A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
May2022
Highly Voted 2 years, 10 months ago876cec8
Most Recent 10 months, 4 weeks agobdemps98
1 year, 1 month agoLos1994
1 year, 2 months agoInjunJim
1 year, 6 months agoPaula77
1 year, 7 months agoMehsotopes
1 year, 8 months agoosmaster
1 year, 9 months agoW1010x
1 year, 9 months agoNisita
1 year, 9 months agoJuliana1017
1 year, 11 months agoDoaa81
2 years, 2 months agofamco
2 years, 3 months agorybar
2 years, 3 months agodesmondprice
2 years, 3 months agofamco
2 years, 3 months ago[Removed]
2 years, 4 months agoJakub2023
2 years, 4 months ago