Login
Remember
Register
Ask a Question
Recent questions tagged security
0
votes
1
answer
Sexual harassment is prohibited by law and is also prohibited by my employer’s policy.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
1
answer
Sexual harassment can only come from a boss or coworker. FALSE Harassment can exist at all levels of an organization.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
1
answer
Harassment based on sex can include making stereotypical remarks about someone’s gender.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
1
answer
If most people find a comment amusing and inoffensive, then the one person who is offended does not have a right to complain about harassment.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
1
answer
If someone is offended by my behavior in the break room, they should take their break somewhere else, or at another time, since I am not “working” while I’m on my break and I have a right to freedom of speech.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
1
answer
Quid Pro Quo harassment occurs when a female boss tells dirty jokes to the other women in the office.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
quid-pro-quo
security
0
votes
1
answer
If my intentions were good – for example, I meant to compliment someone on how great they looked there is no way my conduct could violate the sexual harassment policy.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
1
answer
If no one complains, then it’s not sexual harassment
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
1
answer
Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
linux-namespace
0
votes
1
answer
Which of the following cloud service providers does not use Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
docker
container
0
votes
1
answer
Docker uses which Linux Kernel feature to provide resource allocation functionality?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
1
answer
While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
non-container
containers
security
0
votes
1
answer
Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
vulnerabilities
tern
security
containers
0
votes
1
answer
Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
1
answer
Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
anchor
security
containers
0
votes
1
answer
Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
0
votes
1
answer
While securing applications deployed with the traditional (non-container) approach, application runtime is tested for vulnerabilities by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
applications
0
votes
1
answer
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
owasp
zed-attack-proxy
containers
security
0
votes
1
answer
While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
containers
security
0
votes
1
answer
We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
flags
Page:
« prev
1
2
3
4
5
6
next »
...