Which two actions limit the consequences of a network based attack?
A.
Implementing the principle of least privilege
B.
Installing a firewall at the outer boundary of your systems
C.
Placing Internet-accessible servers in a demilitarized zone
D.
Deploying a single sign-on system to provide system-wide authorization
E.
Allowing application servers privileged access to all databases
BC