Login
Remember
Register
Ask a Question
Hot questions
+1
vote
1
answer
How do we prepare our data for cloud migration?
asked
Jan 27, 2022
in
Cloud Computing
by
sharadyadav1986
cloud-migration
cloud-security
+1
vote
1
answer
The \’\’HTTP History Tab\’\’ captures all host URLs.
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
history
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
____________ is a specialized web transfer protocol for use with constrained nodes and networks in IoT.
asked
Dec 15, 2021
in
Internet Of Things Prime
by
sharadyadav1986
iot-network
+2
votes
1
answer
When to use NSArray vs NSSet?
asked
Jan 19, 2022
in
C Plus Plus
by
DavidAnderson
objective-c-interview-question-answer
0
votes
1
answer
Which of the following is the correct format to define type and name of resource of virtual network
asked
Nov 19, 2021
in
Other
by
DavidAnderson
other
0
votes
2
answers
What do you mean by coalesce in ServiceNow?
asked
Aug 28, 2020
in
Service Now
by
RShastri
#servicenow
+1
vote
1
answer
PowerShell is built on _____________.
asked
Jan 17, 2022
in
PowerShell
by
rajeshsharma
powershell-built
+1
vote
1
answer
What kind of testing environment is needed for API?
asked
Jan 25, 2022
in
APIGEE - API Services
by
sharadyadav1986
api-testing
+2
votes
1
answer
Which of the following standard protocols does Keycloak Support?
asked
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
0
votes
1
answer
Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
security-analysis
0
votes
1
answer
Which of the following is an example of Changing Operating Model?
asked
Oct 7, 2021
in
Growth and Transformation
by
Robin
opeating-model
+1
vote
1
answer
What kind of matrix is A
asked
Jan 19, 2022
in
Linear Algebra
by
rajeshsharma
matrix
+2
votes
1
answer
Which of the following is a configuration definition file?
asked
Jan 1, 2022
in
Infrastructure-as-Code
by
AdilsonLima
infrastructure-as-code
0
votes
1
answer
The function add_subplot returns ___?
asked
Dec 25, 2021
in
Matplotlib
by
rajeshsharma
add-subplot-function
0
votes
1
answer
Which of the following parameter is used to set the style of a line?
asked
Dec 25, 2021
in
Matplotlib
by
rajeshsharma
style-line
0
votes
1
answer
You can view the latest data center map and Pay as You Go subscription information in (the) ________?
asked
Nov 9, 2019
in
Azure
by
rajeshsharma
azure-data-center
0
votes
1
answer
Which of the following is not a Data Structure of Pandas?
asked
Aug 13, 2021
in
Python Pandas
by
SakshiSharma
data-structure
+1
vote
1
answer
The number of accounts that can be given access to a bucket is _________.
asked
Jan 4, 2022
in
Amazon Storage (S3)
by
sharadyadav1986
bucket-accounts
0
votes
1
answer
FormFlows allows for easy bot building than Dialogs. True or False?
asked
Dec 21, 2021
in
Microsoft Bot Framework
by
SakshiSharma
formflow-bot-building
+2
votes
1
answer
Keycloak can only be used to authenticate applications and not individual users
asked
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
Page:
« prev
1
...
965
966
967
968
969
970
971
972
973
974
975
...
1000
...
next »
...