Question 2 of 10

What is the principle of least privilege, and how do you apply it in database access management?