Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Hot questions
Home
Hot! Questions
0
votes
The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
asked
May 20, 2023
in
CISA
by
Robindeniel
organizationnetwork
0
votes
Which IS NOT a component of reciprocation?
asked
Feb 24, 2022
in
Interaction Design
by
sharadyadav1986
reciprocation
interaction-design
0
votes
Not having a clear idea of the solution and getting trapped in the details are the two major mistakes in _______.
asked
Feb 24, 2022
in
Implementing Design Thinking
by
sharadyadav1986
design-thinking
0
votes
Mention different kinds of Namespaces in Kubernetes.
asked
May 18, 2023
in
Kubernetes K8s
by
sharadyadav1986
namespacestypes
kubernetes
0
votes
What does ArcSight Manager do, explain in brief?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsight
manager
0
votes
Which option helps in finding whether the mapping is correct or not?
asked
May 24, 2023
in
Informatica
by
Robin
informaticamapping
0
votes
What we will get if we compare the "one" with "8" using the less than operator ("one"<8)?
asked
Mar 21, 2021
in
JavaScript
by
rajeshsharma
javascript
operator
function-value
0
votes
Instagram, Uber, Evernote are examples of _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
instagram
uber
evernote
0
votes
In the NIST version of the SDLC process, the system or program performs the work for which it was designed in which waterfall phase?
asked
May 20, 2023
in
CISA
by
Robindeniel
nist-version
0
votes
Few bullet points on ArcSight ESM?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsight
esm
0
votes
What are the features of complex mapping?
asked
May 24, 2023
in
Informatica
by
Robin
complex
mapping
0
votes
What are the system requirements for implementing ArcSight ESM?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsight
esm
0
votes
What are the different mapping design tips for Informatica?
asked
May 23, 2023
in
Informatica
by
SakshiSharma
informatica
mappingdesign
0
votes
The use of digital signatures:
asked
May 20, 2023
in
CISA
by
Robindeniel
digital
signatures
0
votes
How can the security information and event management process of SIEM can be broken down?
asked
May 22, 2023
in
ArcSight
by
john ganales
siem
0
votes
What are Java Collections Framework + Generics, Lambdas & Stream API
asked
May 14, 2023
in
JAVA
by
john ganales
java
collections
framework
generics
lambdas
stream
api
0
votes
What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?is
asked
May 20, 2023
in
CISA
by
Robindeniel
vpn
logon
0
votes
How many lookup caches are available?
asked
May 23, 2023
in
Informatica
by
SakshiSharma
lookup
caches
0
votes
Which of the following methods of a match object, mo, is used to view the named group portions of match in the form of a dictionary
asked
Jan 11, 2021
in
Python
by
SakshiSharma
#python-object
#object
Python-questions-answers
0
votes
What can be done using ArcSight ESM?
asked
May 21, 2023
in
ArcSight
by
Robin
arcsightesm
Page:
« prev
1
...
434
435
436
437
438
439
440
441
442
443
444
...
1000
next »
...