Which is an appropriate technique for minimizing the consequences of a successful attack?

Which is an appropriate technique for minimizing the consequences of a successful attack?

Which is an appropriate technique for minimizing the consequences of a successful attack?

A.
Input validation

B.
Principle of least privilege

C.
Encryption of wire transmissions

D.
Use of strong/two-factor authentication



Leave a Reply 0

Your email address will not be published. Required fields are marked *