1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
2 years ago
15

a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data

security, threat protection, and compliance. these pillars represent the basis of the cloud app security framework upon which microsoft defender for cloud apps is built. which pillar is responsible for identifying and controlling sensitive information? threat protection. compliance. data security.
Computers and Technology
1 answer:
crimeas [40]2 years ago
5 0

The pillar that is responsible for identifying and controlling sensitive information is called "Data Security" (Option D)

<h3>What is Data Security?</h3>

Data security is the protection of digital information throughout its life cycle from corruption, theft, or illegal access.

It includes hardware, software, storage devices, and user devices, as well as access and administrative controls and organizational policies and procedures.

<h3>Why is data security important?</h3>

Any firm creates, collects, preserves, and shares data, which is a valuable asset.

Protecting it from internal or external corruption and unauthorized access protects a firm from financial loss, reputational injury, deterioration of consumer confidence, and brand erosion.

Learn ore about Data Security:
brainly.com/question/25720881
#SPJ4

You might be interested in
Pls help will give brainlest!!! The image shows a line graph. Which scientist is most likely to use this visual aid in a present
lapo4ka [179]

Answer:

D

Explanation:

6 0
3 years ago
Kim is writing a sql query that will pull a list of customers with outstanding orders and the sales rep for each order. What sho
Step2247 [10]

What the phrase should say in Kim's SQL Query is;  WHERE Customer = Sales Rep

<h3>What is SQL Query?</h3>

Structured Query Language (SQL) is defined as a standardized programming language that is used to manage relational databases and perform various operations on the data in them.

Now in SQL Query, when one SQL query is embedded in another SQL query to simulate a join, the second SQL query is embedded in the "WHERE" of the first query.

Since the query will pull a list of customers with outstanding orders and the sales rep for each order. Then, the where phrase will be;

WHERE Customer = Sales Rep

Read more about SQL Query at; brainly.com/question/10097523

6 0
3 years ago
NEED BY 15 MINUTES PLEASE! WILL MARK BRAINLIEST!You can create special effects in an image using a camera or a photo-editing too
vovangra [49]

Answer:

Special Lenses For Special Effects. ... These specialty lenses may be designed with movable focal planes for amazing depth of field, or built to focus extremely close to tiny subjects for macro enlargements, or even to produce a specific type of soft focus that's flattering for portraits

The meaning of photo editing is the act of altering an image, simply put. But that’s oversimplifying a subject which is quite complex.

For example, some photo editing techniques are done manually, while others are conducted through automated software. Some photo editing is even done offline, on actual photographs, posters or other printed collateral.

Other terms for photo editing:

Image editing

Post-processing

Image/photo manipulation

Photoshopping

Image/photo enhancement

Explanation:

so they both are alike because they can both be used to edit photos and both are great to use

3 0
3 years ago
Why does my laptop keep disconnecting from the wifi.
poizon [28]

Answer: you may be connected to wifi near you

Explanation:

1. Restart your computer

2 Then got to settings

3 Go to Wi-Fi

4. Disconnect from your Wi-Fi

5 Connect to your Wi-Fi

If that does not work, go look it up lol.

3 0
2 years ago
Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25
AfilCa [17]
0 1 10 11
Explanaition:
4 0
3 years ago
Other questions:
  • Respond to the following in a paragraph of no less than 125 words. What is the purpose of netiquette guidelines?
    10·1 answer
  • major m,ajorrr points helpppppppppppppppppppppppppppi have a question i hit a few buttons and now my computer is saying everythi
    11·2 answers
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Written and artistic expressions are protected by
    8·1 answer
  • The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting d
    15·1 answer
  • What is the importance of Mathematical Modeling in the field of bioinformatics.
    8·1 answer
  • The Telecommunications Act of 1996 was a mixed bag for cable customers. Although cable companies argued that it would bring more
    8·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • URGENT!!! Steve wants to change shooting and exposure settings while on his photo shoot. Which camera part will allow him to do
    12·2 answers
  • I just wanna know how many times a day y'all hit the tutor button at the bottom
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!