You're interested in using the services of a vendor company. How would you assess their security capabilities?

Answers

Answer 1

If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to  ask them to give you or perform any penetration testing or a kind of security assessment reports.

What is the report about?

For a person to be assured of the  security capabilities of any company, it is good that one ask them to fill a a questionnaire.

Note that the   security assessment questionnaire is one that can assure you to quickly and efficiently have a broad understanding of what security measures that the vendor company has in store.

Note that If available, any reports that has the detailing penetration testing results is available or the security assessments is one that can be required from them.

Hence, If a person is interested in using the services of a vendor company the ways that one would assess their security capabilities is to  ask them to give you or perform any penetration testing or a kind of security assessment reports.

Learn more about vendor company from

https://brainly.com/question/15104782

#SPJ1


Related Questions

Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs

Answers

The cloud access security broker (CASB) approach which is most appropriate for Brian's needs is: D. API-based CASB.

What is an API?

API is an acronym for application programming interface and it's a software intermediary (computing interface) that is made up of tools, set of executable codes, and protocols that help software applications and computers to function properly, as well enable the exchange of data.

In Computer technology, an application programming interface (API) is designed and developed to allow a network device and a server or two servers to share data and functionality within the cloud. Also, a software developer integrates an application programming interface (API) into the software.

In this context, we can infer and logically deduce that the cloud access security broker (CASB) approach which is most appropriate for Brian's needs is an API-based CASB.

Read more on API here: https://brainly.com/question/20910074

#SPJ1

Complete Question:

Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs?

A. Inline CASB

B. Outsider CASB

C. Comprehensive CASB

D. API-based CASB

What is the lowest grade of utp that is rated for 100 mbps transmission?

Answers

The lowest grade of UTP that is rated for 100 Mbps transmission is option A. CAT-5. CAT-5 was the first UTP standard ratified for 100 Mbps transmissions. Before that, CAT-3 was popular but only supported 10 Mbps. CAT-5e, CAT-6, and CAT-6a all support at least 1 Gbps and came after CAT-5.

Category 5 cable (CAT- 5) is a twisted pair cable for computer networks. Since 2001, the variant commonly in use is the Category 5e specification (Cat 5e). The cable standard provides performance of up to 100 MHz and is suitable for most varieties of Ethernet over twisted pair up to 2.5GBASE-T but more commonly runs at 1000BASE-T (Gigabit Ethernet) speeds.

What is UTP?

Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). There are five types of UTP cables -- identified with the prefix CAT, as in category -- each supporting a different amount of bandwidth.

Therefore, the correct answer is as given above

learn more about CAT-5: https://brainly.com/question/28122297

#SPJ1

The complete question goes thus:

What is the lowest grade of UTP that is rated for 100 Mbps transmission?

A. CAT-5

B. CAT-5e

C. CAT-6

D. CAT-6a

One of the key advantages the soviet union held over the united states on a global scale was america's continuing issue of:________

Answers

Explanation:

The Americans had a greater nuclear power with more than 300 land based intercontinental ballistic missiles (ICBMs) and a fleet of Polaris submarines. The Soviet Union had only 4 to 6 land based ICBMs and around 100 short range primitive V1 type cruise missiles that could only be launched from surfaced submarines.

What does a router do with a packet that it does not have a destination network for?

Answers

A router that does not have a destination network for a packet would do the following: B.) Drops the packet.

What is a router?

A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

What is IP address?

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In Computer Networking, it is a standard occurrence or phenomenon for a router to drop the packet it receives when it does not have a destination network for the packet.

Read more on router here: brainly.com/question/24812743

#SPJ1

Complete Question:

What does a router do with a packet that it does not have a destination network for?

A.) Sends it to the Serial port

B.) Drops the packet

C.) Sends it back out the same interface it received it in

D.) Forwards the packet to the next hop

If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is

Answers

If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is shared content with no control.

What is the single most vital skill for effective collaboration?

The one most vital skill for effective collaboration is when or to give and take critical feedback.

What is file server used for?

A file server is known to be a form of a computer that is known to be responsible for the act and the storage and also the management of data files in order that other computers found on the same network can be able to access the files.

Therefore, If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is shared content with no control.

Learn more about file server from

https://brainly.com/question/19551484

#SPJ1

5 The following text is stored as a text file:
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure. Explain how lossless compression would compress this file.

Answers

Lossless compression decreases file size without removing any bits of information. Instead, this format works by removing sameness within data to reduce the overall file size. With lossless, it is possible to perfectly rebuild the original file.

What utilizes lossless compression?

Lossless compression is commonly used for so-called "discrete" data, such as database records, spreadsheets, word-processing files, and even some types of image and video information. Text compression is a powerful area for lossless compression.

What is lossless compression example?

Lossless compression methods are reversible. Examples of lossless reduction include GZIP, Brotli, WebP, and PNG, Lossy compression, on the other hand, uses inexact approximations by dumping some data from the original file, making it an irreversible compression process

To learn more about Lossless compression, refer

https://brainly.com/question/17266589

#SPJ9

True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.

Answers

Hey there i hope you having a great day
The Answer is: False

A field value is currently not in any group. what happens when you try adding it to an existing group?

Answers

When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

What is a  field value?

The value of a field  can be described as the  string of bytes,  which do contains  all bytes in the field after the first colon.

The field value function is is useful in a case whereby extraction of the field data from linked data types is needed.

It is a good method thst used when writing formulas that refer to data types, and that is why the field value do help the user when creating a conditional calculations using a linked data types.

It also gives the enablement in the extraction of the exact values from the cell linked to data types.

It should be noted that this field value is  concatenation of all the lines  found in the the field, outside the  starting name and colon, hence When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

Find out more on field value at https://brainly.com/question/843074

#SPJ1

The maximum quantity that an economy can produce, given its existing levels of labor, physical capital, technology, and institutions, is called:________

Answers

The maximum quantity that an economy can produce, given its existing levels of labor, physical capital, technology, and institutions, is called Potential GDP.

What is meant by GDP?

GDP is known to be the term  hat looks into or one that measures the monetary worth of final goods and services and it is one which is said to be  bought by the final user.

What is Potential GDP?

Potential GDP is known to be called full-employment GDP and this is said to be the maximum rate or  quantity that an economy is known to be able to make or produce given full employment of its former levels of labor, physical capital, and others.

Hence, The maximum quantity that an economy can produce, given its existing levels of labor, physical capital, technology, and institutions, is called Potential GDP.

Learn more about Potential GDP from

https://brainly.com/question/13824314

#SPJ1

When network traffic is encrypted, it is invisible and its content and purpose are masked.
a. true
b. false

Answers

Answer:

true

Explanation:

encryption is when you scramble the contents of information

Please explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy

Answers

Answer:

The answer is honeypot.

Which ntfs feature allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits?

Answers

The NTFS feature that allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits is Disk quotas.

What is Disk Quotas used for?

This refers to the feature in an NTFS system that allows to track how much data is used on the file system by a user and potentially apply storage limits.

Hence, we can see that based on the given question, the NTFS feature that allows an administrator to track how much data is used on the file system by a user and potentially apply storage limits is Disk quotas.

This helps to allocate space limits to each sector so that the data can be easily tracked and this is an important NTFS feature.

Read more about NTFS here:

https://brainly.com/question/14178838

#SPJ1

The critical components of the operating that remain in memory as long as the computer is running are commonly known as the:______.

Answers

Answer:

Kernel

Explanation:

The answer is Kernel.

Hope this helps!

A____consists of many users and their information.​

Answers

Active Directory consist of many users and their information.

Answer:

Active Directory

Explanation:

Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent this situation from occurring?

Answers

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

Lack of authentication in company security. Access control-linked misconfigurations.A Software misconfigurations.

What could a back-end developer do to prevent this situation from occurring?Always Encrypt sensitive data: Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

https://brainly.com/question/10450768

#SPJ1

What are the different elements of a window?​

Answers

Answer: title bar, menu bar, the workspace

Explanation:

the three basic steps of a CPU are fetch, decode, and execute. Some experts describe this cycle as simply “fetch-execute.” Do you think the three-step description or the two-step description provides a better explanation of how a CPU works? Why?.

Answers

I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.

What is the cycle about?

The basic operation of any system is known to be the ‘fetch-execute’ cycle.  It is said to be one that fetches the instructions usually from the central memory and then it is said to executes them.

Note that

The CPU fetches the instructions.The CPU also decodes the instruction.The CPU also executes the instruction.

Hence, I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.

Learn more about fetch-execute cycle  from

https://brainly.com/question/9964445

#SPJ1

The python standard library's __________ module contains numerous functions that can be used in mathematical calculations.

Answers

The python standard library's math module contains numerous functions that can be used in mathematical calculations.

What is Python Programming?

This refers to the high-level language programming that writes code in a machine-readable format and the computer executes it based on the parameters of the python language.

Hence, we can see that this math module is useful when using the python programming language as it makes use of mathematical operations such as addition, subtraction, multiplication, etc.

Read more about python language here:

.https://brainly.com/question/27666303

#SPJ1

workin ng principle of the computer? e. Why does a computer need programs? f. What is Random Access Memory? g. What are the types of internal memory? Vrite short answer to the following an​

Answers

Working principle of the computer is Users are only vaguely aware of the central processor unit, which is an invisible element of a computer system.

They supply input data to the computer in order to obtain processed data, or output. In some cases, the output is a direct answer to the input.

Why does a computer need programs?

Programming languages use types and functions that control commands. The reason that programming is so significant is that it directs a computer to complete these orders over and over again, so people do not have to do the task frequently. Instead, the software can do it automatically and accurately

What is random access memory explain?

RAM (Random Access Memory) is the hardware in a computing machine where the operating system (OS), application programs and data in everyday use are kept so they can be quickly reached by the device's processor. RAM is the primary memory in a computer.

What are the types of internal memory?

There are two kinds of internal memory is ROM and RAM. ROM stands for read-only memory. It is non-volatile, which suggests it can retain data even without control

To learn more about Programming languages, refer

https://brainly.com/question/16936315

#SPJ9

list the different services provided by computer network​

Answers

Answer:

access to the World Wide Web, digital video, digital audio, shared use of application and storage servers

test generators can be very helpful when trying to determine if a code runs properly or fails in some situations. For example, let’s say that you were writing a program where the user would input their test grades and the program would tell them their average. What kinds of data would a test generator want to test for that program to be sure that it would work in all situations?

Answers

A data type which a test generator would test for in this software program to ensure it would work in all situations is an int or a float input.

The kinds of data type.

Basically , there are five (5) main recognized data types used in computer programming and these include the following:

Character type (char).Floating point type (float).Integer type (int).Boolean (bool)String (str)

What is a test generator?

A test generator can be defined as a type of software program that is designed and developed to determine whether or not a code runs properly or fails in some situations.

In Computer programming, we can infer and logically deduce that a data type which a test generator would test for in this software program to ensure it would work in all situations is an int or a float input.

Read more on a float input here: https://brainly.com/question/15345900

#SPJ1

Your dashboard shows total cars sold by city. how will the data be impacted if you set a condition filter for sum of cars sold greater than 100?

Answers

The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.

What is filter pf pages or picture?

Image or page filtering is known to be the act of altering or changing the form of an image and also reducing a page to the items that one wants.

Note that in filtering, it tends to bring about those areas that one has interest in and as such, in the case above, The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.

Learn more about filter from

https://brainly.com/question/3198358

#SPJ1

____ is a temporary holding area for data, application program instructions, and the operating system.

Answers

The register is a temporary holding area for data application program instructions and the operating system

If the columns to be matched in a join have the same name, you can use the _________ clause followed by the column name.

Answers

If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.

What is a clause?

A clause is known to be a set or group of words that  is said to be made up of a verb which is known to usually have other components.

Note that A clause can be made to form part of a sentence or it is said to be able to a complete sentence itself.

The period of agreement is seen as the contract period that is the  number of days that exist between a given start date and its end.

Hence, based on the above, in regards to java,  If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.

Learn more about  Clause from

https://brainly.com/question/541212

#SPJ1

What creates two completely separate user interfaces on the same device, one for work and one for personal use?

Answers

A technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same device, one for work and one for personal use is referred to as dual persona technology.

What is technology?

Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life.

What is a dual persona technology?

A dual persona technology can be defined as a type of technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same electronic device, one to be used for work and the other one for personal use.

Read more on technology here: https://brainly.com/question/17893201

#SPJ1

What are the small squares that appear in the corners and in the middle of the sides of a selected object's border called?

Answers

The sizing handles is known to be the small squares that appear in the corners and in the middle of the sides of a selected object's border.

What is sizing handles in MS Word?

The term sizing handles is known to be a tool that a person can use to be able to change a picture's size.

Note that if the mouse pointer is placed on a key that is of the sizing handles, the pointer alters to a double-headed arrow and a person can be able to then alter the size or shape of the image by dragging the sizing handle.

Note that it is often called handle, drag handle, sizing grip, resize corner, and therefore, The sizing handles is known to be the small squares that appear in the corners and in the middle of the sides of a selected object's border.

Learn more about sizing handles from

https://brainly.com/question/8806816

#SPJ1

What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?

Answers

The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

What is  an incomplete health record or a delinquent health record?

An  incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.

Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

Learn more about chief medical officer from

https://brainly.com/question/18696862

#SPJ1

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service

Answers

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. Software as a service tier of cloud computing best describes Helen's service

This is further explained below.

What is Software?

Generally, The term "software" refers to a collection of instructions, data, or programs that are used to control computers and carry out certain activities. In contrast to hardware, which refers to the tangible components of a computer, this refers to the software that runs on the device. The phrase "software" refers to apps, scripts, and programs that may be executed on a device. Software is a general term.

In conclusion, Helen is now providing her clients with a newly developed payroll system that she devised herself. Her clients log in to the AWS-hosted payroll system using the web interface that she provides for them. The layer of cloud computing known as software as a service is the one that most accurately reflects Helen's service.

Read more about Software

https://brainly.com/question/1022352

#SPJ1

enumerate five features of Microsoft excel 2016​

Answers

Answer:

Smarter Autocorrect, Improved Functions of Excel Workbook, New Funnel charts, and Smarter insertion of pictures.

Explanation:

For 8 features of Microsoft excel 2016, check out this website:

https://www.educba.com/features-of-2016-excel-workbook/

Hope this helps!

Other Questions
In order, from the earliest to the most recent? a. evolution of eukaryotic cells b. origin of prokaryotic cells c. evolution of multicellular organisms d. plants and fungi colonize land The two different theories regarding the relationship between morality and religion are _____ and _____. A pass-through scheme is usually undertaken by someone who works in which department? In which climate zone would you find the most vegetation and economic activities? pls help or ill fail BRAINLIST REWARD1) Adrianna wants to purchase GoodLife membership.When she visits the website, shedecides she wants to purchase a plan that charges $25 per month and has an initial cost of $90.What is the linear equation that represents how much Adrianna has to pay GoodLife2) Anthony wants to purchase a Disney+ subscription.He visits the website anddecides to sign up for a plan that charges $17 per month. If the plan has no initial cost, what isthe linear equation? How much will he spend after 5 months?3) :Sebastian wants to purchase a Premium Spotify subscription to listen to musicoffline and without ads. The plan that he chose is $10 per month and costs $15 up front. Write alinear equation to represent the cost. How much will Sebastian spend after 1 year? Explain the potential impact of white privilege on clients from both dominant and minority groups (consider impact of both positive and negative stereotypes please help me with these calculus bc questions What size (internal diameter) endotracheal tube should be used to intubate a newborn with an estimated gestational age of 26 weeks (estimated birth weight of 0.8 kg)? What are the possible reasons we could forget something because of an encoding failure? What is the solution to thesystem of equations graphed below?y = x- 2y = 3x - 2 grandpa is walking ____ the stairs very slowly Which blow molding process allows the creation of hollow products with handles, such laundry detergent containers? What were the goals of the gay rights movement?What individuals and organizations were active in the movement?What strategies or actions did the movement use to raise awareness and fight for their cause? As they fought for their rights, what challenges and opposition did they face by people attempting to squash their efforts?How was the movement inspired by the Black Freedom Struggle AND/OR how did the movement work with other movements to achieve common goals?What were the movements achievements? PLEASE ANSWER!!!! When taking a 17 question multiple choice test, where each question has 3 possible answers, it would be unusual to get or more questions correct by guessing alone? On a coordinate plane, triangle D E F has points (negative 8, 8), (10, negative 2), and (negative 8, negative 8).Find the area of the triangle DEF.Area = square units What is the primary purpose of data democratization? a) make data accessible to all users b) make data inaccessible to all users Which account summarizes international asset transactions having to do with international purchases and sales of real assets? Which stage in the life cycle of a plant is represented in this picture? In a transformer, energy is carried from the primary coil to the secondary coil by:________ Which statement accurately summarizes the impact of the Miranda v.Arizona decision?*5 pointsIt incorporated the right to legal counsel, as protected under the Sixth Amendment,to state and local governments.OIt incorporated the Fourth Amendment to state and local governments.It increased states' power to restrict freedom of speech when it is shown to increasethe danger to public safety.It required that police officers inform suspects under arrest of their Fifth and SixthAmendment rights.