Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
Which of the following is a similarity between bitcoin and R3 Corda?
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
What forces the user to change password at first login?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which happens first authorization or authentication?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Grant limited permission to specified account A. File Shredding B. File sharing and permission C. File corrupting D. File integrity
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What does Light Directory Access Protocol (LDAP) doesn’t store?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is a strong password?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What is not a good practice for user administration?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
_ is a type of software designed to help the user’s computer detect viruses and avoid them.
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is a good practice?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is least secure method of authentication ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Why is one time password safe ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What is characteristic of RADIUS system?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is considered as the unsolicited commercial email?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which one of the following can be considered as the class of computer threats?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
In which of the following, a person is constantly followed/chased by another person or group of several peoples?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What is characteristics of Authorization ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
From the following, which is not a common file permission?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following are forms of malicious attack?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
What are the common security threats?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Which of the following is a good practice?
asked
Feb 6, 2022
in
Usability Principles
by
GeorgeBell
user-authentication-interview-question
0
votes
1
answer
Blockchain is a distributed______.
asked
Feb 6, 2022
in
Blockchain Intermedio
by
GeorgeBell
blockchain-intermedio-interview-question-answer
0
votes
1
answer
What is a DBInstance Class incase of Neptune?
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
dbinstance-class
0
votes
1
answer
Amazon Neptune shares its operational technology with _______________.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
neptune-technology
0
votes
1
answer
Identify the error code that is not available on Neptune.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
error-code
0
votes
1
answer
Software patches to Neptune Engine underlying OS are ___________.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
software-pacthes
0
votes
1
answer
Modifications of Neptune Cluster may cause _____________________.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
neptune-cluster
0
votes
1
answer
A Neptune Instance is __________________.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
neptune-instance
0
votes
1
answer
Neptune is _____________________.
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
amazon-neptune
0
votes
1
answer
Which of the following databases do not have Apache Tinkerpop Standard?
asked
Feb 5, 2022
in
Amazon Neptune
by
sharadyadav1986
apache-tinkerpop
Page:
« prev
1
...
576
577
578
579
580
581
582
583
584
585
586
...
667
...
next »
Recent questions
...