Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged Security
Home
Tag
Security
0
votes
Your team needs a tool that can be used to correlate events from multiple resources into a central repository. Which of the following can be used for this purpose?
asked
Jun 1
in
Azure
by
sharadyadav1986
(
30.5k
points)
azure
security
center
0
votes
What’s the difference between transport layer security and secure sockets layer?
asked
May 14
in
JAVA
by
john ganales
(
13.1k
points)
transport
layer
security
socketslayer
0
votes
How does Synapse achieve row-level security?
asked
Mar 27
in
Azure
by
john ganales
(
13.1k
points)
synapse
row-level
security
+1
vote
What Data security options are available in Azure SQL DB?
asked
Mar 13
in
Azure
by
SakshiSharma
(
30.8k
points)
data
security
azure
sql-db
0
votes
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
asked
Mar 5
in
Computational Fluid Dynamics
by
rajeshsharma
(
23.1k
points)
ipsec
security
0
votes
William sent an E-mail message to an employee recently assigned to his team complimenting her on her dress. Later she was reprimanded for poor
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Which statement best describes a supervisor's, manager's or team leader's potential personal liability for sexual harassment?
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
An employee witnesses another employee being harassed. Even though this involved a co-worker, the witness can be considered a victim in this case.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
In order for it to be determined sexual harassment, the victim has to be of the opposite sex of the harasser.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Employees claiming sexual harassment who are aware of but fail to take advantage of company policies or resources designed to prevent, correct or eliminate harassment have much weaker cases than those who do.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Friendly flirting is not sexual harassment when flirting is practiced between mutually consenting individuals who are equal in power or authority.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment in the workplace is a women's issue.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Due to strict privacy laws, supervisors cannot monitor employee email or be found liable for sexual harassment via email by their employees.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harrassment is not limited to physical contact. It can occur any time that an individual is uncomfortable with another person’s approaches, comments or discussions.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
If he didn’t like the sexual attention, but she meant it only as flirting or joking, then it was not sexual harassment.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Terms of endearment with co-workers, i.e. "honey," "dear" are considered verbal abuse and charges can be brought up against the employee.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment can occur outside the work site and still be considered work related. Incidents that occur at retirement parties and office socials or in training
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Sexual harassment complaints are generally false or unjustified.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
Employees are subject to disciplinary action, up to and including termination for engaging in unlawful harassment or discrimination.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
0
votes
It is unlawful, and a violation of the company’s policy, to retaliate against someone who resists unwelcome behavior, files a complaint about harassment or perceived harassment, or participates in an investigation.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
(
13.0k
points)
security
Page:
1
2
3
4
next »
...