Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged security
Home
Tag
security
0
votes
How would you handle data privacy and security concerns in a data pipeline?
asked
Jun 22
in
Data Analytics
by
SakshiSharma
data
privacy
and
security
0
votes
What strategies do you use to stay up-to-date with the latest security threats and vulnerabilities?
asked
Mar 3
in
Azure
by
sharadyadav1986
security
threats
vulnerabilities
0
votes
What experience do you have with Azure security technologies
asked
Mar 2
in
Azure
by
SakshiSharma
azure
security
center
active
directory
keyvault
0
votes
Tom has joined a project. He has been assigned a desktop. This desktop was used by Jerry, who is now released from the project. Upon logging on, Tom found personal non-business files stored in the computer by Jerry. If you were Tom, what action would you take?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
How would you protect company/customer-provided laptops during air travel?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You observe that one of your company colleagues keeps sending unsolicited e-mails that are either offensive, obscene, or at times defamatory. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You have a business need to use an Internet-based chat messenger not approved by the company. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You are taking a printout of a debugging code you have written. What precautions do you need to take?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
While working on the office network, which of the following are not acceptable practices?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
You need to mail the estimation sheet created as a response to one RFP to your Onsite BRM. What care will you take while sending the e-mail with regards to its label?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
The information displayed on the company website is classified as company Internal. This statement is True or False.
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
The access-related controls for Confidential classification are more stringent as compared to Internal classification. Is this statement True or False and why?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Why do you need a Business Continuity Plan?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
What data would you typically select for the backup?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
Where can you find the company process for Business Continuity Management?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
0
votes
The confidentiality of information is compromised when:
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
How should an employee handle classified information while traveling?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
The company recommended method of disposing of non-electronic information in paper form classified as Restricted, Confidential, or Private & Confidential is the same. Is this statement True or False?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Which of the following is most appropriate with regard to an organization's Business Continuity Planning (BCP) framework?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
You are executing a project and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
Page:
1
2
3
4
5
6
next »
...