Login
Remember
Register
User Robindeniel
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by Robindeniel
0
votes
1
answer
What is the meaning of ‘GIT PUSH’ in GIT?
asked
Sep 4, 2020
in
Git
#git-push
#git
0
votes
2
answers
What language is used in GIT?
asked
Sep 4, 2020
in
Git
#git-language
#language-git
0
votes
1
answer
What are the benefits of using GIT?
asked
Sep 4, 2020
in
Git
#benefits-git
#git-benefits
0
votes
1
answer
What is the variance between GIT and SVN?
asked
Sep 4, 2020
in
Git
#gti-vs-svn
#svn-vs-git
0
votes
1
answer
What is the command you can use to write a require message?
asked
Sep 4, 2020
in
Git
#git-message
#require-messsage
0
votes
1
answer
What is GIT?
asked
Sep 4, 2020
in
Git
#what-is-git
#git
0
votes
1
answer
What is Git rebase?
asked
Sep 4, 2020
in
Git
#what-is-git-rebase
#git-rebase
#rebase-git
0
votes
1
answer
Describe Task branching strategy in Git.
asked
Sep 4, 2020
in
Git
#git-task-branching
0
votes
1
answer
Describe Feature branching strategy in Git.
asked
Sep 4, 2020
in
Git
#git-features
0
votes
1
answer
What are the benefits if using Git?
asked
Sep 4, 2020
in
Git
#git-benefits
0
votes
1
answer
What are the objectives of Git Design?
asked
Sep 4, 2020
in
Git
#git-design-objective
0
votes
1
answer
Define accidental threats
asked
Sep 2, 2020
in
Cyber Security
#accidental-threats
0
votes
1
answer
List out the types of cyber attackers
asked
Sep 2, 2020
in
Cyber Security
#cyber-attackers
0
votes
1
answer
Give examples of System-based attacks
asked
Sep 2, 2020
in
Cyber Security
#system-based-attacks
0
votes
1
answer
List out web-based attacks
asked
Sep 2, 2020
in
Cyber Security
#web-based-attacks
0
votes
1
answer
Can you please explain what are the types of cyber-attacks?
asked
Sep 2, 2020
in
Cyber Security
#cyber-attacks
0
votes
1
answer
Can you please explain what is the use of EtterPeak tool?
asked
Sep 2, 2020
in
Cyber Security
#etterpeak-tool
0
votes
1
answer
Can you please explain what is Nmap?
asked
Sep 2, 2020
in
Cyber Security
#what-is-nmap
#nmap
0
votes
1
answer
Define hybrid attacks.
asked
Sep 2, 2020
in
Cyber Security
#hybrid-attacks
0
votes
1
answer
Explain the sequence of a TCP connection.
asked
Sep 2, 2020
in
Cyber Security
#tcp-connection
0
votes
1
answer
Name common types of non-physical threats.
asked
Sep 2, 2020
in
Cyber Security
#non-physical-threats
0
votes
1
answer
Explain ARP Poisoning
asked
Sep 2, 2020
in
Cyber Security
#arp-poisoning
0
votes
1
answer
Define an access token.
asked
Sep 2, 2020
in
Cyber Security
#access-token
#what-is-access-token
0
votes
1
answer
List security vulnerabilities as per Open Web Application Security Project (OWASP).
asked
Sep 2, 2020
in
Cyber Security
#open-web-application-security-project
0
votes
1
answer
Define SQL Injection
asked
Sep 2, 2020
in
Cyber Security
#sql-injection
#sql-injection-code
0
votes
1
answer
Can you please explain what is Trojan virus?
asked
Sep 2, 2020
in
Cyber Security
#what-is-trojan-virus
#trojan-virus
0
votes
1
answer
Give examples of non-physical threats
asked
Sep 2, 2020
in
Cyber Security
#non-physical-threats
0
votes
1
answer
Can you please explain what are physical threats?
asked
Sep 2, 2020
in
Cyber Security
#physical-threats
#what-is-physical-threat
0
votes
1
answer
Explain security threat
asked
Sep 2, 2020
in
Cyber Security
#what-is-security-threat
#security-threat
0
votes
1
answer
Can you please explain what are the disadvantages of penetration testing?
asked
Sep 2, 2020
in
Cyber Security
#penetration-testing-disadvantages
Page:
« prev
1
...
80
81
82
83
84
85
86
87
88
89
90
...
148
next »
...