Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions and answers in Security Assessment
Home
Questions
Security Assessment
+1
vote
which testing helps in identifying vulnerabilities in a system.
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-exam-question-answer
+1
vote
Extensible authentication protocol is authentication framework frequently used in ______.
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-exam-question-answer
+1
vote
Number of attributes used in Security Testing?
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-exam-question-answer
+1
vote
XSS or cross-site scripting is a type of vulnerability
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-exam-question-answer
+1
vote
XSS or cross-site scripting is a type of vulnerability?
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-exam-question-answer
+1
vote
WPA2 is used for security in _______.
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-questions-answers
+1
vote
Integrity is the attributes of Security Testing?
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-questions-answers
+1
vote
IPSec is designed to provide security at the _________.
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-questions-answers
+1
vote
SQL Injection is one of the techniques used get data by hackers.
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-questions-answers
+1
vote
In tunnel mode, IPSec protects the ______.
answered
Feb 5
in
Security Assessment
by
AdilsonLima
(
5.7k
points)
ipsecurity-interview-questions-answers
0
votes
did TCS forces to fire a girl Engineer just because she purchased some products and claimed under the benefits that TCS offers?
answered
Jan 5
in
Security Assessment
by
Robin
(
13.0k
points)
tcs
0
votes
William sent an E-mail message to an employee recently assigned to his team complimenting her on her dress. Later she was reprimanded for poor
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Which statement best describes a supervisor's, manager's or team leader's potential personal liability for sexual harassment?
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
An employee witnesses another employee being harassed. Even though this involved a co-worker, the witness can be considered a victim in this case.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
In order for it to be determined sexual harassment, the victim has to be of the opposite sex of the harasser.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Employees claiming sexual harassment who are aware of but fail to take advantage of company policies or resources designed to prevent, correct or eliminate harassment have much weaker cases than those who do.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Friendly flirting is not sexual harassment when flirting is practiced between mutually consenting individuals who are equal in power or authority.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment in the workplace is a women's issue.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Due to strict privacy laws, supervisors cannot monitor employee email or be found liable for sexual harassment via email by their employees.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harrassment is not limited to physical contact. It can occur any time that an individual is uncomfortable with another person’s approaches, comments or discussions.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
If he didn’t like the sexual attention, but she meant it only as flirting or joking, then it was not sexual harassment.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Women in professional jobs (teachers, lawyers, engineers, doctors, etc.) are not as likely to be sexually harassed as women in blue-collar jobs (factory workers, secretaries, truck drivers, etc.)
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
secuity
0
votes
Terms of endearment with co-workers, i.e. "honey," "dear" are considered verbal abuse and charges can be brought up against the employee.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment can occur outside the work site and still be considered work related. Incidents that occur at retirement parties and office socials or in training
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment complaints are generally false or unjustified.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Employees are subject to disciplinary action, up to and including termination for engaging in unlawful harassment or discrimination.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
It is unlawful, and a violation of the company’s policy, to retaliate against someone who resists unwelcome behavior, files a complaint about harassment or perceived harassment, or participates in an investigation.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment involves offering job benefits in exchange for sexual favors, or alternatively threatening a person’s job it they don’t agree to the offer.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment includes unwelcome sexual advances or romantic interest, or other unwelcome conduct that may be verbal, visual, or physical.
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Harassment or discrimination based on sex, race, color, religion, national origin, age, disability, ancestry, or any other characteristic protected by federal
answered
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
harassment
To see more, click for all the
questions in this category
.
...