Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which is the T/R that builts only single cache memory?
asked
May 25, 2023
in
Informatica
by
Robindeniel
trbuilts
single
cachememory
0
votes
What is the difference between NLP and NLU?
asked
May 7, 2023
in
NLP using Python
by
john ganales
nlp
nlu
0
votes
Which option helps in finding whether the mapping is correct or not?
asked
May 24, 2023
in
Informatica
by
Robin
informaticamapping
0
votes
What is a master node in Kubernetes?
asked
May 18, 2023
in
Kubernetes K8s
by
sharadyadav1986
master
node
kubernetes
0
votes
Mention different kinds of Namespaces in Kubernetes.
asked
May 18, 2023
in
Kubernetes K8s
by
sharadyadav1986
namespacestypes
kubernetes
0
votes
In the NIST version of the SDLC process, the system or program performs the work for which it was designed in which waterfall phase?
asked
May 20, 2023
in
CISA
by
Robindeniel
nist-version
0
votes
The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
asked
May 20, 2023
in
CISA
by
Robindeniel
organizationnetwork
0
votes
Few bullet points on ArcSight ESM?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsight
esm
0
votes
What does ArcSight Manager do, explain in brief?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsight
manager
0
votes
How many lookup caches are available?
asked
May 23, 2023
in
Informatica
by
SakshiSharma
lookup
caches
0
votes
What can be done using ArcSight ESM?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsightesm
0
votes
How can the security information and event management process of SIEM can be broken down?
asked
May 22, 2023
in
ArcSight
by
john ganales
siem
0
votes
What are the system requirements for implementing ArcSight ESM?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsight
esm
0
votes
After observing suspicious activities in a server, a manager requests a forensic analysis.
asked
May 20, 2023
in
CISA
by
Robindeniel
forensic
analysis
0
votes
What are the features of complex mapping?
asked
May 24, 2023
in
Informatica
by
Robin
complex
mapping
0
votes
During which step of the audit life cycle does an auditor identify which skills are needed for the audit, how many auditors are required, and what other resources are needed?
asked
May 20, 2023
in
CISA
by
Robindeniel
auditoridentify
0
votes
The use of digital signatures:
asked
May 20, 2023
in
CISA
by
Robindeniel
digital
signatures
0
votes
How many numbers of sessions are grouped in one batch?
asked
May 24, 2023
in
Informatica
by
Robin
informatica-batch
0
votes
What are the different mapping design tips for Informatica?
asked
May 23, 2023
in
Informatica
by
SakshiSharma
informatica
mappingdesign
0
votes
What are the main steps in an SSL handshake?
asked
May 14, 2023
in
Loan
by
john ganales
ssl
handshake
Page:
« prev
1
...
422
423
424
425
426
427
428
429
430
431
432
...
1000
next »
...