1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
13

How will you decide which browser security settings to allow and which ones to block?

Computers and Technology
1 answer:
Brums [2.3K]3 years ago
6 0

One can decide which browser security settings to allow by reviewing them and using one's judgement.

Browsers like Chrome, Safari, Firefox all have innate personal browser security settings which can be altered according to users preferences.

  • Configuring of browsers setting is prominent for safeguarding sensitize information such as passwords, account details from getting accessed by a malicious third party.

In conclusion, one can decide these by reviewing each browser security setting and employ personal judgement to make decision.

Read more on this here

<em>brainly.com/question/13354554</em>

You might be interested in
Instead of typing out each co-worker's email address individually, you can use the Office Online People application to create a
arsen [322]

The answer is D) group

7 0
3 years ago
Read 2 more answers
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
Estoy haciendo codificación en este momento es tan confuso y no estar en la escuela es más difícil
Katarina [22]

Answer:

Misma

Explanation:

6 0
3 years ago
Read 2 more answers
Create a function printInfo(some_dict) that given a dictionary whose values are all lists, prints the name of each key along wit
aleksandrvk [35]

Answer:

def printInfo(some_dict):

   print(len(some_dict['locations']), "LOCATIONS")

   for location in some_dict['locations']:

       print(location)

   print()

   print(len(some_dict['instructors']), "INSTRUCTORS")

   for location in some_dict['instructors']:

       print(location)

seattle = {

   'locations': ['San Jose', 'Seattle', 'Dallas', 'Chicago', 'Tulsa', 'DC', 'Burbank'],

   'instructors': ['Michael', 'Amy', 'Eduardo', 'Josh', 'Graham', 'Patrick', 'Minh', 'Devon']

}

printInfo(seattle)

Explanation:

7 0
3 years ago
A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
Vanyuwa [196]

Answer:

Three.

Explanation:

5 0
3 years ago
Other questions:
  • One purpose of the dual ignition system on an aircraft engine is to provide for?
    7·2 answers
  • To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a?
    8·2 answers
  • A person painting his house dumps the unused paint on the ground. Which of the following resources will this most likely pollute
    14·1 answer
  • Why are computer messages encapsulated?
    13·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • What task does the casting director do, apart from auditioning actors?
    8·1 answer
  • Machu Picchu is located in modern day _______<br><br>​
    14·2 answers
  • 1. A bank customer invested $24 in a bank with 5 percent simple interest per year, write a program the construct a table showing
    11·1 answer
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
  • How to transfer word 2019 from one computer to another
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!