Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged Security
Home
Tag
Security
0
votes
Q: If most people find a comment amusing and inoffensive, then the one person who is offended does not have a right to complain about harassment.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: If someone is offended by my behavior in the break room, they should take their break somewhere else, or at another time, since I am not “working” while I’m on my break and I have a right to freedom of speech.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: Quid Pro Quo harassment occurs when a female boss tells dirty jokes to the other women in the office.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
quid-pro-quo
security
0
votes
Q: If my intentions were good – for example, I meant to compliment someone on how great they looked there is no way my conduct could violate the sexual harassment policy.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: If no one complains, then it’s not sexual harassment
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Q: Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
linux-namespace
0
votes
Q: Which of the following cloud service providers does not use Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
docker
container
0
votes
Q: Docker uses which Linux Kernel feature to provide resource allocation functionality?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
Q: While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
non-container
containers
security
0
votes
Q: Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
vulnerabilities
tern
security
containers
0
votes
Q: Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
Q: Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
anchor
security
containers
0
votes
Q: Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
0
votes
Q: While securing applications deployed with the traditional (non-container) approach, application runtime is tested for vulnerabilities by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
applications
0
votes
Q: OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
owasp
zed-attack-proxy
containers
security
0
votes
Q: While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
containers
security
0
votes
Q: We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
flags
0
votes
Q: While securing applications deployed with container approach, security at Kernel level is enforced by using ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
container
security
0
votes
Q: Which of the following statements are true in terms of allowing/denying traffic from/to VPC assuming the default rules are not in effect? (choose multiple)
asked
Sep 1, 2022
in
AWS
by
sharadyadav1986
aws
security
vpc
0
votes
Q: Which of the following can be used to protect against DDoS attacks? Choose 2 answers from the options given below.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
shield
ddos
attacks
Page:
« prev
1
2
3
4
5
6
next »
...