Login
Remember
Register
User DavidAnderson
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by DavidAnderson
+1
vote
1
answer
What is Spike and Zero Sprint in Agile?
asked
Jul 18, 2021
in
Agile
agile
+1
vote
1
answer
What's the difference between sprint backlog and product backlog?
asked
Jul 18, 2021
in
Agile
agile
0
votes
1
answer
What is ELK stack in Kibana?
asked
Jun 3, 2021
in
Kibana
kibana
0
votes
1
answer
What is document in elasticsearch Kibana?
asked
Jun 3, 2021
in
Kibana
kibana
0
votes
1
answer
What is node in Kibana?
asked
Jun 3, 2021
in
Kibana
kibana
0
votes
1
answer
What is Kibana visualize interface?
asked
Jun 3, 2021
in
Kibana
kibana
0
votes
1
answer
What are kibana settings?
asked
Jun 3, 2021
in
Kibana
kibana
0
votes
1
answer
What are different type of queries which are supported by Elasticsearch in Kibana?
asked
Jun 3, 2021
in
Kibana
kibana
0
votes
1
answer
What are major components of kibana?
asked
Jun 3, 2021
in
Kibana
kibana-interview-questions
0
votes
1
answer
What is Filebeat in kibana and mention the segments it monitors?
asked
Jun 3, 2021
in
Kibana
kibana-interview-questions
0
votes
1
answer
What is Elasticsearch Logstash in Kibana?
asked
Jun 3, 2021
in
Kibana
kibana-interview-questions
0
votes
1
answer
What is clustering in Kibana?
asked
Jun 3, 2021
in
Kibana
kibana-interview-questions
+1
vote
1
answer
Diffie-hellman algorithm is used for?
asked
Mar 17, 2021
in
Secure Code Review
ssa
0
votes
1
answer
Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
ssa
0
votes
1
answer
How can a confidential message be securely distributed?
asked
Mar 17, 2021
in
Secure Programming Practices
ssa
0
votes
1
answer
Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
ssa
0
votes
1
answer
Error Handlinug reveal stack traces or other overlay informative error message to users. this will be categorized under security Misconfiguration?
asked
Mar 17, 2021
ssa
0
votes
1
answer
In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
ssa
0
votes
1
answer
Which of the following is a digital signature algorithm?
asked
Mar 17, 2021
in
Secure Code Review
ssa
0
votes
1
answer
Asymmetric Key Encryption/Decryption requires?
asked
Mar 17, 2021
in
Secure Code Review
ssa
0
votes
1
answer
Which of the following ensure that information has not been altered in any unauthorized ways by any means?
asked
Mar 17, 2021
in
Secure Code Review
#ssa
0
votes
1
answer
DES & 3DES are?
asked
Mar 17, 2021
in
SAP
ssa
0
votes
1
answer
What are the basic security requirement of a typical SSO solution?
asked
Mar 17, 2021
in
Secure Code Review
ssa
0
votes
1
answer
in the context of "authentication ",which of the following is correct description of a user's "identity" or "identifier"?
asked
Mar 17, 2021
in
Secure Code Review
ssa
0
votes
1
answer
The use of proper security techniques can :
asked
Mar 17, 2021
in
Secure Programming Practices
ssa
0
votes
2
answers
Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
ssa
secure-programming
+1
vote
1
answer
Block Cipher is example of
asked
Mar 17, 2021
in
Secure Code Review
ssa
0
votes
1
answer
Symmetric Key Encryption/Decryption requires
asked
Mar 17, 2021
in
Secure Code Review
ssa
0
votes
1
answer
Impact of Injection attacks?
asked
Mar 17, 2021
in
SAS
ssa
0
votes
1
answer
Security Requirement Analysis ensures what from the following?
asked
Mar 17, 2021
in
Secure Code Review
ssa
Page:
« prev
1
...
107
108
109
110
111
112
113
114
115
116
117
...
123
next »
...