1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
2 years ago
15

a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data

security, threat protection, and compliance. these pillars represent the basis of the cloud app security framework upon which microsoft defender for cloud apps is built. which pillar is responsible for identifying and controlling sensitive information? threat protection. compliance. data security.
Computers and Technology
1 answer:
crimeas [40]2 years ago
5 0

The pillar that is responsible for identifying and controlling sensitive information is called "Data Security" (Option D)

<h3>What is Data Security?</h3>

Data security is the protection of digital information throughout its life cycle from corruption, theft, or illegal access.

It includes hardware, software, storage devices, and user devices, as well as access and administrative controls and organizational policies and procedures.

<h3>Why is data security important?</h3>

Any firm creates, collects, preserves, and shares data, which is a valuable asset.

Protecting it from internal or external corruption and unauthorized access protects a firm from financial loss, reputational injury, deterioration of consumer confidence, and brand erosion.

Learn ore about Data Security:
brainly.com/question/25720881
#SPJ4

You might be interested in
Your co-worker is at a conference in another state. She requests that you
aniked [119]

Answer:

C

Explanation:

This is the easiest, quickest, and least destructive method.

3 0
3 years ago
Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n
rewona [7]

Answer:

Option C. Security+ is the correct answer.

Explanation:

8 0
3 years ago
G The method of mapping where each memory locationis mapped to exactly one location in the cache is
Otrada [13]

Answer:

Direct Mapped Cache

Explanation:

Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.

It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.

Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"

4 0
2 years ago
Write a function sample_median(n,P) that generates n random values using distribution P and returns the median of the collected
TiliK225 [7]

Answer:

import numpy as np

def sample_median(n, P):  

   return np.median( np.random.choice ( np.arange (1, len(P) + 1 ), n, p = P ) )

print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))

print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))

print(sample_median(5, [0.3,0.7])

print(sample_median(5, [0.3,0.7])

Explanation:

  • Bring in the numpy library to use the median function provided by the numpy library.
  • Define the sample_median function that takes in 2 parameters and returns the median with the help of built-in random, choice and arrange functions.
  • Call the sample_median function by providing some values to test and then display the results.    

Output:

4.5

4.0

2.0

1.0

7 0
3 years ago
with the aid of your own example explain how memory,registers and secondary storage all work together​
AnnyKZ [126]

Memory, registers and secondary storage all work together​ so as to create or produce an ideal storage conditions.

<h3>How does memories works together?</h3>

The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.

An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.

Learn more about Memory from

brainly.com/question/25040884

6 0
2 years ago
Other questions:
  • About n processes are time-sharing the CPU, each requiring T ms of CPU time to complete. The context switching overhead is S ms.
    12·1 answer
  • Certain medications can increase risk of obtaining a sunburn true or false
    12·1 answer
  • NOTE: in mathematics, division by zero is undefined. So, in C , division by zero is always an error. Given a int variable named
    10·1 answer
  • What enables a website to recognize a computer as a return visitor (as opposed to a first-time visitor)?
    12·1 answer
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • What is the computer that is similar to a destop but smaller in size
    8·1 answer
  • Working with do-while loop
    9·1 answer
  • Learning Task 2: Identify what is being asked. Write your answers on your notebook 1. What Microsoft Office program is used for
    15·1 answer
  • Which of the following tips for using social network will help you keep your job
    12·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!