Which of the following techniques describes the use of application isolation during execution to
prevent system compromise if the application is compromised?
A.
Least privilege
B.
Sandboxing
C.
Black box
D.
Application hardening
Which of the following techniques describes the use of application isolation during execution to
prevent system compromise if the application is compromised?
Which of the following techniques describes the use of application isolation during execution to
prevent system compromise if the application is compromised?
A.
Least privilege
B.
Sandboxing
C.
Black box
D.
Application hardening