Login
Remember
Register
User rajeshsharma
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by rajeshsharma
0
votes
Why is Terraform used for DevOps?
answered
Mar 6, 2023
in
Terraform
terraform
0
votes
Is history the same as it is on the web while using TFS API to provide resources?
answered
Mar 6, 2023
in
Terraform
terraform
0
votes
What is Terraform D?
answered
Mar 6, 2023
in
Terraform
terraform-d
0
votes
Are callbacks possible with Terraform on Azure?
answered
Mar 6, 2023
in
Terraform
terraform
azure
0
votes
What are the most useful Terraform commands?
answered
Mar 6, 2023
in
Terraform
terraform
0
votes
What are the key features of Terraform?
answered
Mar 6, 2023
in
Terraform
terraform-features
0
votes
What do you understand by Terraform in AWS?
answered
Mar 6, 2023
in
Terraform
terraform
0
votes
Explain some overview of workflow of the core Terraform?
answered
Mar 6, 2023
in
Terraform
terraform
0
votes
You are working on understanding all the key terms regarding international standards, data privacy and data protection policies.
answered
Mar 5, 2023
in
Azure
azure
data-privacy
0
votes
A company wants to deploy an Artificial Intelligence solution in Azure.
answered
Mar 5, 2023
in
Azure
artificial-intelligence
0
votes
A company wants to set up resources in Azure.
answered
Mar 5, 2023
in
Azure
azure-resource
0
votes
A company is planning to deploy a web server and database server, as shown in the architecture diagram below.
answered
Mar 5, 2023
in
Computational Fluid Dynamics
web-server
0
votes
Which of the following organizations is primarily concerned with military encryption systems?
answered
Mar 5, 2023
in
Computational Fluid Dynamics
military-encryption-systems
0
votes
ESP does not provide ________.
answered
Mar 5, 2023
in
Computational Fluid Dynamics
esp
0
votes
In computer security _______ means that computer system assets can be modified only by authorized parities.
answered
Mar 5, 2023
in
Computational Fluid Dynamics
computer-security
0
votes
IPsec defines two protocols: _______ and ________.
answered
Mar 5, 2023
in
Computational Fluid Dynamics
ipsec
protocols
0
votes
IP Security operates in which layer of the OSI model?
answered
Mar 5, 2023
in
Computational Fluid Dynamics
ip-security
0
votes
Which two types of IPsec can be used to secure communications between two LANs?
answered
Mar 5, 2023
in
Computational Fluid Dynamics
communications
lan
0
votes
______ provides authentication at the IP level.
answered
Mar 5, 2023
in
Computational Fluid Dynamics
ip-level
authentication
0
votes
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
answered
Mar 5, 2023
in
Computational Fluid Dynamics
ipsec
security
Page:
« prev
1
...
59
60
61
62
63
64
65
66
67
68
69
...
267
next »
...