FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

NETWORK ARCHITECTURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
To ensure users are logging into their systems using the least privilege method, which of the following should be done?
A
Allow users to determine their needs and access to resources
B
Enforce a group policy with the minimum amount of account restrictions
C
Employ a BIOS password that differs from the domain password
D
Enforce a policy that allocates permissions based strictly on the user’s job role
Explanation: 

Detailed explanation-1: -The principle of least privilege works by allowing only enough access to perform the required job. In an IT environment, adhering to the principle of least privilege reduces the risk of attackers gaining access to critical systems or sensitive data by compromising a low-level user account, device, or application.

Detailed explanation-2: -To application roles − Most recommended way of assigning permissions and privileges. To individual users − This is difficult to manage where you can assign permissions and privileges to specific users.

Detailed explanation-3: -The principle of least privilege (PoLP) is an information security concept which maintains that a user or entity should only have access to the specific data, resources and applications needed to complete a required task.

Detailed explanation-4: -The principle of least privilege (PoLP) refers to an information security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions.

There is 1 question to complete.