Which two actions limit the negative consequences of a successful attack? (Choose two.)
A.
Implementing the principle of least privilege
B.
Installing a firewall at the outer boundary of your systems
C.
Placing Internet-accessible servers in a demilitarized zone
D.
Using a single sign-on system so that administrators do not have to log in to each server
separately
E.
Giving servers administrative rights to the databases they need, and ensure that the
password is not hard-coded