in Technology by

Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?

  1. Least privilege
  2. Open-Design
  3. Fail-safe Defaults
  4. None of the above

1 Answer

0 votes
by

Answer: 

Fail-safe Defaults

Explanation: The fail-safe Defaults principle of cyber security restricts how privileges are initiated whenever a subject or object is created. In cases where the privileges, rights, access or some other security-related attribute is not granted explicitly, it should also not granted access to the object.

Related questions

0 votes
    ________ is any action that might compromise cyber-security. (a) Threat (b) Vulnerability (c) Exploit (d) Attack ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    I’ve done my btech in information Technology. What should I study (diploma or post graduation) to get a job in cyber security field? Select the correct answer from above options...
asked Dec 23, 2021 in Education by JackTerrance
0 votes
    Which one of the following principles of cyber security refers that the security mechanism must be as small and ... Economy of the Mechanism Least privilege Fail-safe Defaults...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Which of the following can be considered as the elements of cyber security? Application Security Operational Security Network Security All of the above...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Which plugin notifies whenever there is any change in file? a) gulp-notify b) gulp-watch c) ... Answers 🔗Source: Continuous Integration Interview Questions and Answers...
asked Dec 20, 2020 in Technology by Editorial Staff
0 votes
    Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. (a) 65 (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    I’ve done my btech in information Technology. How can I get a job in cyber security field? Select the correct answer from above options...
asked Dec 23, 2021 in Education by JackTerrance
0 votes
    How the computer graphics and IT( information technology-internet, artificial intelligence, cyber security) helpful in ... Kashmir? Select the correct answer from above options...
asked Nov 29, 2021 in Education by JackTerrance
0 votes
    In ethical hacking and cyber security, there are _______ types of scanning: 1 2 3 4...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    The security principle that contradicts the idea of “security through obscurity” is _________. (1)Confidentiality (2)Non-repudiation (3)Kerchoff’s Principle (4)Shannon’s maxim...
asked Mar 19, 2021 in Technology by JackTerrance
0 votes
    An AppSec pipeline applies the principle of _________ into the application security program. 1.DevOps and Agile 2.Rugged DevOps 3.DevOps 4.DevOps and Lean...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Whenever an object moves under the influence of Force of gravity alon it is called. . Select the correct answer from above options...
asked Nov 27, 2021 in Education by JackTerrance
...