Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged security
Home
Tag
security
0
votes
Q: You have backed up your project information on media. The project will continue for the next two years. How often should the restorability test be done?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You are working on a project and require logging on to the environment managed by the client. The client has provided you with a single user ID and your entire team uses the same ID to login to the environment. Which of these statements is correct in this context?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You were creating some design/flow diagrams on paper for a sensitive project of a client. when suddenly the PL calls you for an urgent meeting in a meeting room which is outside the Offshore Development Center (ODC). What is the appropriate way to handle the papers?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: Rakesh has been deputed to a client located in the US. The client has provided a laptop to Rakesh. His family resides in India. Every evening he uses the client-provided laptop to chat with his family through a webcam using software he has installed directly from the internet. Which of the following is correct?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: One day when you log on to your e-mail, you find that there is an unsolicited e-mail having abusive and offensive content in your inbox. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: What should you do to make your password difficult to guess or crack?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: If you find a person whom you know tailgating, what should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: What is referred to as social engineering?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: Writing down passwords is wrong. With respect to this statement, which of the following options is appropriate?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: Which of the following statements is/are correct while using the Internet/intranet/Network Channels provided by the company?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: When you have to retain the information, which factors should be considered for the retention period?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You are executing a project, and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You have prepared a Design Document for the new product being launched by your customer. The customer has not provided any guidance on how such documents should be classified. How will you handle the document?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You are working overseas at a client location and need to use the data when you return to your home country. How will you ensure data availability?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: Your team needs a tool that can be used to correlate events from multiple resources into a central repository. Which of the following can be used for this purpose?
asked
Jun 1, 2023
in
Azure
by
sharadyadav1986
azure
security
center
0
votes
Q: What’s the difference between transport layer security and secure sockets layer?
asked
May 14, 2023
in
JAVA
by
john ganales
transport
layer
security
socketslayer
0
votes
Q: How does Synapse achieve row-level security?
asked
Mar 27, 2023
in
Azure
by
john ganales
synapse
row-level
security
+1
vote
Q: What Data security options are available in Azure SQL DB?
asked
Mar 13, 2023
in
Azure
by
SakshiSharma
data
security
azure
sql-db
0
votes
Q: Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
asked
Mar 5, 2023
in
Computational Fluid Dynamics
by
rajeshsharma
ipsec
security
0
votes
Q: William sent an E-mail message to an employee recently assigned to his team complimenting her on her dress. Later she was reprimanded for poor
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
Page:
« prev
1
2
3
4
5
6
next »
...