Which computer security concept is violated when a web server is written that uses the “root” account for all interactions with a Linux system?
A. RBAC
B. PermitRootLogin
C. certificate-based authentication
D. principle of least privilege
Which computer security concept is violated when a web server is written that uses the “root” account for all interactions with a Linux system?
A. RBAC
B. PermitRootLogin
C. certificate-based authentication
D. principle of least privilege