your answer in two or three sentences. is this right ?? please answer