Answer:
A concern that might be expressed by the legal department after reviewing the SLAs and terms of service is:
c. Ensuring that there is a guarantee that the cloud service provider will provide notice in the event that they decide to discontinue operations.
Explanation:
The SLA that the legal department will review should include a description of the services to be provided, expected service levels, measurement metrics for each service, each party's duties and responsibilities, and the contract remedies or penalties for breach, among others. But the legal department will be mostly concerned with legal remedies during breaches, liability limitation and warranties, and intellectual property protection issues than with more technical issues. This is despite the fact that all the terms of the SLA will be diligently reviewed by the legal department.
Answer:
negatives = []
zeros = []
positives = []
while True:
number = input("Enter a number: ")
if number == "":
break
else:
number = int(number)
if number < 0:
negatives.append(number)
elif number == 0:
zeros.append(number)
else:
positives.append(number)
for n in negatives:
print(n)
for z in zeros:
print(z)
for p in positives:
print(p)
Explanation:
Initialize three lists to hold the numbers
Create a while loop that iterates until the user enters a blank line
Inside the loop:
If the number is smaller than 0, put it in the negatives list
If the number is 0, put it in the zeros list
Otherwise, put the number in the negatives list
When the while loop is done, create three for loops to print the numbers inside the lists
Answer:
The answer is most likely B) Trojan.
Explanation:
It’s A because surface website’s are available for everybody but the dark web is opposite
Answer:
(i) Prevention is more important than detection and recovery.
(ii) Detection is more important than prevention and recovery.
(iii) Recovery is more important than prevention and detection.
Explanation:
(i) Prevention is more important than detection and recovery.
Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.
(ii) Detection is more important than prevention and recovery.
Detection of an attack can be done through for example a security alarm can detect an attack and inform others.
(iii) Recovery is more important than prevention and detection.
Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.