Blogmepost Learn with us for better results!

0 votes
    Which privilege from the following is used to create a private synonym in another user's schema? a. CREATE SYNONYM b. ... PUBLIC SYNONYM c. CREATE ANY SYNONYM d. None of the above...
Mar 19 in Technology by JackTerrance
0 votes
    Indexes enhance the performance even if the table is updated frequently. a. TRUE b. FALSE...
Mar 19 in Technology by JackTerrance
0 votes
    Rowid is the phycial address which the data is stored. a. FALSE b. TRUE...
Mar 19 in Technology by JackTerrance
0 votes
    What will be the output of the below query, given an Employee table having 10 records? What will be the output of the ... records b. Produce an error c. 100 records d. 0 records...
asked Mar 19 in Technology by JackTerrance
0 votes
    Chef is written using (a). None of the options (b). Erlang (c). Ruby (d). both the options...
Mar 17 in Technology by JackTerrance
0 votes
    Which of the following requires manual configuration (a).On-Premises chef (b).Hosted chef...
Mar 17 in Technology by JackTerrance
0 votes
    Which tab in Chef server webUI has list of cookbooks uploaded (a).Policy (b).Cookbooks (c).Bookshelf (d).Nodes...
Mar 17 in Technology by JackTerrance
0 votes
    Which among the following act as a local repository for cookbooks (a).Chef-Server (b).Nodes (c).Chef-supermarket (d).Workstation...
Mar 15 in Technology by JackTerrance
0 votes
    Which among the following is a load balancer in chef server (a).Solr (b).Lucene (c).Ngnix (d).RabitMQ...
Mar 15 in Technology by JackTerrance
0 votes
    Multiple users can access a single organization (a).False (b).True...
Mar 15 in Technology by JackTerrance
0 votes
    In workstation chef is installed using _____ installer (a).Multibus (b).Onewaybus (c).all the options (d).Omnibus...
Mar 15 in Technology by JackTerrance
0 votes
    After installing chefDK you can verify the installation using the command (a).None of the options (b).chef –version (c).both the options (d).chef verify...
Mar 15 in Technology by JackTerrance
0 votes
    Which of the Following command will create knife.rb and client.rb file (a).knife create (b).knife execute (c).knife configure (d).knife client...
Mar 15 in Technology by JackTerrance
0 votes
    ______ helps in keeping the chef repo in sync with Git (a).Nodes (b).Chef-supermarket (c).Workstation (d).Chef-Server...
Mar 15 in Technology by JackTerrance
0 votes
    A collection of resource forms a ________ (a).repository (b).cookbook (c).recipe...
Mar 15 in Technology by JackTerrance
0 votes
    Which one of the following is not a knife command (a). All of the options (b). Knife list (c). Knife open (d). Knife node...
Mar 15 in Technology by JackTerrance
0 votes
    To run a cookbook in local mode run chef-client with (a).-y (b).-z (c).-v (d).-x...
Mar 15 in Technology by JackTerrance
0 votes
    Recipes will execute in based on priority (a).True (b).False...
Mar 15 in Technology by JackTerrance
0 votes
    In computer security _______ means that the information in a computer system only be accessible for reading by ... . integrity B. confidentiality C. authenticity D. availability...
Mar 11 in Technology by JackTerrance
0 votes
    Which of the following organizations is primarily concerned with military encryption systems? A. NIST B. NSA C. ITU D. IEEE...
Mar 11 in Technology by JackTerrance
0 votes
    ESP does not provide ________. A. data integrity B. source authentication C. error control D. privacy...
Mar 11 in Technology by JackTerrance
0 votes
    In computer security _______ means that computer system assets can be modified only by authorized parities. A. integrity B. confidentiality C. authenticity D. availability...
Mar 11 in Technology by JackTerrance
0 votes
    IPsec defines two protocols: _______ and ________. A. PGP; ESP B. AH; SSL A. PGP; SSL B. AH; ESP...
Mar 11 in Technology by JackTerrance
0 votes
    IP Security operates in which layer of the OSI model? A. Transport B. Network C. Physical D. Application...
Mar 11 in Technology by JackTerrance
0 votes
    Which two types of IPsec can be used to secure communications between two LANs? A. ESP tunnel mode B. AH tunnel mode ... transport mode D. Both AH tunnel mode and ESP tunnel mode...
Mar 11 in Technology by JackTerrance
0 votes
    ______ provides authentication at the IP level. A. ESP B. AH C. SSL D. PGP...
Mar 11 in Technology by JackTerrance
0 votes
    Q.2 Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? A. ESP ... AH transport mode C. AH tunnel mode D. ESP tunnel mode...
Mar 11 in Technology by JackTerrance
0 votes
    Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? A. SHA B. Kerberos V5 C. Both SHA and MD5 D. MD5...
Mar 11 in Technology by JackTerrance
0 votes
    What is this code an example of? A. null element B. self-closing tag C. improperly named element D. incorrect XML syntax...
Mar 9 in Technology by JackTerrance
0 votes
    Asynchronous Javascript and XML (Ajax) is technique for creating better, faster, and more interactive web applications. In addition to ... Perl, and C++ D. Java, ASP, and C#...
Mar 9 in Technology by JackTerrance
To see more, click for the full list of questions or popular tags.
...