Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
The data structure commonly used in Redis is ____________.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis
data-structure
0
votes
1
answer
Given is a code snippet.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis
0
votes
1
answer
Consider “a” as a shared key among two processes, A and B.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis
0
votes
1
answer
_________ returns the number of elements in a set.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis
element
0
votes
1
answer
Which of the following set commands removes and returns members of a set?
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis
member-set
0
votes
1
answer
The following are all Key Value databases, except __________.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
key-value
redis
0
votes
1
answer
Redis can be configured to meet different requirements by editing the configuration settings in __________.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis
configuraiton
0
votes
1
answer
redis.conf is configured for changing ____________ to connect to the Redis server.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis-conf
configuation
0
votes
1
answer
Redis provides multi-state architecture during replication, where every instance can both read and write.
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
redis
replication
0
votes
1
answer
Which is the default persistence mode in Redis?
asked
Oct 6, 2022
in
Redis
by
sharadyadav1986
persistence
redis
0
votes
1
answer
Which configuration setting specifies the file to which the RDB snapshot dump is saved?
asked
Oct 6, 2022
in
Redis
by
Robindeniel
configuration
redis
0
votes
1
answer
When using Pipelining, will the additional memory used be high?
asked
Oct 6, 2022
in
Redis
by
Robindeniel
redis
memory
pipeline
0
votes
1
answer
Redis is widely used as a secondary database for ___________.
asked
Oct 6, 2022
in
Redis
by
Robindeniel
redis
secondary-database
0
votes
1
answer
Which is a difference between Memcached and Redis?
asked
Oct 6, 2022
in
Redis
by
Robindeniel
redis
memcached
0
votes
1
answer
Which is the best way to achieve persistence in Redis?
asked
Oct 6, 2022
in
Redis
by
Robindeniel
aof
redis
persistence
0
votes
1
answer
____________ is the number of sentinels that need to agree to the fact that the master is not reachable and make a failover procedure promoting the slave to master.
asked
Oct 6, 2022
in
Redis
by
Robindeniel
redis
master
slave
0
votes
1
answer
Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
linux-namespace
0
votes
1
answer
Which of the following cloud service providers does not use Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
docker
container
0
votes
1
answer
Docker uses which Linux Kernel feature to provide resource allocation functionality?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
1
answer
While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
non-container
containers
security
0
votes
1
answer
Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
vulnerabilities
tern
security
containers
0
votes
1
answer
Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
1
answer
Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
anchor
security
containers
0
votes
1
answer
Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
0
votes
1
answer
While securing applications deployed with the traditional (non-container) approach, application runtime is tested for vulnerabilities by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
applications
0
votes
1
answer
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
owasp
zed-attack-proxy
containers
security
0
votes
1
answer
While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
containers
security
0
votes
1
answer
We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
flags
0
votes
1
answer
While securing applications deployed with container approach, security at Kernel level is enforced by using ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
container
security
0
votes
1
answer
Redis string cannot hold any value beyond a certain length. What is it?
asked
Oct 4, 2022
in
Redis
by
sharadyadav1986
redis
string
Page:
« prev
1
...
390
391
392
393
394
395
396
397
398
399
400
...
667
...
next »
Recent questions
...