1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
9

Why is it important to identify where privacy data resides throughout your it infrastructure?

Computers and Technology
1 answer:
charle [14.2K]3 years ago
7 0
<span>One of the key elements in reducing the attack surface of an IT enterprise is to determine the location and sensitive nature of all data, especially privacy data which if compromised, could result in litigation, financial loss, or customer confidence loss. Additionally, this information is part of the foundation of when drafting a Disaster Recovery or Business Continuity plan.</span>
You might be interested in
PLEASE HELP
Zinaida [17]

Answer:

B from you search question carefully and identify the key word

Explanation:

3 0
4 years ago
Read 2 more answers
Ill give you brainiest.
quester [9]
Hey there,

I believe that your correct answer would be that "<span> some people will tell you what they think you want to hear </span>". When you ask someone about the perceptions of your person trait, they will most likely <span>tell you what they think you want to hear because its what they want to make you happy. 

For example: Jimmy ask billy "Am I fat Billy"

                      Billy tells Jimmy "No, Your not fat, you look just great".

                         But really, Jimmy is very fat.

The point is that people are going to say things that make you feel happy and something that you want to hear.

~Jurgen</span>
6 0
4 years ago
A simple way to think of the Excel application is as a giant ______.
Naddik [55]
Spreadsheet ......zzzzzz
8 0
3 years ago
Read 2 more answers
How many instructions can the microprocessor execute each second if the assembly line is present?
SpyIntel [72]

The instructions that he microprocessor can execute each second if the assembly line is present will be depending on the workload and the architecture’s core because it is all depending on the speed of the CPU and the multiplier that it acquires.

3 0
3 years ago
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
Other questions:
  • Jared does not update his computer’s system software. What threat does his computer face?
    9·1 answer
  • Complete the paragraph to explain how Angelina can notify readers that her report is just a draft.
    6·1 answer
  • Examples of apps include pop-up windows, validation of webform inpts and images that change when a cursor passes over them
    12·1 answer
  • List at least three benefits of automated testing?
    13·1 answer
  • When was the federal commission act put into effect?????
    13·1 answer
  • What is the practical application of the information acquired by science.
    15·1 answer
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • Which member of the Jackson family was the spokesperson for the Psychic Friends Network.​
    7·1 answer
  • Which properties would be useful to know to search for a Word document? Check all that apply.
    7·1 answer
  • A central issue of public sharing is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!