Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged security
Home
Tag
security
0
votes
Q: Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3
in
Cyber Security
by
sharadyadav1986
rat
malware
security
0
votes
Q: “CHAP” stands for __________.
asked
May 3
in
Cyber Security
by
sharadyadav1986
chap
malware
security
0
votes
Q: Which one of the following refers to the non-functional requirements like disaster recovery, security, reliability, etc.
asked
Sep 1, 2021
in
Cloud Computing
by
SakshiSharma
disaster-recovery
security
0
votes
Q: What is DevOps Security?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
security
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: Identify reasons why TCS has adopted data protection program 1. Customer and market expectations 2. Competitive Differentiation 3. Risk Landscape 4. Legal Obligation
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
protection-program
security
threat
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: State True or False: Maintenance (Operational) Security is not required if software is developed securely.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
secure-software
security
0
votes
Q: _________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
Q: Which of the following issues can be addressed using an efficient logging system?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
information-logging
security
threat-modeling
0
votes
Q: Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-check
security
secure-programming-practices
0
votes
Q: Wire Encryption deals with securing data while it is at rest.
asked
Jan 26, 2021
in
Hadoop
by
SakshiSharma
wire-encryption
security
data-security
+1
vote
Q: What is the use of a firewall and how it can be implemented in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+1
vote
Q: What is two-factor authentication and how it can be implemented for public websites in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+1
vote
Q: What is the difference between hashing and encryption in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+1
vote
Q: Symmetric Vs Asymmetric encryption in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+1
vote
Q: What is a CIA triad in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
0
votes
Q: What do you mean by the network security groups?
asked
Feb 21, 2020
in
Azure
by
Emile_01
#azure-network
security
To see more, click for the
full list of questions
or
popular tags
.
...