1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
2 years ago
11

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an examp

le for.
Computers and Technology
1 answer:
pychu [463]2 years ago
5 0

An example of a security misconfiguration is the absence of adequate security hardening throughout the application stack or incorrectly set permissions.

<h3>What are security misconfigurations?</h3>

Security measures that are incorrectly set or left unsecured are known as security misconfigurations,

They, put your systems and data at risk. Basically, a misconfiguration might result from any poorly described configuration changes, default settings, or a technical problem with any component in your endpoints.

Cross-Origin resource sharing (CORS), and verbose error messages are a few instances of security misconfigurations.

Missing appropriate security hardening across any part of the application stack or improperly configured permissions is an example of security misconfigurations.

Hence, security misconfigurations are the correct answer.

To learn more about the security misconfigurations refer to:

brainly.com/question/14613247

#SPJ1

You might be interested in
To delete data from a disk in such a way that no one can ever read it, you should ____.
Vlada [557]
Factory reset or install a new OS without keeping the data.
5 0
4 years ago
Explain why cloud computing can be more complex than a traditional approach.
sp2606 [1]

Cloud computing is more complex than traditional approach due to the following reasons.

Explanation:

1.Cost Savings and Total Cost of Ownership. When you move to cloud computing you tend to save money in several ways in comparison to traditional IT, including the reduction of in-house equipment and infrastructure.

2.Dissatisfaction in Traditional IT. Many companies are frustrated with the negatives that come with traditional IT, such as poor data backup, managing and maintaining your own hardware, and lack of disaster recovery options.

3.Time to Value and Ease of Implementation. Since you don’t have to spend time configuring hardware, maintain systems, and patching software, you can invest your resources elsewhere.

4.Access to Emerging Technology. Much like a car, the minute you purchase on-premise hardware and software, it immediately starts to age. You can access the latest and greatest innovations with a cloud provider who has more purchasing power and stays up-to-date with available solutions. Also, as new innovations are released, they become less likely to integrate with legacy solutions that are often inflexible. Instead, cloud-first development is coming to the forefront.

5.Using Hybrid to Optimize your Operations. Some organizations take the use of the cloud even further by using multiple clouds simultaneously, thus giving them even more agility. Workloads are placed where they perform best, and where costs are most efficient.

5 0
3 years ago
Serena is adding headers and footers in the Slide Master view using the Header and Footer dialog box What is not
sergiy2304 [10]

Answer:

NUMBER 3

Explanation:

5 0
3 years ago
Read 2 more answers
This is your code.
Tju [1.3M]

Answer:

dog

Explanation:

Given the code :

>>> A = [21, 'dog', 'red']

>>> B = [35, 'cat', 'blue')

>>> C = [12, 'fish', 'green']

>>> E = [A, B, C]

the value of E[0][1]

Here, square boxes is used to select the value at E[0] ; the output is then used to select the value at index 1 of E[0] output.

Note that, indexing starts at 0; hence first list element is 0, then, 1, 2, and so on.

At

E[0] ; list E, index 0 (first element in the list) , gives an output A

Then, A[1] ; list A, index 1 (second element in the list) gives 'dog'

4 0
3 years ago
What data does Google Analytics prohibit collecting? Purchase amount Billing city Personally identifable information Product SKU
MA_775_DIABLO [31]

Answer:

Personally Identifiable Information (PII)

Explanation:

PII refers to any data which can help in identification of a person. This data can include name, email, address, credit card or debit card information.

Google Analytics, as the name suggests performs analysis of data present online. It is a web analytics service by Google. Web analytics refers to analysis of data present on the internet. This can be on social networking sites and search engines results.

This service is a tool to measure the return on investment (ROI) on advertisements done online. Online advertising includes advertising on social media and networking websites.

1. This can be used by businesses to measure customer satisfaction through analyzing their online reviews.

2. Also, customers visiting and responding to online advertising can be measured through this service.

3. The traffic that generates as a result of online promotions can be measured through Google analytics.

Web analytics is purely an analytical tool. This measures ROI through collecting customers data. This data can come from online purchasing, customer queries or consumer complaints.

1. The data to be analysed is filtered so that data that is fed into Google analytics does not fall under the category of PII. Any data that can reveal information about the identity of a person is classified as personal identifiable information.

2. The data filters out any PII and the remaining data is directed towards the Google analytics.

3. The data can include billing amount, product information and even billing city. Any of these data does not disclose the identity of a person.

Interpretation of results

1. The analytical results give the success or failure rate of online promotions.

2. The results also give insights into the customers mind. Consumer reviews and complaints give an insight into the success or failure of the company’s product.

Any of the above does not requires personal data from the customers hence, PII is not allowed to be collected by Google Analytics.

3 0
3 years ago
Other questions:
  • A disadvantage of creating a website with tables, without CSS is
    15·2 answers
  • Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did the Point
    15·1 answer
  • 14<br> Select the correct answer.<br> Which activity is a marketing technique?
    9·1 answer
  • Can anyone please help with this programming code in python num= 7 if num &gt; 3: print(“3”) if num &lt; 5: print(“5”) if num ==
    6·1 answer
  • It is possible to change the shape of a text box.
    10·1 answer
  • Write a qbasic program to display integer numbers 1 to 100 using the for next loop<br>​
    9·1 answer
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • Determine what is printed by the following code.
    8·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
  • Design a circuit that will tell whether a given month has 30 days in it.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!