1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
2 years ago
15

a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data

security, threat protection, and compliance. these pillars represent the basis of the cloud app security framework upon which microsoft defender for cloud apps is built. which pillar is responsible for identifying and controlling sensitive information? threat protection. compliance. data security.
Computers and Technology
1 answer:
crimeas [40]2 years ago
5 0

The pillar that is responsible for identifying and controlling sensitive information is called "Data Security" (Option D)

<h3>What is Data Security?</h3>

Data security is the protection of digital information throughout its life cycle from corruption, theft, or illegal access.

It includes hardware, software, storage devices, and user devices, as well as access and administrative controls and organizational policies and procedures.

<h3>Why is data security important?</h3>

Any firm creates, collects, preserves, and shares data, which is a valuable asset.

Protecting it from internal or external corruption and unauthorized access protects a firm from financial loss, reputational injury, deterioration of consumer confidence, and brand erosion.

Learn ore about Data Security:
brainly.com/question/25720881
#SPJ4

You might be interested in
What are Manuscript signs​
mihalych1998 [28]

Answer: See explanation

Explanation:

Manuscript signs, refers to the marks or the symbols that are used within a manuscript in order to show the necessary corrections which should be made during the preparation of a document.

Manuscript formatting is vital as it makes the manuscript easier to assess. In a situation whereby manuscripts are poorly formatted, it can be turned down by agents and publishers.

5 0
3 years ago
The physical components of a computer, such as a keyboard or hard drive, is called?
faust18 [17]

I'm assuming hardware.


Remember, Hard = Physical.


If that's not it, try peripherals.

4 0
3 years ago
"Your friend is having a birthday and you want to create a slide-show presentation with pictures of her that you have saved on y
OleMash [197]
Could you be more specific? So I can help you in the best way I can.
5 0
3 years ago
which feature will configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workst
Ugo [173]

Answer:

Demilitarized zone (DMZ).

Explanation:

Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.

The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.

7 0
3 years ago
What is a critical consideration on using cloud-based file sharing and storage applications.
Dmitry [639]

Answer:

Determine if the software or service is authorized

Explanation:

:)

3 0
2 years ago
Other questions:
  • The accessibility of a website refers to which of
    6·1 answer
  • Write a program that gets a single character from the user. If the character is not a capital letter (between 'A' and 'Z'), then
    15·1 answer
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • If K is a foreign key in relation R1, then
    10·1 answer
  • Is your florida learners license number the same as the actual license number?
    14·2 answers
  • Where is the typical location of a touchpad inside of a laptop?
    13·1 answer
  • Is this a Bad Cpu processor ? I need some.help ASAP I turn on my.pc and it has no display but everything is on fans and the you
    13·1 answer
  • How to write a program to draw 1000 random points on a frame in python language for coding?
    13·1 answer
  • In a singing competition, there are 34 more men than women
    5·2 answers
  • Write a program to find the principle amount​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!