Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
What is the IAM Hierarchy of Privileges?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions-answers
0
votes
1
answer
What are Temporary Security Credentials?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions-answers
0
votes
1
answer
What are AWS IAM roles?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions-answers
0
votes
1
answer
What is CloudTrail in AWS?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
1
answer
What are the 5 top security credentials in AWS IAM?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-interview-questions-asnwers
0
votes
1
answer
How to control Authorization in AWS IAM?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions-answers
0
votes
1
answer
What’s the other name of the IAM user?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
1
answer
What is federated user access management?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-interview-questions-answers
0
votes
1
answer
What is Authorization in terms of AWS IAM service?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
ae
ws-interview-questions-answers
0
votes
1
answer
In the IAM service, can we monitor the IAM user activity?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions-answers
0
votes
1
answer
How is authentication controlled in the IAM service?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-question-answer
0
votes
1
answer
Are IAM users and root users the same?
asked
Mar 2, 2024
in
AWS
by
DavidAnderson
aws-interview-question-answes
0
votes
1
answer
What are the best practices for configuring network security groups in Azure?
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
configuring-network
security-groups
0
votes
1
answer
Have you ever implemented a multi-factor authentication system in Azure?
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
multi-factor
authentication-system
0
votes
1
answer
What steps do you take to protect against malicious attacks such as DDoS or SQL injection?
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
ddos
sql-injection
0
votes
1
answer
How do you monitor and detect suspicious activity on an Azure platform?
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
azure-platform
0
votes
1
answer
What strategies do you use to ensure that data stored in Azure is secure from unauthorized access?
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
unauthorized-access
0
votes
1
answer
Are you familiar with the different types of encryption available in Azure?
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
encryption-azure
0
votes
1
answer
Explain the concept of least privilege when it comes to granting user access to resources in Azure.
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
access-resources
0
votes
1
answer
Describe your experience with implementing identity and access management solutions in Azure.
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
accessmanagementsolutions
identity-management
0
votes
1
answer
How would you go about designing a secure cloud infrastructure for an organization using Azure?
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
cloud
infrastructure
azure-valut
0
votes
1
answer
What experience do you have with Azure security technologies
asked
Mar 2, 2024
in
Azure
by
SakshiSharma
azure
security
center
active
directory
keyvault
0
votes
1
answer
A development team has been using a builder server that is hosted on an Amazon EC2
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions-answers
0
votes
1
answer
A company hosts a microservices application that uses Amazon API Gateway. AWS Lambda, Amazon SQS, and Amazon DynamoDB
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions
0
votes
1
answer
A company that has multiple offices uses an Amazon DynamoDB table to store employee payroll information.
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions
0
votes
0
answers
A developer is implementing user authentication and authorization for a web application that is hosted on an Amazon
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions
0
votes
1
answer
A developer is writing an AWS Lambda function. The Lambda function needs to access items that are
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions
0
votes
1
answer
A company has point-of-sale devices across thousands of retail shops that synchronize sales transactions
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions
0
votes
1
answer
A company is using AWS Elastic Beanstalk to deploy a three-tier application.
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions
0
votes
1
answer
A company is using AWS CodeDeploy for all production deployments. A developer has an Amazon ECS
asked
Mar 1, 2024
in
AWS
by
DavidAnderson
aws-iam-interview-questions
Page:
« prev
1
...
82
83
84
85
86
87
88
89
90
91
92
...
667
...
next »
Recent questions
...