Login
Remember
Register
User SakshiSharma
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by SakshiSharma
0
votes
1
answer
What disruptive service, now available to everyone, was initially created to run and manage Amazon.com?
asked
Feb 19, 2022
in
Digital for Industries
disruptive-searvice
0
votes
1
answer
The category of Machine Learning/AI algorithms used to detect insurance fraud is called?
asked
Feb 19, 2022
in
Digital for Industries
ai-algoritthm
0
votes
1
answer
The technology that allows companies to place ads on somebody else’s website using cookies is called?
asked
Feb 19, 2022
in
Digital for Industries
website-cookie
0
votes
1
answer
Which technology is transforming financial advisory services using Chatbots and Natural Language Processing?
asked
Feb 19, 2022
in
Digital for Industries
chatbots
natural-language-process
0
votes
1
answer
Who founded PayPal?
asked
Feb 19, 2022
in
Digital for Industries
paypal-founder
0
votes
1
answer
3D printing is the popular consumer name for which accurate industry terminology?
asked
Feb 19, 2022
in
Digital for Industries
3d-printing
0
votes
1
answer
Overlaying Digital Information virtually in a physical world is called ___________.
asked
Feb 19, 2022
in
Digital for Industries
digital-information
virtual-information
0
votes
1
answer
Which of the following is a component of cyber security?
asked
Feb 19, 2022
in
Cyber Security
cyber-security-component
0
votes
1
answer
Which of the following is not a type of scanning?
asked
Feb 19, 2022
in
Cyber Security
scanning
0
votes
1
answer
Which of the following is not a cybercrime?
asked
Feb 19, 2022
in
Cyber Security
cyber-crime
0
votes
1
answer
In ethical hacking and cyber security, there are _______ types of scanning:
asked
Feb 19, 2022
in
Cyber Security
ethical-hacking
0
votes
1
answer
Which of the following is an objective of network security?
asked
Feb 19, 2022
in
Cyber Security
network-security
0
votes
1
answer
Which of the following port and IP address scanner famous among the users?
asked
Feb 19, 2022
in
Cyber Security
ip-scanner
ip-address-scan
0
votes
1
answer
What are the features of cyber security?
asked
Feb 19, 2022
in
Cyber Security
cyber-security-features
0
votes
1
answer
Client-side scripts can be allowed to execute in the browsers for needed operations.
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
client-side-script
0
votes
1
answer
Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
script-execution
0
votes
1
answer
Which of the following are most likely to result in insecure cryptography?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
insecure-cryptography
0
votes
1
answer
What is an attack that exploits the trust a site has in a user’s browser?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
user-browser
0
votes
1
answer
Role-based access control helps prevent which OWASP Top 10 vulnerability?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
owasp
access-control
0
votes
1
answer
What happens when an application takes user inputted data and sends it to a web browser, without proper validation?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
input-data
web
browser
0
votes
1
answer
What is an attack that forces a user’s session credential or session ID to an explicit value?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
session-id
user-credential
0
votes
1
answer
Which of the following languages are the primary targets of cross-site scripting?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
cross-site-scripting
+1
vote
1
answer
What are the Utility programs in JCL?
asked
Jan 9, 2022
in
JCL
utility-program
+1
vote
1
answer
Which statement is used to identify the private libraries in JOB?
asked
Jan 9, 2022
in
JCL
private-libraries
+1
vote
1
answer
Which utility is used to run a COBOL-DB2 Program?
asked
Jan 9, 2022
in
JCL
cobol-db2
+1
vote
1
answer
Explain the hierarchy levels in JCL?
asked
Jan 9, 2022
in
JCL
jcl-hierarchy
+1
vote
1
answer
What is the use of symbol // in JCL?
asked
Jan 9, 2022
in
JCL
jcl-symbol
+1
vote
1
answer
Differentiate between the JOBLIB and the STEPLIB statements?
asked
Jan 9, 2022
in
JCL
joblib
steplib
+1
vote
1
answer
Why include statement is used in a JCL?
asked
Jan 9, 2022
in
JCL
include-statement
+1
vote
1
answer
What are some JCL statements that are not allowed in procedures?
asked
Jan 9, 2022
in
JCL
jcl-statement
Page:
« prev
1
...
51
52
53
54
55
56
57
58
59
60
61
...
221
next »
...