Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following is a good practice?
Home
Secure Programming Practices
Which of the following is a good practice?
0
votes
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
Which of the following is a good practice?
A. Give full permission for remote transferring
B. Grant read only permission
C. Grant limited permission to specified account
D. Give both read and write permission but not execute
user-authentication-interview-question
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 6, 2022
by
GeorgeBell
Correct answer is:
Grant limited permission to specified account
Related questions
0
votes
Q: What is not a good practice for user administration?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a good practice?
asked
Feb 6, 2022
in
Usability Principles
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a strong password?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: In which of the following, a person is constantly followed/chased by another person or group of several peoples?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: From the following, which is not a common file permission?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is least secure method of authentication ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is considered as the unsolicited commercial email?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which one of the following can be considered as the class of computer threats?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following are forms of malicious attack?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
...