Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
Which of the following methods of a match object, mo, is used to view the named group portions of match in the form of a dictionary
asked
Jan 11, 2021
in
Python
by
SakshiSharma
#python-object
#object
Python-questions-answers
0
votes
How does ArcSight ESM provide Powerful real-time data correlation?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsightesm
0
votes
Please provide the example with syntax of If-Else in Golang
asked
Apr 27, 2023
in
GoLang
by
Robin
if-else
golang-condition
golang-loop
0
votes
The three major roles in the Web service architecture.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-architecture
web-service-security
0
votes
Why would you use a Policy-based method instead o a Value-based method?
asked
May 6, 2023
in
Reinforcement Learning
by
Robin
value-based
method
0
votes
DroidDream malware that hit the Android Market in 2011 is an example of _____________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
droiddream-malware
android-market
0
votes
What are the key features of the ArcSight Enterprise Security Manager?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsight
enterprissecuritymanager
0
votes
What are the advantages of SIEM software?
asked
May 22, 2023
in
ArcSight
by
john ganales
advantages-siem
0
votes
What are the main components of the master node?
asked
May 18, 2023
in
Kubernetes K8s
by
sharadyadav1986
master
node
kubernetescomponents
+1
vote
How do you send email notifications on pipeline failure?
asked
May 4, 2023
in
Azure
by
Robindeniel
pipeline-failure
adf
0
votes
What are the benefits of a partitioned session?
asked
May 23, 2023
in
Informatica
by
SakshiSharma
partitioned
session
0
votes
Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS protocol?
asked
May 20, 2023
in
CISA
by
Robindeniel
https
protocol
0
votes
The FIRST step in a successful attack to a system would be:
asked
May 20, 2023
in
CISA
by
Robindeniel
successful-attack
0
votes
How does ESM and SIEM relate?
asked
May 22, 2023
in
ArcSight
by
john ganales
esm
siem
0
votes
What is Replication controllers.
asked
May 19, 2023
in
UI Design
by
sharadyadav1986
replication
controllers
0
votes
Why do organizations need Security Information and Event Management systems?
asked
May 21, 2023
in
ArcSight
by
Robin
eventmanagementsystems
0
votes
What all components it has, and what is their role?
asked
May 22, 2023
in
ArcSight
by
john ganales
siem-comonent
0
votes
What disruptive service, now available to everyone, was initially created to run and manage Amazon.com?
asked
Feb 19, 2022
in
Digital for Industries
by
SakshiSharma
disruptive-searvice
0
votes
What are the connectors?
asked
May 22, 2023
in
ArcSight
by
john ganales
siemconnectors
+1
vote
Drives are also known as
asked
Jun 22, 2021
in
Robotic Process Automation
by
SakshiSharma
drives
robots
Page:
« prev
1
...
424
425
426
427
428
429
430
431
432
433
434
...
1000
next »
...