1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
15

Cyber Security Network Problem

Computers and Technology
1 answer:
atroni [7]3 years ago
7 0

Answer:

i don't understand what you put if you fix it so i can understand it i will try and figure it out

Explanation:

thank you so much but i don't understand it sorry.........

:(

You might be interested in
How do you change your name on your brainly profile
deff fn [24]

Answer:

first you click on ''edit profile'' then click on ''Preferences'' then where it says first name type what u want ur name to be

Explanation:

i hope this helped if not im sorry

7 0
3 years ago
Read 2 more answers
Which snippet of code is in XML?
11111nata11111 [884]

Answer:

still need help with this or you got it done if not lmak asap and I can help ya:)

5 0
3 years ago
2. Which one of the following is not a feature of technology?
Bogdan [553]

Answer:

Answer is C is believe

Explanation:

oi think dont come at me

5 0
3 years ago
You just read a restaurant review on the internet of the newest restaurant in town. The writer of the article said the food was
Marizza181 [45]
A. The restaurant review contains data but is not data itself. 
I'm sorry if that's wrong, but that seems right to me. 

6 0
3 years ago
An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
babunello [35]

The S3 encryption, <u>Server-Side Encryption with Customer-Provided Keys (SSE-C)</u>, allows the company to leverage Amazon S3 for storing data with given constraints.

What do you mean by S3 encryption?
S3 encryption <u>encrypts your </u><u>data </u><u>when it is written to disks in its </u><u>data </u><u>centers at the </u><u>object </u><u>level and decrypts it for you when you </u><u>access </u><u>it.</u> There is no distinction between accessing encrypted or unencrypted items as long as you authenticate your request and you have access permissions.

S3 encryption<u> </u><u>encrypts an item before saving it to disk when you use server-side </u><u>encryption</u><u>; the </u><u>object </u><u>is then decrypted when you download the object</u>. S3 encryption lets you safeguard the data you store in AWS S3 buckets online, which is crucial for sensitive data.

To learn more about S3 encryption, use the link given
brainly.com/question/9979590
#SPJ4

4 0
1 year ago
Other questions:
  • Clearing the computer's cache helps store recently-used information.<br><br> True<br> False
    10·2 answers
  • Organisms are classified as producers or consumers acorrding to the way they
    11·2 answers
  • Swiping up with three fingers on mac os x launches what?
    8·1 answer
  • If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of d
    11·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • What is your favourite video game??​
    5·2 answers
  • You will implement three different types of FFs with two different reset types. You have to show your results on your FPGA. You
    9·1 answer
  • The function below takes two arguments, a dictionary called dog_dictionary and a list of dog names (strings) adopted_dog_names.
    8·1 answer
  • Which graphic file format would you choose if you needed to make an animated graphic for a website?
    5·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!