Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
What experience do you have with creating security policies and procedures for Azure deployments?
asked
Mar 3
in
Azure
by
sharadyadav1986
security-policies
procedures
azure-deployments
0
votes
A developer is working on a web application that runs on Amazon Elastic Container Service (Amazon ECS)
asked
Mar 3
in
AWS
by
DavidAnderson
aws-certified-developer-associate
0
votes
A developer is creating a solution to track an account's Amazon S3 buckets over time.
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
How would the VARCHAR column REMARKS be defined?
asked
Feb 28
in
DB2
by
john ganales
varchar
0
votes
A developer is writing an AWS Lambda function. The developer wants to log key events that occur during the
asked
Mar 3
in
AWS
by
DavidAnderson
aws-certified-developer-associate
0
votes
What are some of the things you can do using IAM?
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
What are the terms of AWS IAM?
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
Can one access all the features of AWS with only one account?
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
What’s the other name of the IAM user?
asked
Mar 2
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
A company experienced partial downtime during the last deployment of a new application.
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
What are Temporary Security Credentials?
asked
Mar 2
in
AWS
by
DavidAnderson
aws-iam-interview-questions-answers
0
votes
Describe your experience with training users on security best practices for Azure.
asked
Mar 3
in
Azure
by
sharadyadav1986
security-practices
0
votes
Why would one use the feature of giving Access to users using an AWS account?
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
What are the security features outside IAM?
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
A developer needs to write an AWS CloudFormation template on a local machine and deploy a CloudFormation stack to AWS.
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
How do you approach troubleshooting security issues in Azure?
asked
Mar 3
in
Azure
by
sharadyadav1986
troubleshooting
security-issues
0
votes
What is ABAC for AWS?
asked
Mar 3
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
How would you go about designing a secure cloud infrastructure for an organization using Azure?
asked
Mar 2
in
Azure
by
SakshiSharma
cloud
infrastructure
azure-valut
0
votes
How do you ensure compliance with industry regulations and standards such as GDPR or HIPAA?
asked
Mar 3
in
Azure
by
sharadyadav1986
gdpr
hipaa
0
votes
What experience do you have with auditing and logging activities in Azure?
asked
Mar 3
in
Azure
by
sharadyadav1986
logging
activities
Page:
« prev
1
...
128
129
130
131
132
133
134
135
136
137
138
...
1000
next »
...