Login
Remember
Register
User john ganales
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by john ganales
0
votes
______ is the dependancy of an external appllication.
answered
Oct 29, 2021
in
Cloud Foundry
cloud-external-applications
0
votes
The location where the applications are deployed is known as ______.
answered
Oct 29, 2021
in
Cloud Foundry
cloud-deployment
0
votes
Command to login to Cloud Foundry is _____.
answered
Oct 28, 2021
in
Cloud Foundry
login-cloud-foundry
0
votes
Services that are selected from the marketplace catalog are known as ______.
answered
Oct 28, 2021
in
Cloud Foundry
marketplace-catalog
0
votes
Default space for PWS is____.
answered
Oct 28, 2021
in
Cloud Foundry
pws-space
0
votes
Which of the following command is used to deploy an application to Cloud Foundry?
answered
Oct 28, 2021
in
Cloud Foundry
foundry-application
0
votes
App Direct is ______________ provider of services.
answered
Oct 28, 2021
in
Cloud Foundry
app-direct
0
votes
Select the responsibilities of a Service Broker.
answered
Oct 28, 2021
in
Cloud Foundry
service-broker
0
votes
_____________ allows CF to support multiple language and development environments.
answered
Oct 28, 2021
in
Cloud Foundry
cf-support
0
votes
Which of the following command lists all the applications within a space?
answered
Oct 28, 2021
in
Cloud Foundry
applications-cloud
0
votes
______ is a blob of metadata or a file containing metadata of a group of accompanying files.
answered
Oct 28, 2021
in
Cloud Foundry
blob-metadata
0
votes
Which of the following option is used to specify push timeout in seconds?
answered
Oct 28, 2021
in
Cloud Foundry
cloud-timeout
0
votes
_________________ allows cloud controller to locate instances on separate zones to boost redundancy.
answered
Oct 28, 2021
in
Cloud Foundry
cloud-foundry
0
votes
What is the command to check the version?
answered
Oct 28, 2021
in
Cloud Foundry
cloud-foundry-version
0
votes
What is the definition for Firewall?
answered
Oct 23, 2021
in
Cyber Security
firewall
0
votes
What is Port Scanning
answered
Oct 23, 2021
in
Cyber Security
port-scanning
0
votes
Passive attacks are considered a threat to _______.
answered
Oct 23, 2021
in
Cyber Security
passive-attacks
0
votes
__________ is a proactive process to predict potential risks efficiently.
answered
Oct 23, 2021
in
Cyber Security
proactive-process
0
votes
A ________ is a credit card sized card with an embedded chip, containing information about the user
answered
Oct 23, 2021
in
Cyber Security
user-information
0
votes
As an email client, we should not use caution when opening emails and can download any
answered
Oct 23, 2021
in
Cyber Security
download-attachment
Page:
« prev
1
...
96
97
98
99
100
101
102
103
104
105
106
...
143
next »
...