1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
2 years ago
11

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp

le for.
Computers and Technology
1 answer:
pychu [463]2 years ago
5 0

An example of a security misconfiguration is the absence of adequate security hardening throughout the application stack or incorrectly set permissions.

<h3>What are security misconfigurations?</h3>

Security measures that are incorrectly set or left unsecured are known as security misconfigurations,

They, put your systems and data at risk. Basically, a misconfiguration might result from any poorly described configuration changes, default settings, or a technical problem with any component in your endpoints.

Cross-Origin resource sharing (CORS), and verbose error messages are a few instances of security misconfigurations.

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example of security misconfigurations.

Hence, security misconfigurations are the correct answer.

To learn more about the security misconfigurations refer to:

brainly.com/question/14613247

#SPJ1

You might be interested in
I WILL MARK BRAINLEST
mezya [45]

Answer: I think its the last one, there is often more than one right choice :)

5 0
3 years ago
Select all the items that determine your preference for a concert ticket. a) band that is playing b) date of the concert c) pric
vlada-n [284]
I believe the answer is A, B, and C
8 0
3 years ago
// This pseudocode is intended to describe
tensa zangetsu [6.8K]

Applying information of a computational language in pseudocode, a code may be written to describe estimating the price of an item on sale for 10% off.

Writting the code:

<em>// This </em><em>pseudocode </em><em>is </em><em>intended </em><em>to desribe</em>

<em>// computing the price of an item on sale for 10% off</em>

<em>start</em>

<em>input origPrice</em>

<em>discount = price * 0.25</em>

<em>finalPrice = origPrice - discount</em>

<em>output finalPrice</em>

<em>stop</em>

<em />

<em>// This pseudocode is intended to </em><em>compute </em><em>the number</em>

<em>// of </em><em>miles per gallon </em><em>you get with your car.</em>

<em>start</em>

<em>input milesTraveled</em>

<em>input </em><em>gallonsOfGasUsed</em>

<em>milesPerGallon = milesTraveled / gallonsOfGasUsed</em>

<em>output milesPerGallon</em>

<em>stop</em>

<em />

<em>// This pseudocode is intended to compute the number</em>

<em>// computing the per dday </em><em>cost </em><em>of your rent</em>

<em>// in a 30-day month</em>

<em>start</em>

<em>input rent</em>

<em>costPerDay = rent / 30</em>

<em>output rent</em>

<em>stop</em>

Learn more about the pseudocode here :

brainly.com/question/13208346

#SPJ1

3 0
1 year ago
1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
GaryK [48]

Answer: C) Canonicalization error

Explanation:

Canonicalization error is the error or fault that occurs when data is changed into canonical form or standard form that persist different representation.This can create fault when different filenames or structure is assigned to data and canonization cannot take place as it works for simple data representation.

  • Other options are incorrect because static buffer flow is stable writing or reading of data that reaches outside the buffer boundary.Index error is accessing of index by any user that is found beyond the index's list boundary.
  • Heap overflow is the stack gets overlowed outside the boundary while overwriting heap.Thus, the correct option is option(C).
4 0
3 years ago
When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
Harman [31]
Code sofware your welcome
8 0
3 years ago
Other questions:
  • Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to
    11·1 answer
  • The ____ preceding a formula alerts excel that you are entering a formula or function and not text
    14·1 answer
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • Your textbook discussed a record store example where one user could perform a query to determine which recordings had a track le
    14·1 answer
  • What is the web of trust
    7·2 answers
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.
    8·1 answer
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!