Which is an appropriate technique for minimizing the consequences of a successful attack?
A.
Input validation
B.
Principle of least privilege
C.
Encryption of wire transmissions
D.
Use of strong/two-factor authentication
Which is an appropriate technique for minimizing the consequences of a successful attack?
Which is an appropriate technique for minimizing the consequences of a successful attack?
A.
Input validation
B.
Principle of least privilege
C.
Encryption of wire transmissions
D.
Use of strong/two-factor authentication