Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.

Answers

Answer 1

Answer:

Removing and disabling _____ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost. cookies.

Explanation:

In information security, which of the following is TRUE about managing risk?


Related Questions

i need help to fill in a few blanks with this coding homework. did some, but need help on the rest. the assignment is down below





# Cody Ryan, 4/28/2022, this is coding with loops

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

def main():

# Initialize variables

numGuesses = 0

userGuess = -1

secretNum = 5

name = input("Hello! What is your name?")

while ( userGuess != secretNum):

   userGuess = int(input("Guess a number between 1 and 20: "))

   numGuesses = numGuesses + 1

   if (userGuess < secretNum):

        print("You guessed " + str(userGuess) + ". Too low.")

    if (userGuess > secretNum):

         print("You guessed " + str(userGuess) + ". Too high.")

print("You guessed " + str(userGuess) + ". The correct number is " + secretNum + " after " + numGuess + " times.")

main()

Explanation:

add a While until userGuess == secretNum than we stop

i cracked a school computer screen on purpose and one on accident what will happen now?

Answers

Answer:

You will probably have to pay a fee of replacement, or pay for the whole computer.

Explanation:

What is the advantage of an online database?
A.
requires many hardware components
B.
increases costs
C.
saves money
D.
no technical problems

Answers

Requires many hardware components

Answer:

i believe your answer would be D .

Explanation:

A would not be an advantage as "requires many" is seen as a bad sign when wanting to chose something to use an an advantage

B would not be an advantage if it ends up costing more

C is just saving money so that could be an advantage

D could be an advantage, but technology does have problems aswell

overall D would be your best bet. Brianliest if im right would be appreciated :)

Which of the following is NOT a specialized cloud mechanism? A. Automated Scaling Listener B. Load Balancer C. Multi-Device Broker D. Resource Array

Answers

Answer:

C...i think so sorry if im wrong

Explanation:

I think A…… sorry if wrong

Alan is working on a draft document. He wants the document to have more white space. He can do this by changing the line spacing. True False

Answers

It is a true statement that changing the line spacing will make the document have more white space.

What is a line spacing in word document?

This refers to the distance between upper and lower lines of text.

These line spacing are tools that make text much more readable because its places distance between the word lines.

By using a line spacing, there will be more spaces and white spaces on the word document.

Therefore, the statement is a correct statement.

Read more about line spacing

brainly.com/question/25277953

A security administrator needs to run a vulnerability scan that analyzes a system from the perspective of a hacker attacking the organization from the outside. Which type of scan should he or she use

Answers

A type of scan that should be used by this security administrator to run a vulnerability scan is called non-credentialed scan.

What is vulnerability?

Vulnerability can be defined as any form of weakness, flaw or defect that is found in a software application, computer sytem, or network, which can be exploited by an attacker or a hacker, in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

In this scenario, a type of scan that should be used by this security administrator to run a vulnerability scan is called non-credentialed scan because he or she wants the analysis of the computer system from the perspective of a hacker, who is typically attacking the organization from the outside.

Read more on vulnerability scan here: https://brainly.com/question/25813524

where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to that element.

Answers

Not too sure what the answer the question would expect, or rather what terminology,

But I’d say key-value pairs

For example in CSS

key: value;

color: green;

You are searching for an item in an array of 40,000 unsorted items. The item is located at the last position. How many comparisons do you need to do to find it

Answers

It depends on what algorithm you’re using.
If you’re going item by item, you’ll be looking at O(n) or O(40000)
Give me a reply if you want to know more, such as if you did binary search what the Big O notation is

ASAP 50 POINTS
Type the correct answer in the box. Spell the word correctly.
Which firewall monitors traffic from the DMZ to the LAN?

When a DMZ is set up using dual firewalls, the___

-end firewall monitors traffic moving from the DMZ toward the LAN while the ___

firewall monitors the traffic from the Internet toward the DMZ.

Answers

Answer:

InternalExternal traffic

Explanation:

The external firewall monitors all the external traffic from the internet towards DMZ.

Internal end firewall monitors traffic towards LAN

When performing user access management, a DBA defines each user to the database at the _____ levels. Group of answer choices application and DBMS operating system and application application and network operating system and DBMS

Answers

Answer:

operating system and the DBMS

Explanation:

51. When performing user access management, a DBA defines each user to the dat…

a. application and DBMS

b. operating system and DBMS...

✓ b

The navigation bar appears in the same position on each page and uses the same colors, fonts, and font styles.
a. True
b. False

Answers

Answer:

true

Explanation:

I think that's what it has been in my time of classes

A programmer, or software developer, is a person with the training and skills necessary to ________ computer programs. design create test All of these

Answers

A programmer or software developed must know about how to design, create and test a computer program. Thus the correct option is all of these.

Who is software developer?

A software developer or a programmer is a person have specifed skills under the field of computer science. The software developer needs to get complete training regarding how to design entire computer program, how to create new codes, and regarding the testing of new programs.

Therefore, the correct option is "All of these".

Learn more about software developer, here:

https://brainly.com/question/3188992

#SPJ1

Fill in the blank to this question. The __________ encompasses the data that flow into the system, the data that flow out of the system, and the data stores that collect and organize the data that are maintained permanently.

Answers

Answer:

The __________ encompasses the data that flow into the system, the data that flow out of the system, and the data stores that collect and organize the data that are maintained permanently.

data flow

Explanation:

A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.

Answers

A DoS attack is known as attempts to slow down or stop a computer system or network by sending repetitive requests for information.

What is a DoS attack?

A DoS attack is known to be a form of system attack that is often launched from a lot of compromised devices. It is said to be distributed in the world as a kind of botnet.

This is known to be a form of denial of service attacks, where there is the use of  a single Internet-connected device that is the use of one network connection to drown a target with a deadly form of traffic.

Learn more about DoS attack from

https://brainly.com/question/13068595

Answer pls pls pls pls ​

Answers

Answer:

Flyers and pamphlets, and TV ads most likely are the answers.

Which statements describe front-end databases? Check all that apply. They can be used to store tables. They can be used to store forms. They can be used to store queries. They can be used to store reports. They are saved on a shared network folder. They are saved locally on users’ computers.

Answers

Answer

Explanation: these are the correct answer on the quiz

They can be used to store forms.

They can be used to store queries.

They can be used to store reports.

They are saved locally on users’ computers.

Python local variable referenced before assignment.

Answers

Answer:

may be you are probably calling the variable name before assigning it..

Explanation:

this error occurs if your program finds the name of variable used first before assigning the value..

example:

....some code..

print(x)

--some code--

x = something

So the print statement uses x variable before assigning the value. This causes error.

Is a spreadsheet a good tool for writing a letter? Choose the answer: Yes or No

Answers

Answer:

No... Spreadsheets are commonly used for research, outlining, tables, and etc.

Explanation:

Screenshot provided.

____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.

Answers

I’m pretty sure it’s encryption

Using the _____, you can direct the browser to retrieve specific information about the URL, to reload the current page, or to load an entirely new page.

Answers

Answer:

location object

Explanation:

Using the _____, you can direct the browser to retrieve specific information about the URL, to reload the current page, or to load an entirely new page.

a. selection list b. hidden field c. reference form d. location object

A:

D

You should enter a formula that subtracts the data in cell B4 from the total of cells B2 and B3. What should the formula look like?

Answers

Use this formula:

=(B2+B3)-B4

What two Python data structures are already thread-safe, because they provide automatic support for synchronizing multiple readers and writers? (Choose two.) strings lists dictionaries tuples

Answers

The  two Python data structures that are already thread-safe are list and tuples.

What are the data structures in Python?

Python is known to give room for its users to make  their own Data Structures.

It helps one to be able to  have total hold or control over their work or output functionality. Some key Data Structures are Stack, Queue, and others.

Learn more about Python from

https://brainly.com/question/26497128

#SJ1

Haji decides to change the program so that the computer can run each loop iteration in parallel. Assuming that he runs the program on a computer that can run 8 tasks in parallel, how long will the parallelized solution take

Answers

Answer:

18 minutes

Explanation:

Planet Duration

Jupiter 12 minutes

Saturn 9 minutes

Uranus 4 minutes

Neptune 4 minutes

Earth 1 minute

Venus 1 minute

Mars 1 minute

Mercury 1 minute

planets ← ["Mercury", "Venus", "Earth", "Mars", "Neptune", "Uranus", "Saturn", "Jupiter"]

model ← loadSolarSystem()

images ← []

FOR EACH planet IN planets {

  image ← renderPlanet(model, planet)

  APPEND(images, image)

}

If these are what the values and coding given, then the answer is 18 minutes

Determine if the sequence below is arithmetic or geometric and determine the common difference / ratio in simplest form. 64,8,1

Answers

Answer:

The Sequence is Geometric.  The ratio is a(n) = (n-1)/8

Explanation:

64/8 = 8  

8/8 = 1

Therefore, the next number in the sequence is 1/8 = .125



Exercise
For each of the following tasks, draw what the final list looks like and diagram how you
would solve the problem by writing a step by step process to solve the task.
1. Given a list of integers, replace every element at an even index with 0. Remember lists
start at index 0, so the first element should be replaced and then every other element
thereafter.
Initial list:
3
4
1
2
89
Final list:
Solution Steps:

Answers

Answer:

[0,4,0,2,0]

Explanation:

You need to iterate through the list and check if the index is even by comparing the rest of its division by 2 with 0. This can be achieved using the following algorithm (written in Python, so it can easily be translated to other languages)

mylist = [3,4,1,2,89]

for i in range(0, len(mylist)): #For each index of the list

   if i%2==0: #If the rest of the division of i by 2 is 0, which means it is even

       mylist[i]=0 #Assigns zero to current index

Cannot initialize sftp protocol. Is the host running an sftp server?.

Answers

Answer:

I believe it will resolve your issue

Explanation:

Most of the time it happened due to the password expired . So you need to make do right click on that WinSCP user's and you'll find the option Open in PUTTY, PFA.

write a recursive bool valued function containsvowel that accepts a string and returns true if the string contains a vowel

Answers

Answer:

Write a recursive, bool-valued function, containsVowel, that accepts a string and returns true if the string contains a vowel. A string contains a vowel if: The first character of the string is a v…

Explanation:

A:

bool containsVowel (string s) { bool hasVowel=false; if (s.length()==0) return false; else if (s[0]=='a'|| s[0]=='e'|| s[0]=='u'|| s[0]=='o'|| s[0]=='i'|| s[0]=='A'|| s[0]=='E'|| s[0]=='U'|| s[0]=='O'|| s[0]=='

write a recurseive string-returned function replace that accepts a string and returns a new string consisting of the original string with each blank replace with an asterisk

Answers

Answer:

Write a recursive, string -valued method, replace, that accepts a string and returns a new string consisting of the original string with each blank replaced with an asterisk (*)

Explanation:

Replacing the blanks in a string involves: Nothing if the string is empty Otherwise: If the first character is not a blank, simply concatenate it with the result of replacing the rest of the string If the first character IS a blank, concatenate an * with the result of replacing the rest of the string

A numeric literal that is written with a decimal point is called a ________. real number floating-point value decimal literal double literal

Answers

Answer:

floating point value

Explanation:

float: 1.235

integer: 8

boolean: 0 or 1

A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.

Answers

Answer:

pathping

Explanation:

Other Questions
To heat the water in the tank from 50C to 58C the immersion heater transfers4032 kJ of energy to the water.Calculate the mass of water in the tank.Specific heat capacity of water= 4200 J/kgC What is a benfit of useing a restince band in workouts? 16. Jason leaves Detroit at 2: 00 PM and drives at a constant speed west along I-94. He passes Ann Arbor, 40 mi from Detroit, at [tex]2\colon50\mathrm{PM}\text{.}[/tex] (b) Draw the graph of the equation in part (a). A city ordinance that prohibits the use of bullhorns after midnight in residential neighborhoods would be The pulse felt by palpating the temple just anterior to the auricle is coming from the ________ artery. 22. If we plant more trees along the street, We will..... A. have more shade and fresh air B. have big floods every year C. have droughts every year The caribbean monk seal was declared extinct in 2008. although there are other types of seals on earth, caribbean monk seals could only breed with other caribbean monk seals. a caribbean monk seal in an enclosure. the last caribbean monk seal that died was the last member of a species. a community. a biome. an ecosystem. Please help me fast! Assume that adhesin gene of Neisseria gonorrhoeae, the pathogen that causes gonorrhea, were mutated. What is the most likely effect that this would have on the pathogen?the pathogen will be unable to produce toxins.the pathogen will be unable to attach to host cellsthe pathogen will be unable to replicatethe pathogerwill be unable to gain entry into the host. Which statement explains the type of function that is represented by the equationy = 2* + 1? The function is linear because it contains only one term. The function is linear because it is in slope-intercept form. The function is nonlinear because the variable is an exponent.DThe function is nonlinear because it contains more than one term. What was the outcome of pro-democracy demonstrations in Tiananmen Square in 1989? Group of answer choicesa. China opened its doors to foreign trade.b. People were given the right of free speech.c. A revolution that ended communist control.d. The Chinese government sent in troops to end it.Flag question: Question 2Question 25 ptsHow does the Organization of Petroleum Exporting Countries (OPEC) affect the world economy?Group of answer choicesa. OPEC helps to set the worlds oil prices.b. OPEC loans poor countries money for economic development.c. OPEC protects Israel rights in the Middle East.d. OPEC works to maintain peace along trade routes.Flag question: Question 3Question 35 ptsHow do multinational corporations contribute to globalization?Group of answer choicesa. They sell products around the world.b. They employ workers in many different countries.c. They buy resources from many nations.d. All of the above.Flag question: Question 4Question 45 ptsWhat was the significance of the fall of the Berlin Wall in Eastern Europe? Group of answer choicesa. It symbolized the breaking down of the barrier between East and West.b. The collapse of the wall allowed West German troops to invade and occupy East Germany.c. The Berlin Airlift was no longer needed to supply West Berlin with clothing.d. Thousands of refugees were able to escape to the west before the wall could be rebuilt.Flag question: Question 5Question 55 ptsWhat leads to the violence in Rwanda between the Hutus and the Tutsis? Group of answer choicesa. Conflict between Sunni and Shia Muslimsb. The Hutus were communist and the Tutsis were notc. Power struggle that lead to the Hutus killing the Tutsisd. Militarism and alliancesFlag question: Question 6Question 65 ptsWhat impact has technology had on the worlds economy? Group of answer choicesa. It has created new industries in both Asia and the Western world.b. It has caused a depression in developing nations.c. It has created the need for a single currency.d. All choices are correctFlag question: Question 7Question 75 ptsWhy was the United Nations created? Group of answer choicesa. to protect against the communismb. to control international tradec. to promote international cooperationd. to govern developing nationsFlag question: Question 8Question 85 ptsWhat led to the break-up of the Soviet Union? Group of answer choicesa. Debt because of reparations after WWIIb. The Treaty of Versaillesc. Soviet republics declaring independenced. Involvement in world conflictFlag question: Question 9Question 95 ptsHow did Gorbachev's glasnost and perestroika policies help lead to the collapse of the Soviet Union?Group of answer choicesThey weakened Soviet control of satellite countriesThey decreased the freedom of Soviet citizensThey increased Soviet economic control over Eastern EuropeThey increased use of military to crush uprisingsFlag question: Question 10Question 105 ptsWhich of the following contributed to the Rwandan Genocide?Group of answer choicesEuropean colonists continued to control the economy in RwandaEuropean colonists took back control of the Rwandan governmentEuropean colonial policies had reinforced ethnic prejudicesThe threat of terrorism and nuclear war led to ethnic tensions Why did the United States want more land from the Native Americans?(1 point) A. for meatpacking B. for cattle C. for oil D. for settlers. Please pick one and don't make up random stuff no explanation needed!!! Read the sentence:The colossal failure of the gutters to handle the downpour caused huge problems for the homeowner.Which word in this sentence offers clues to the meaning of colossal? Failure Downpour Huge Problems Which of these words from the narrative is an example of onomatopoeia? A. Clasped B. Auditory C. Rhythms D yipping How did you determine your response How did war help gain support for the 26th amendment? I WILL GIVE 20 POINTS TO THOSE WHO ANSWER THIS QUESTION RIGHT NOOOO SCAMS AND EXPLAIN WHY THAT IS THE ANSWER Which verb form correctly completes this conversation?Pamela: Mi hermano tuvo un accidente.Operador: Revise si est _____________.A. sangrarB. sangrasC. sangrandoD. sangre Chris needs to buy a $100 graphing calculator for his math class his neighbors will pay him $5 per hour to babysit and father gave him a $10 for mowing the lawn what is the minimum number of hours he will need to babysit for him to buy his calculator. I need a inequality, the anwser to the inequality and the final anwser Joseph works 5 hours on Monday, 10 hours on Tuesday, 9.5 hours on Wednesday, 8.25 hours onThursday, 6 hours on Friday, and 7.5 hours on Saturday. He is paid $9.85 per hour and time and ahalf for all hours over 40 per week. Find his gross earnings per week.II A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment