The term “principle of least privilege” is best as:
A.
A separation of command, program and interface functions
B.
Active monitoring with network base intrusion detection systems and host based intrusion detection systems
C.
The process of granting each user the lowest clearance and access needed to accomplish their task
D.
Implementation of mandatory access control
Explanation:
The principle of least privilege is used in part to limit the damage resulting from accidents, errors, or unauthorized use of system resources.