1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
2 years ago
15

a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data

security, threat protection, and compliance. these pillars represent the basis of the cloud app security framework upon which microsoft defender for cloud apps is built. which pillar is responsible for identifying and controlling sensitive information? threat protection. compliance. data security.
Computers and Technology
1 answer:
crimeas [40]2 years ago
5 0

The pillar that is responsible for identifying and controlling sensitive information is called "Data Security" (Option D)

<h3>What is Data Security?</h3>

Data security is the protection of digital information throughout its life cycle from corruption, theft, or illegal access.

It includes hardware, software, storage devices, and user devices, as well as access and administrative controls and organizational policies and procedures.

<h3>Why is data security important?</h3>

Any firm creates, collects, preserves, and shares data, which is a valuable asset.

Protecting it from internal or external corruption and unauthorized access protects a firm from financial loss, reputational injury, deterioration of consumer confidence, and brand erosion.

Learn ore about Data Security:
brainly.com/question/25720881
#SPJ4

You might be interested in
WILL GIVE BRAINLIEST!!!!!!!!
lord [1]
True,

This is a true statement, pipeline construction is taken very seriously and heavily regulated by multiple entities.
TRUE
6 0
3 years ago
A(n ____________ is considered a named collection of bytes having persistent or lasting storage.
kykrilka [37]
A(n) file is considered a named collection of bytes having persistent or lasting storage.
6 0
3 years ago
A ________ describes the data and relationships that will be stored in a database.
nevsk [136]
Your missing word is Data model.
8 0
3 years ago
https://brainly.com/question/10197478#:~:text=Option%20A%20is%20the%20correct,in%20return%20of%20their%20money.
Alex17521 [72]
Thanks for free points
7 0
3 years ago
The "c" key and the "e" key are struck by
adoni [48]
1 because when you type on the home row your left middle finger will hit both of those letters.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What's the problem with this code ?
    14·1 answer
  • The OSI is a reference system that is used by most types of technicians EXCEPT _____.
    11·2 answers
  • Write a fragment of code that reads in integers from standard input, until end-of-file and sends their (floating point) average
    14·1 answer
  • What does a production possibilities curve represent?Which of the following statements are true? Economic stability means fair d
    9·1 answer
  • Every modern nation has a Central Bank. Which of the following is the Central Bank for these United States?
    14·2 answers
  • The measure means to determine the exact size, amount, or distance of something
    11·1 answer
  • Define computer memory and write its type <br>​
    10·2 answers
  • What does c++ programming mean?
    7·1 answer
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
  • Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!