Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged security
Home
Tag
security
0
votes
Which of the following can be used to protect against DDoS attacks? Choose 2 answers from the options given below.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
shield
ddos
attacks
+1
vote
A website for an international sport governing body would like to serve its content to viewers from different parts of the world in their vernacular language.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
azure
aws
security
technology
service
0
votes
Which of the following services allows you to analyze EC2 Instances against pre-defined security templates to check for vulnerabilities?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
ec2
azure
cloud
0
votes
Your company wants to move an existing Oracle database to the AWS Cloud. Which of the following services can help facilitate this move?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
technology
cloud
azure
security
0
votes
An organization runs several EC2 instances inside a VPC using three subnets, one for Development, one for Test, and one for Production.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
cloud
security
billing
0
votes
A manufacturing firm has recently migrated their application servers to the Amazon EC2 instance.
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
billing
pricing
cloud
security
0
votes
Your design team is planning to design an application that will be hosted on the AWS Cloud. One of their main non-functional requirements is given below:
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
design
cloud
functional-requirement
security
0
votes
Which of the following services can be used as an application firewall in AWS?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
firewall
security
services
cloud
0
votes
Which of the following is the responsibility of the customer to ensure the availability and backup of the EBS volumes?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
security
azure
cloud
ebs
0
votes
Which of the following malware’s type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
rat
malware
security
0
votes
“CHAP” stands for __________.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
chap
malware
security
+1
vote
Which one of the following refers to the non-functional requirements like disaster recovery, security, reliability, etc.
asked
Sep 1, 2021
in
Cloud Computing
by
SakshiSharma
disaster-recovery
security
0
votes
What is DevOps Security?
asked
Mar 25, 2021
in
DevOps Security
by
Robindeniel
devops-security
security
0
votes
Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Identify reasons why TCS has adopted data protection program 1. Customer and market expectations 2. Competitive Differentiation 3. Risk Landscape 4. Legal Obligation
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
protection-program
security
threat
0
votes
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
State True or False: Maintenance (Operational) Security is not required if software is developed securely.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
secure-software
security
0
votes
_________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
Which of the following issues can be addressed using an efficient logging system?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
information-logging
security
threat-modeling
0
votes
Security check can be enforced at compile time by:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
security-check
security
secure-programming-practices
Page:
« prev
1
2
3
4
5
6
next »
...