A group of students is developing a program together using a repository. Each student only has access to the code they are working on. What is this an example of?(1 point)

Responses

least trust
least trust

authentication
authentication

encryption
encryption

zero trust

zero trust