The principle of least privilege is effective in helping prevent security breaches, however,
prevention works best when applied with _______ and ______. Together, these three complete a
security triad. (Choose two)
A.
Footprinting
B.
Scanning
C.
Attack
D.
Detection
E.
Response
Explanation:
Prevention, detection, and response form the basis of an effective security stance. Least privilege
helps provides prevention. Detection is needed because program bugs or human errors have the
potential to cause security breaches. Security policy must be monitored for violations to determine
an adequate response.