Login
Remember
Register
Ask a Question
Recent questions tagged security
0
votes
1
answer
While securing applications deployed with container approach, security at Kernel level is enforced by using ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
container
security
0
votes
1
answer
Which of the following statements are true in terms of allowing/denying traffic from/to VPC assuming the default rules are not in effect? (choose multiple)
asked
Sep 1, 2022
in
AWS
by
sharadyadav1986
aws
security
vpc
0
votes
1
answer
Which of the following can be used to protect against DDoS attacks? Choose 2 answers from the options given below.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
shield
ddos
attacks
+1
vote
1
answer
A website for an international sport governing body would like to serve its content to viewers from different parts of the world in their vernacular language.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
azure
aws
security
technology
service
0
votes
1
answer
Which of the following services allows you to analyze EC2 Instances against pre-defined security templates to check for vulnerabilities?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
ec2
azure
cloud
0
votes
1
answer
Your company wants to move an existing Oracle database to the AWS Cloud. Which of the following services can help facilitate this move?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
technology
cloud
azure
security
0
votes
1
answer
An organization runs several EC2 instances inside a VPC using three subnets, one for Development, one for Test, and one for Production.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
cloud
security
billing
0
votes
1
answer
A manufacturing firm has recently migrated their application servers to the Amazon EC2 instance.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
billing
pricing
cloud
security
0
votes
1
answer
Your design team is planning to design an application that will be hosted on the AWS Cloud. One of their main non-functional requirements is given below:
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
design
cloud
functional-requirement
security
0
votes
1
answer
Which of the following services can be used as an application firewall in AWS?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
firewall
security
services
cloud
0
votes
1
answer
Which of the following is the responsibility of the customer to ensure the availability and backup of the EBS volumes?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
azure
cloud
ebs
0
votes
1
answer
Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
rat
malware
security
0
votes
1
answer
“CHAP” stands for __________.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
chap
malware
security
+1
vote
1
answer
Which one of the following refers to the non-functional requirements like disaster recovery, security, reliability, etc.
asked
Sep 1, 2021
in
Cloud Computing
by
SakshiSharma
disaster-recovery
security
0
votes
1
answer
What is DevOps Security?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
security
0
votes
1
answer
Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
1
answer
Identify reasons why TCS has adopted data protection program 1. Customer and market expectations 2. Competitive Differentiation 3. Risk Landscape 4. Legal Obligation
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
protection-program
security
threat
0
votes
1
answer
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
1
answer
State True or False: Maintenance (Operational) Security is not required if software is developed securely.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
secure-software
security
0
votes
1
answer
_________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
Page:
« prev
1
2
3
4
5
6
next »
...