Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
An auditor should recommend the use of which of the following to determine the minimum level of service needed at an alternate site?
asked
May 20, 2023
in
CISA
by
Robindeniel
level
of
service
0
votes
1
answer
Which of the following symmetric algorithms is a block cipher that the U.S. government adopted as AES to replace DES?
asked
May 20, 2023
in
CISA
by
Robindeniel
symmetric
algorithms
0
votes
1
answer
The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
asked
May 20, 2023
in
CISA
by
Robindeniel
organizationnetwork
0
votes
1
answer
A company has decided to implement an electronic signature scheme based on public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a
asked
May 20, 2023
in
CISA
by
Robindeniel
public
key
infrastructure
0
votes
1
answer
An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?
asked
May 20, 2023
in
CISA
by
Robindeniel
is
auditor
0
votes
1
answer
After observing suspicious activities in a server, a manager requests a forensic analysis.
asked
May 20, 2023
in
CISA
by
Robindeniel
forensic
analysis
0
votes
1
answer
Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS protocol?
asked
May 20, 2023
in
CISA
by
Robindeniel
https
protocol
0
votes
1
answer
A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?
asked
May 20, 2023
in
CISA
by
Robindeniel
firewall
successful
deployment
0
votes
1
answer
The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet.
asked
May 20, 2023
in
CISA
by
Robindeniel
ssl
encryption
0
votes
1
answer
What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?is
asked
May 20, 2023
in
CISA
by
Robindeniel
vpn
logon
0
votes
1
answer
The use of digital signatures:
asked
May 20, 2023
in
CISA
by
Robindeniel
digital
signatures
0
votes
1
answer
The FIRST step in a successful attack to a system would be:
asked
May 20, 2023
in
CISA
by
Robindeniel
successful-attack
0
votes
1
answer
What is the Cluster IP?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
clusterip
0
votes
1
answer
What is the role of clusters in Kubernetes?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
clusterskubernetes
0
votes
1
answer
What are the uses of the Google Kubernetes Engine?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
google
kubernetes
engine
0
votes
1
answer
Explain the two different types of load balancers.
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
typesloadbalancers
0
votes
1
answer
Explain the Load balancer in Kubernetes.
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
load
balancer
kubernetes
0
votes
1
answer
What is the based selector that is used in the replication controller?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
replication
controller
0
votes
1
answer
Explain the Ingress controller.
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
ingresscontroller
0
votes
1
answer
What is ETCD in Kubernetes?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
etcd-kubernetes
0
votes
1
answer
What are the uses of Daemon sets?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
usesdaemonsets
0
votes
1
answer
Mention the various container resource monitoring tools.
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
container
resource
monitoring
tools
0
votes
1
answer
What are the features of Kubernetes?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
featureskubernetes
0
votes
1
answer
What is Replication controllers.
asked
May 19, 2023
in
UI Design
by
sharadyadav1986
replication
controllers
0
votes
1
answer
How to determine the status of deployment?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
deploymentkubernetes
0
votes
1
answer
What is Stateful sets in Kubernetes.
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
stateful
sets
kubernetes
0
votes
1
answer
What is the difference between the pod and the container?
asked
May 19, 2023
in
Kubernetes K8s
by
sharadyadav1986
pod
container
0
votes
1
answer
What are the major operations of Kubelet as a node service component in Kubernetes?
asked
May 18, 2023
in
Kubernetes K8s
by
sharadyadav1986
kubernetescomponent
0
votes
1
answer
What are the tools of container orchestration?
asked
May 18, 2023
in
Kubernetes K8s
by
sharadyadav1986
container
orchestrationtools
0
votes
1
answer
Why do we need Container orchestration in Kubernetes?
asked
May 18, 2023
in
Kubernetes K8s
by
sharadyadav1986
container-orchestration
kubernetes
Page:
« prev
1
...
269
270
271
272
273
274
275
276
277
278
279
...
667
...
next »
Recent questions
...