Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
Checkmarx supports DevSecOps.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-devsecops
0
votes
1
answer
A failed scan shows the reason for the failures.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
scan-failure
0
votes
1
answer
The flow of issues can be viewed in Open Viewer.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
open-viewer
0
votes
1
answer
Code compare can be done via _______.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
code-compare
+1
vote
1
answer
Checkmarx helps to do the auto fix for issues.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-issues
0
votes
1
answer
Checkmarx supports Eclipse IDE.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-ide
eclipse-ide
0
votes
1
answer
You can test DAST Testing using Checkmarx.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-dast
0
votes
1
answer
Checkmarx supports mailing for pre/post scan activities.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-scan
0
votes
1
answer
The queued scan can be changed as the priority.
asked
Feb 18, 2022
by
rajeshsharma
checkmarx-queue
0
votes
1
answer
Does Checkmarx help to push the source code in the following options?
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-push
0
votes
1
answer
Checkmarx supports the compare feature.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-features
0
votes
1
answer
Checkmarx supports only SAST.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-sast
0
votes
1
answer
LOC represents ______________.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-loc
loc
0
votes
1
answer
Checkmarx standards include __________.
asked
Feb 18, 2022
in
SAST – Checkmarx
by
rajeshsharma
checkmarx-standard
0
votes
1
answer
Endpoints security solutions leverage a _____________ model for protecting various endpoints.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
endpoint-security
0
votes
1
answer
A single program responsible for scanning, detecting, and removing malware, spyware, adware, ransomware and other such malicious entities.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
malware
spyware
ransomeware
0
votes
1
answer
Which among the following is most useful to protect complete networks?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
protect-complete-networks
network-protection
0
votes
1
answer
Which of the following feature of endpoint security solutions involves real time monitoring of network topology, connections, and traffic flow?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
endpoint-security
0
votes
1
answer
Privilege escalation is an _______________.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
privilege-escalation
0
votes
1
answer
What is the common name for remote computing devices that communicate back and forth with a network to which they are connected?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
remote-computing
0
votes
1
answer
Which among the following usually refers to an on-premise solution?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
on-premise-solution
security-solution
0
votes
1
answer
_________ is an organized approach to addressing and managing the aftermath of a security breach or cyberattack.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
security-breach
0
votes
1
answer
__________ provides a snapshot of threats over time, encouraging the maintenance of up to date situational awareness.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
threats-snapshots
0
votes
1
answer
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
malicious-portable-execution
0
votes
1
answer
Network security solutions cannot be used to identify attacks in progress.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
network-security
0
votes
1
answer
_______ is responsible for filtering the traffic flowing in and out of a network based on "a set of security rules".
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
traffic-flow
network-security
0
votes
1
answer
Which among the following usually refers to a cloud-based solution?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
cloud-based-solution
0
votes
1
answer
Which of the following are essential features to ensure data security?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
data-security
end-point-security
0
votes
1
answer
Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
dangerous-locations
uncontrolled-devices
0
votes
1
answer
Which of the following is a portable executable?
asked
Feb 17, 2022
in
End Point Security
by
sharadyadav1986
portable-executable
Page:
« prev
1
...
561
562
563
564
565
566
567
568
569
570
571
...
667
...
next »
Recent questions
...