The AWS Shared Responsibility model divides security responsibilities between which two parties?
a. The AWS customer
b. The AWS partner
c. The community cloud vendor
d. AWS

Answers

Answer 1

The AWS Shared Responsibility model is a framework that outlines the division of security responsibilities between AWS and its customers. It is important for customers to understand their specific responsibilities within this model in order to ensure the security of their applications and data.

The two parties involved in the AWS Shared Responsibility model are the AWS customer and AWS itself. AWS is responsible for the security of the underlying infrastructure that supports the cloud services, while the customer is responsible for securing the applications and data that they deploy on top of this infrastructure.

To be more specific, AWS is responsible for the security of the physical infrastructure, network infrastructure, and the hypervisor that manages the virtual machines. They also provide customers with a range of security tools and services that can be used to enhance the security of their applications and data.

On the other hand, the customer is responsible for the security of the operating system, applications, and data that they deploy on the cloud infrastructure. They must also manage access control, data encryption, and backup and recovery of their applications and data.

In summary, the AWS Shared Responsibility model is a partnership between AWS and its customers that divides security responsibilities between the two parties. It is important for customers to understand their specific responsibilities within this model to ensure that they are properly securing their applications and data on the cloud.

Learn more about AWS here:

https://brainly.com/question/30176009

#SPJ11


Related Questions

is willingness to be held accountable for your actions

Answers

Answer:

Responsibility.

Explanation:

Responsibility is the willingness to be held accountable for your actions.

A responsible person would always take measured and careful step or engage in well-thought-out actions that will add value to their lives and positively impact their immediate environment.

This ultimately implies that, responsibility is an individual characteristic which typically involves acting in a positive manner and owning up to any of your actions.

In a nutshell, responsibility requires that an individual does the right thing, the right way, at all times.

what is full form of RAM??? ​

Answers

Answer:

Random Access Memory, it's used to store working data and machine codes

Explanation:

Hope it helped !
Adriel

What grants the creator of work exclusive rights for use and distribution

Answers

Answer:

Copyright law grants you several exclusive rights to control the use and distribution of your copyrighted work. The rights include the exclusive power to: reproduce (i.e., make copies of) the work; create derivative works based on the work (i.e., to alter, remix, or build upon the work)

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being completely executed? 3 0 1 None of these values will produce a mathematical error

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent

Answers

Answer:

The answer is the last choice that is "None of these values will produce a mathematical error".

Explanation:

In this question, the above given choice correct because neither of the flowchart procedures could trigger a mathematical error. This error could not be induced by multiplication, addition and subtraction, and the only division by 15. It is the only divide by 0, that's why the above flowchart will produce a mathematical error.

question 1 computer 1 on network a, with ip address of 10.1.1.205, wants to send a packet to computer 2, with ip address of 172.16.1.57. on which network is computer 2?

Answers

If 1 computer 1 on a network with ip address of 10.1.1.205, wants to send a packet to computer 2, with ip address of 172.16.1.57.  We can send a packet to computer two when we connect with subnet.

What does an IP address mean?

An IP address is short for Internet Protocol address. The Internet Protocol is a set of rules that regulates online activities like sending emails, streaming videos, and connecting to websites. A network or device's IP address serves as a unique identifier on the internet.

Go to your WiFi network settings and choose the network to which you are presently logged in. You may find your IP address with the other network information.

A subnet is nothing more than a set of IP addresses. All of the devices on the same subnet can connect to one another directly without the use of any routers. In IPv4, a network interface has a single IP address and only connects to one subnet.

For additional information on subnet refer,

brainly.com/question/29039092

#SPJ4

Which of these lights is NOT part of the standard three-point lighting setup?
key light
backlight
fill light
background light

Answers

Answer:

i believe background lighting

State what is meant by the terms: Parallel data transmission ......................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Serial data transmission ........................................................................................................... ................................................................................................................................................... ...................................................................................................................................................

Answers

Answer:

parallel communication is a method where several binary digits are sent as a whole, on a link with several parallel channels.

serial communication conveys only a single bit at a time over a communication channel or computer bus.

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

differences between ancient means of communication and modern means of communication​

Answers

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging.

The only real difference is the speed of it. Other than that, only the delivery methods have changed. Communication itself is the same, as far as I can see.

Explanation:

PLEASE HELP ASAP!! WILL MARK BRAINLIEST!!

Write a short response detailing which daily task you chose, and the high level and low level instructions to complete that task.

Abstraction is the process of removing or suppressing details to create a manageable level of complexity. Another way of thinking of abstraction is to think of it as using one word, phrase, or command that encompasses many smaller items, details, or commands. Through abstraction, high level programming languages allow us to use words or abbreviations that humans understand (like "step," "turn," and "FWD") in our programs. These instructions are compiled, or translated, into low level instructions which tell each tiny, individual circuit whether to turn off or on. This is similar to the way our brain can allow us to hear or see an instruction like "pick up a book" and understand it, but our muscles need to have more specific instructions from our brain to carry them out. Choose a simple daily task, such as “walk to the door” or “put on your socks”, and write high-level and low-level instructions to perform the task in English. We are establishing the standard for a low level instruction as contracting, flexing, or releasing a muscle. If you need help getting to a low level instruction, try asking yourself the question, "How do I do that?" For this exercise, one high-level instruction for "walk to the door" would simply be "take a step." A set of low-level instructions for the same high-level instruction would be "flex your thigh muscle" --> "lift your foot" --> "place your foot in front of you on the ground."

Answers

Answer:

High-Level instructions on taking a quick selfie on an iPhone

Grab phone 

Turn on phone

swipe to the right

Flip camera

Pose

Take picture

done

Low-Level Instructions

Flex one of your arm muscle

Grab your iPhone with the screen facing you

Flex the opposite arm muscle

Press the power on button

flex your finger muscles

wipe right on the screen

flex your finger muscle

press the cycle with the arrow button

flex your face muscles to your liking

flex finger muscles

Press the white button in the bottom middle of the screen

done

the cycle with arrow button=flip camera button

the white button in the bottom middle of the screen= picture-taking button

Explanation:

Authentication is concerned with determining _______.

Answers

Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

LMK ASAP PLEASE
what is the name of the concept that programmers use to be able to make decisions in programming?

A. parameters
B.procedures
C.conditional statements D.arguments

Answers

Answer: I belive the answer to be (C)

Explanation:

pls, help it's urgent... 44 points plsssssssssssssssss

Write an algorithm and Flowchart for reversing a Number eg. N=9486.

Answers

The steps to reverse a number is given below:

The Algorithm

Step 1 Start

step 2 Read a number n

Step 3 a=n/1000

step 4 calculate b=(n%1000)/100

step 5 calculate c= (n%100)/10

step 6 calculate d = n%10

step 7 calculate reverse = a+(b*10)+(c*100)+(d*1000)

step 8 display reverse

step 9 stop

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

A digital animator produces a model of a person jumping on a trampoline. Which measure is a boundary condition of the model?

the designation of zero potential energy as the height of the trampoline

the height of the first jump that the person makes on the trampoline

the velocity of the person as they fall back to the trampoline

the changes that occur in kinetic and potential energy

Answers

The designation of zero potential energy as the height of the trampoline is a boundary condition of the model.  It involves the minimum potential energy principle.

The minimum potential energy principle is a key concept in different disciplines, including, among others, physics, thermodynamics and chemistry.

This principle states that a structure will deform and/or will change its position to minimize the total potential energy.

The minimum potential energy principle states that the loss of potential energy is due to its dissipation as heat.

Learn more about the potential energy here:

https://brainly.com/question/15126517

the following is a 2's-complement signed binary number: 1000000002. what is its decimal value?

Answers

The 2's complement signed binary number 1000000002 has a decimal value of -128.The given binary number is a 2's complement signed binary number: 1000000002. To find its decimal value, we need to follow these steps:

Step 1: Identify the sign bit. In a 2's complement binary number, the leftmost bit (MSB) represents the sign. If it is 0, the number is positive; if it is 1, the number is negative. In our case, the MSB is 1, so the number is negative.

Step 2: Find the magnitude of the number. To do this, we need to find the 2's complement of the given number.
1. Invert all the bits of the number: 0111111112
2. Add 1 to the inverted number: 0111111112 + 1 = 1000000002

Step 3: Convert the magnitude from binary to decimal. Here, the magnitude is the same as the original number: 1000000002. So, the decimal value is:
(1 x 2^7) = 128

Step 4: Combine the sign and magnitude to find the final decimal value. Since the number is negative, the decimal value is -128.

In summary, the 2's complement signed binary number 1000000002 has a decimal value of -128.

For more information on binary number visit:

brainly.com/question/31102086

#SPJ11

Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authentication.

Answers

Answer:

is a security that needs two types of identification to access what your trying to enter.

Explanation:

Ex= to enter email, you first need to put in password, then verify by phone call that u need to enter.

the video game business is said to be a two-sided market. customers buy a video game console largely based on the number of really great games available for the system. software developers write games based on:

Answers

The video game business is a two-sided market, where customers buy video game consoles based largely on the number of really great games available for the system, and software developers write games based on the potential of the console to draw in new customers.

To do this, developers must consider the console's hardware and software capabilities, the marketing of the console, and the ability to produce games with high replay value and immersive experiences.

Hardware capabilities include things like processor speed, RAM, storage capacity, and graphics cards. Software capabilities include the type of operating system, the game engine, and any other middleware that helps the game run on the console. Marketing of the console can include things like advertising, discounts, and special offers. Lastly, games must be designed to provide a great experience, with elements like story, characters, graphics, sound, and gameplay.

In conclusion, when creating games for a video game console, developers must consider the hardware and software capabilities of the console, the marketing of the console, and the ability to create games with a high replay value and immersive experiences.

You can learn more about the video game business at: brainly.com/question/19130913

#SPJ11

What are the differences between online platforms sites and content?.

Answers

Websites offer one-way interaction, with visitors taking in whatever content is presented.

Platforms provide reciprocal engagement, with user interactions resulting in individualized experiences. Marketplaces, search engines, social media, blogs, app stores, communications services, payment systems, services included in the so-called "collaborative" or "gig" economy, and many more online services have all been referred to as "online platforms." A digital service known as an online platform makes use of the Internet to enable communications between two or more dissimilar but related users. Platforms are locations where electronic demand and supply collide.

Learn more about communication here-

https://brainly.com/question/14809617

#SPJ4

Which of the following is true? Select all that apply. True False All queries have an explicit location. True False The explicit location is found inside the query. True False The explicit location always tells you where users are located when they type the query. True FalseThe explicit location makes the query easier to understand and interpret.

Answers

Every query has a specific place. There are both oblique and direct false queries.

The explicit location is contained in the inquiry. False The explicit location is contained within the implicit query and vice versa. Thanks to the explicit location, you can always tell where people are when they type a query. False. A query can answer simple questions, do computations, mix data from other databases, add, modify, or remove data from a database.

The dominant or most popular response to the question is the explicit location; it occasionally, but not always, corresponds to the user's location. The clear location makes it easier to comprehend and analyze the question. True

To know more about query visit:-

brainly.com/question/29575174

#SPJ4

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclusive) to a variable sum that is initially 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that organizes and synchronizes the programs that will run on the computer.

Writting the JAVA code as:

import java.util.concurrent.ExecutorService;

import java.util.concurrent.Executors;

public class Main

{

Integer sum=new Integer(0);

Main(){

ExecutorService e=Executors.newFixedThreadPool(1000);

final Sum s = new Sum();

for(int i=0;i<1000;i++){

e.execute(s);

}

e.shutdown();

while(!e.isTerminated()){

}

System.out.println(sum);

}

public static void main(String[]args){

new Main();

}

class Sum implements Runnable{

public void run() {

m();

}

public void m(){

sum=sum+1;

}

}

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer

I’m buying a prebuilt pc once I get it and set it up, what do I need to install on it?

Answers

First thing you want to install are the drivers for your GPU and CPU if they aren’t automatically installed. Just search the specific GPU or CPU and download them from the company websites. You can see your CPU and GPU by opening System Configuration or System. You also want to install the latest Windows defender updates as well as Windows updates. Once you have these completed, you should be all set. If anyone wants to add anything specific, feel free to comment below.

if any one answered this i will give brilientst what is stimulation program​

Answers

Explanation:

organized programs of enrichment designed to provide developmentally appropriate activities to babies and toddlers who have, or who are at risk for a variety of conditions (environmentally or biologically caused) that might interfere with their ability to ultimately have a full and productive life."

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

you need to write a program that has karel put down a tennis ball if the world has dimensions of 1x1. which control structure do you need to use?

Answers

Assuming you need to write a program that has "Karel put down a tennis ball if the world has dimensions of 1x1," the control structure you should use is: C. If Statement.

The types of control structure.

In Computer programming, there are different types of control structure and these include the following:

For LoopWhile LoopIf/Else StatementIf Statement

What is an if statement?

An if statement can be defined as a conditional statement that is written by a computer programmer to handle decisions by running a different set of statements, depending on whether an expression is either true or false.

Read more on if statement here: https://brainly.com/question/18736215

#SPJ1

Complete Question:

You need to write a program that has Karel put down a tennis ball if the world has dimensions of 1x1.

What control structure do you use?

answer choices

For Loop

While Loop

If Statement

If/Else Statement

None of these

C. If statement

May I get brainiest please? :)

divisions of a keyboard​

Answers

Answer:

There are 4 SECTORS!

Explanation:

Alphabetical (Word keys, main function keys), Numeric (Number keys. which is the number pad to your right), The function keys (Like Num. lock, and the F keys that go through F1 to F12), and the Cursor keys (Which is LITERALLY just the arrow keys) But if you were a gamer like me, you'd know that WASD is better for gamers.

Another mention: Control Keys ( Includes your Windows Icon, Left Ctrl, Alt, Fn(If it's there) Your Tab key, your Caps, Shift, and Right Ctrl.)

describe accessibility in Windows 7 ​

Answers

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.

A measuring cylinder is used to measure the volume of an irregular
solid object.​

Answers

Answer:

Yes it is used for measuring the volume of irregular solid objects for example a peice of stone, rubber etc.

Explanation:

What’s a SMART goal? I literally went thru my book 10 times and i can’t find it
S=?
M=?
A=?
R=?
T=?

Answers

Answer:

Specific, measurable, attainable, realistic, time-bound

Explanation:

Answer:

five SMART criteria (Specific, Measurable, Attainable, Relevant, and Time-Bound),

Whats a SMART goal? I literally went thru my book 10 times and i cant find itS=?M=?A=?R=?T=?

What security factors do companies need to consider when buying an operating system?

Answers

Answer:

What they can do to prevent malware and hacking.

Explanation:

They would want the ability to have high security including strong firewalls and a minimal amount of loopholes in the OS itself. A company can't always rely on a patch to come through and would instead need something guaranteed to be nearly perfectly secure. For this reason, some companies choose Linux or Unix.

The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.

Answers

Answer:D) Storage

Explanation:

Other Questions
You have just finished paying off your $35,125 loan, a feat which took ten years of quarterly payments. The loan had an interest rate of 7. 44%, compounded quarterly. If you also paid $5,180. 70 in service charges, what percentage of the total cost was made up by your finance charges? Round all dollar values to the nearest cent. A. 25. 69% b. 36. 47% c. 57. 41% d. 27. 10%. By the unique line postulate you can draw only one segment using the definition of each new presentation in the future is a chance to start your credibility over from scratch. should pretrial detainees and convicted offenders be kept in the same institution? explain. please help asap!!!! Write a body paragraph explaining the importance of school you need to have a thesis statement an introduction help! ill give brainliest Dermot bakes 420 cakes.He bakes only vanilla cakes, banana cakes and lemon cakes. 120 of the cakes are vanilla cakes.35% of the cakes are banana cakes.Work out the number of lemon cakes Dermot bakes. PLEASEE I NEED NOW Write an essay responding to the following prompt: Who do you think is the tragic hero - Caesar or Brutus - in Shakespeare's play Julius Caesar? Why?HELP ASAP! Due today!!!Giving the crownNo spam!! To improve air quality and obtain a useful product, chemists often remove sulfur from coal and natural gas by treating the contaminant hydrogen sulfide with O2:2H2S(g) + O2(g) = 2S(s) + 2H2O(g)What happens toa) [H2O] if O2 is added?b) [H2S] if O2 is added?c) [O2] if H2S is removed?d) [H2S] if sulfur is added? Tick the statement which is not correct ( a) When a beam of light is passed through a colloidal solution, the path of light gets illuminated ( b ) when an electric current is passed through a colloidal solution , colloidal particles move towards the oppositely charged electrodes. ( c ) when an electric current is passed through a suspension , particles move towards the oppositely charged electrodes. ( d ) when an electric current is passed through an electrolyte solution , particles move towards the oppositely charged electrodes. guardrail systems must be able to withstand a force of at least "A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle does this scenario belong to?" Graph g(x)=5|x -6|+2g(x)=5x6+2g, left parenthesis, x, right parenthesis, equals, 5, vertical bar, x, minus, 6, vertical bar, plus, 2. A circle has a radius of 8x^6y^4 cm . The area of a circle can be found using a= r2. What is the area of this circle in square centimeters ? consider a fishing vessel travelling along a river at a velocity of 12 m/s. due to unknown contaminants, the kinematic viscosity of the river is approximately 1.2486000000000002 x 10-6 m2/s. now consider a model one-quarter the size of the vessel in a towing tank. calculate the velocity necessary for the model to have the same froude number as the full-sized vessel, as well as the kinematic viscosity of the fluid in the tank for the model to have the same reynolds number. (round the final answers to two decimal places.) the necessary velocity is m/s.the necessary kinematic viscosity of the tank is A pyramid has a square base with sides of length s. The height of the pyramid is equal to 1/2 of the length of a side on the base. Which formula represents the volume of the pyramid?A. V=1/12s^3B. V=1/6s^3C. V=1/3s^3D. V = 3s3E. V = 6s3 If earths atmosphere was composed entirely of nitrogen and oxygen, would the globally averaged surface air temperature increase or decrease compared to our current globally averaged surface air temperature?. Im what ways did people protest against the war? Infants do best with: A variety of caregivers A primary caregiver Infants do not thrive in childcare A large group setting Two caregivers