Which of the following describes the process of comparing cryptographic hash functions of system executables, configuration files, and log files?
Ensuring administrators have both a regular user account and a privileged user account is an example of applying which security principle?