Login
Remember
Register
Ask a Question
Hot questions
0
votes
1
answer
WAF stands for ___________.
asked
Apr 18, 2022
in
AWS Essentials
by
sharadyadav1986
aws
waf
0
votes
1
answer
What Are The Various Uses Of Kvm?
asked
Jun 11, 2022
in
KVM
by
john ganales
kvm-uses
+1
vote
1
answer
Kubernetes cluster must contain only one Master?
asked
Dec 26, 2021
in
Kubernetes K8s
by
SakshiSharma
kubernetes-cluster
+2
votes
1
answer
Discuss ‘Naive’ in a Naive Bayes algorithm?
asked
May 30, 2022
in
Data Science
by
sharadyadav1986
naive-bayes
naive-bayes-algorithm
0
votes
1
answer
Which of the following is the correct way to open the file "sample.txt" as readable?
asked
May 11, 2022
in
PHP
by
sharadyadav1986
file-php
0
votes
1
answer
Information gathered in a Web Scenario step is/are
asked
May 6, 2022
in
Zabbix
by
john ganales
zabbix-information
zabbix-installation
zabbix-processes
zabbix-configuration
zabbix-agents
zabbix-monitoring
zabbix-discovery
zabbix-snmp-monitoring
zabbix-proxies
zabbix-gui
zabbix-web-interface
zabbix-performance-tuning
0
votes
1
answer
Apache Metron is built on top of _________.
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
apache-metron
+1
vote
1
answer
What is the importance of having a selection bias?
asked
May 30, 2022
in
Data Science
by
sharadyadav1986
selection-bias
0
votes
1
answer
__________ components help in connecting one part of automation to another.
asked
Feb 12, 2022
in
RPA with Pega
by
Robindeniel
automation
pega
0
votes
1
answer
Explain Power BI vs. Tableau
asked
May 25, 2022
in
PowerBI
by
Robin
powerbi
tableau
0
votes
1
answer
How to add a WhatsApp sharing button to a website?
asked
May 20, 2022
in
Other
by
sharadyadav1986
whatsapp-share-button
whatsapp-on-website
0
votes
1
answer
How to use external JavaScript file?
asked
Jun 8, 2022
in
JavaScript
by
sharadyadav1986
external-javascript
0
votes
1
answer
Name the types of functions in JavaScript
asked
Jun 8, 2022
in
JavaScript
by
sharadyadav1986
javascript-functions
0
votes
1
answer
The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
1
answer
The key used to encrypt a TGT is shared between?
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
key
kerbores
0
votes
1
answer
How can we detect OS of the client machine using JavaScript?
asked
Jun 9, 2022
in
JavaScript
by
sharadyadav1986
client-machine
javascript
0
votes
1
answer
_______ is responsible for filtering the traffic flowing in and out of a network based on "a set of security rules".
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
traffic-flow
network-security
0
votes
1
answer
Will you get a response when you click a prototype?
asked
Apr 22, 2022
in
Wireframing
by
sharadyadav1986
wirefame-response
0
votes
1
answer
Cucumber acts as a bridge between the business and technical aspects of a project.
asked
Apr 26, 2022
in
Cucumber V2
by
sharadyadav1986
cucumber
+1
vote
1
answer
What are the different types of Algorithm methods in Machine Learning?
asked
May 7, 2022
in
Machine Learning
by
sharadyadav1986
machine-learning-algorithms
Page:
« prev
1
...
822
823
824
825
826
827
828
829
830
831
832
...
1000
...
next »
...