Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged security
Home
Tag
security
+1
vote
Q: A website for an international sport governing body would like to serve its content to viewers from different parts of the world in their vernacular language.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
azure
aws
security
technology
service
0
votes
Q: Which of the following services allows you to analyze EC2 Instances against pre-defined security templates to check for vulnerabilities?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
ec2
azure
cloud
0
votes
Q: Your company wants to move an existing Oracle database to the AWS Cloud. Which of the following services can help facilitate this move?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
technology
cloud
azure
security
0
votes
Q: An organization runs several EC2 instances inside a VPC using three subnets, one for Development, one for Test, and one for Production.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
cloud
security
billing
0
votes
Q: A manufacturing firm has recently migrated their application servers to the Amazon EC2 instance.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
billing
pricing
cloud
security
0
votes
Q: Your design team is planning to design an application that will be hosted on the AWS Cloud. One of their main non-functional requirements is given below:
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
design
cloud
functional-requirement
security
0
votes
Q: Which of the following services can be used as an application firewall in AWS?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
firewall
security
services
cloud
0
votes
Q: Which of the following is the responsibility of the customer to ensure the availability and backup of the EBS volumes?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
azure
cloud
ebs
0
votes
Q: Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
rat
malware
security
0
votes
Q: “CHAP” stands for __________.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
chap
malware
security
+1
vote
Q: Which one of the following refers to the non-functional requirements like disaster recovery, security, reliability, etc.
asked
Sep 1, 2021
in
Cloud Computing
by
SakshiSharma
disaster-recovery
security
0
votes
Q: What is DevOps Security?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
security
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: Identify reasons why TCS has adopted data protection program 1. Customer and market expectations 2. Competitive Differentiation 3. Risk Landscape 4. Legal Obligation
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
protection-program
security
threat
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: State True or False: Maintenance (Operational) Security is not required if software is developed securely.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
secure-software
security
0
votes
Q: _________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
Q: Which of the following issues can be addressed using an efficient logging system?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
information-logging
security
threat-modeling
0
votes
Q: Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-check
security
secure-programming-practices
0
votes
Q: Wire Encryption deals with securing data while it is at rest.
asked
Jan 26, 2021
in
Hadoop
by
SakshiSharma
wire-encryption
security
data-security
Page:
« prev
1
2
3
4
5
6
next »
...