1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
10

you are considering cloud services, and you concerned about the interaction of your security policies and those of the hosting p

rovider. What can alleviate your concern
Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
7 0

Answer:

Cloud access security brokers

Explanation:

Cloud access security brokers (CASBs) can alleviate your concern. This is a software that is between cloud service users and cloud applications. Monitoring every activity and ensuring security protocols.

It does the work of merging the security policies of users and that of the providers. Across cloud platforms, the CASB can help to identify unsanctioned use.

You might be interested in
A block style business letter is:
julia-pushkina [17]

the answer is A typewritten form of communication with all parts aligned to the left margin

3 0
4 years ago
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the
il63 [147K]

The information that would be the next to be processed by the receiving device is: IP at the internet layer.

<h3>Internet protocol (IP)</h3>

Internet protocol is a network protocol that help to transmit data to user device across the internet or network which inturn make it possible for user device to connect and communicate over the network.

Internet protocol at the internet layer is a TCP/IP software protocol which sole purpose is to transfer data packets across the internet after receiving and processing the data.

Inconclusion the information that would be the next to be processed by the receiving device is: IP at the internet layer.

Learn more about internet protocol here:brainly.com/question/17820678

7 0
2 years ago
Which layer of the osi model is mainly concerned with routing packets of data from one network card to another across a large ne
horrorfan [7]
Layer 3 the Network Layer
7 0
3 years ago
In Windows-based systems, a value that specifies the rights that are allowed or denied in an access control entry (ACE) of an ac
blsea [12.9K]

Answer:

C. Access mask discretionary.

Explanation:

Access_Mask is the value that defines the rights used in access control entries (ACE), this value identifies if the trustee is allowed to access a secured object.

It can define rights in three categories: Standard, specific and generic rights.

4 0
3 years ago
N men and N women were participating in a stable matching process in a small town named Walnut Grove. A stable matching was foun
NeTakaya

Answer:

The simple algorithm is described below

Explanation:

assign all men and women as free

while some man m is free do

  w = highest ranked women on m's list

  if w is free

      then m proposes w and m and w are engaged

  else if w is not free and with m1

      and if w picks m over m1

          then w and m are engaged

          free m1

end

output all the pairs

4 0
4 years ago
Other questions:
  • so im thinking about building my own pc for a decent price can anyone point me to a website where i can buy the parts and name t
    13·2 answers
  • Why is it important to use standard english when applying for a job
    13·2 answers
  • A network supplies programming and services to a series of local tv stations, or _____, which contract to preempt time during sp
    7·1 answer
  • ​Case-Based Critical Thinking Questions​Case 9-1Melissa, a computer science engineering student, is learning the basics of progr
    11·1 answer
  • Assume that scotus is a two-dimensional character array that stores the family names (last names ) of the nine justices on the S
    6·1 answer
  • Janice is making her resume in which section should she include information about her previous employers , positions held , and
    15·1 answer
  • ith reference to McCall's quality modle , what are the three important aspects of a software product ?
    7·1 answer
  • 6.3 code practice: Question Edhesive
    8·1 answer
  • True or false A job analysis weight the positives and negative of a given career
    13·1 answer
  • Which tools is used to bundle cables neatly inside and outside of a computer?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!