Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Blogmepost Learn with us for better results!
0
votes
Q: Which privilege from the following is used to create a private synonym in another user's schema?
Which privilege from the following is used to create a private synonym in another user's schema? a. CREATE SYNONYM b. ... PUBLIC SYNONYM c. CREATE ANY SYNONYM d. None of the above...
answered
Mar 19
in
Technology
by
JackTerrance
oracle-interview-questions-answers
0
votes
Q: Indexes enhance the performance even if the table is updated frequently.
Indexes enhance the performance even if the table is updated frequently. a. TRUE b. FALSE...
answered
Mar 19
in
Technology
by
JackTerrance
oracle-interview-questions-answers
0
votes
Q: Rowid is the phycial address which the data is stored.
Rowid is the phycial address which the data is stored. a. FALSE b. TRUE...
answered
Mar 19
in
Technology
by
JackTerrance
oracle-interview-questions-answers
0
votes
Q: What will be the output of the below query, given an Employee table having 10 records?
What will be the output of the below query, given an Employee table having 10 records? What will be the output of the ... records b. Produce an error c. 100 records d. 0 records...
asked
Mar 19
in
Technology
by
JackTerrance
oracle-interview-questions-answers
0
votes
Q: Chef is written using
Chef is written using (a). None of the options (b). Erlang (c). Ruby (d). both the options...
answered
Mar 17
in
Technology
by
JackTerrance
chef-mimmas-interview-questions-answers
0
votes
Q: Which of the following requires manual configuration
Which of the following requires manual configuration (a).On-Premises chef (b).Hosted chef...
answered
Mar 17
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: Which tab in Chef server webUI has list of cookbooks uploaded
Which tab in Chef server webUI has list of cookbooks uploaded (a).Policy (b).Cookbooks (c).Bookshelf (d).Nodes...
answered
Mar 17
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: Which among the following act as a local repository for cookbookstt
Which among the following act as a local repository for cookbooks (a).Chef-Server (b).Nodes (c).Chef-supermarket (d).Workstation...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: Which among the following is a load balancer in chef server
Which among the following is a load balancer in chef server (a).Solr (b).Lucene (c).Ngnix (d).RabitMQ...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: Multiple users can access a single organization
Multiple users can access a single organization (a).False (b).True...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: In workstation chef is installed using _____ installer
In workstation chef is installed using _____ installer (a).Multibus (b).Onewaybus (c).all the options (d).Omnibus...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: After installing chefDK you can verify the installation using the command
After installing chefDK you can verify the installation using the command (a).None of the options (b).chef –version (c).both the options (d).chef verify...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: Which of the Following command will create knife.rb and client.rb file
Which of the Following command will create knife.rb and client.rb file (a).knife create (b).knife execute (c).knife configure (d).knife client...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: ______ helps in keeping the chef repo in sync with Git
______ helps in keeping the chef repo in sync with Git (a).Nodes (b).Chef-supermarket (c).Workstation (d).Chef-Server...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: A collection of resource forms a ________
A collection of resource forms a ________ (a).repository (b).cookbook (c).recipe...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: Which one of the following is not a knife command
Which one of the following is not a knife command (a). All of the options (b). Knife list (c). Knife open (d). Knife node...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimas-interview-questions-answers
0
votes
Q: To run a cookbook in local mode run chef-client with
To run a cookbook in local mode run chef-client with (a).-y (b).-z (c).-v (d).-x...
answered
Mar 15
in
Technology
by
JackTerrance
chef-memes-interview-questions-answers
0
votes
Q: Recipes will execute in based on priority
Recipes will execute in based on priority (a).True (b).False...
answered
Mar 15
in
Technology
by
JackTerrance
chef-mimes
0
votes
Q: In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.
In computer security _______ means that the information in a computer system only be accessible for reading by ... . integrity B. confidentiality C. authenticity D. availability...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-protocols-interview-questions-answers
0
votes
Q: Which of the following organizations is primarily concerned with military encryption systems?
Which of the following organizations is primarily concerned with military encryption systems? A. NIST B. NSA C. ITU D. IEEE...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-protocols-interview-questions-answers
0
votes
Q: ESP does not provide ________.
ESP does not provide ________. A. data integrity B. source authentication C. error control D. privacy...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-interview-questions-answers
0
votes
Q: In computer security _______ means that computer system assets can be modified only by authorized parities.
In computer security _______ means that computer system assets can be modified only by authorized parities. A. integrity B. confidentiality C. authenticity D. availability...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-protocals-itnerview-questions-answers
0
votes
Q: IPsec defines two protocols: _______ and ________.
IPsec defines two protocols: _______ and ________. A. PGP; ESP B. AH; SSL A. PGP; SSL B. AH; ESP...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-protocols-interview-questions-answers
0
votes
Q: IP Security operates in which layer of the OSI model?
IP Security operates in which layer of the OSI model? A. Transport B. Network C. Physical D. Application...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-protocals-interview-questions-answers
0
votes
Q: Which two types of IPsec can be used to secure communications between two LANs?
Which two types of IPsec can be used to secure communications between two LANs? A. ESP tunnel mode B. AH tunnel mode ... transport mode D. Both AH tunnel mode and ESP tunnel mode...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-interview-questions-answers
0
votes
Q: ______ provides authentication at the IP level.
______ provides authentication at the IP level. A. ESP B. AH C. SSL D. PGP...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-protocols-interview-questions-answers
0
votes
Q: Q.2 Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
Q.2 Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? A. ESP ... AH transport mode C. AH tunnel mode D. ESP tunnel mode...
answered
Mar 11
in
Technology
by
JackTerrance
ah-esp-protocals-interview-qeustions-answers
0
votes
Q: Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? A. SHA B. Kerberos V5 C. Both SHA and MD5 D. MD5...
answered
Mar 11
in
Technology
by
JackTerrance
ah-and-esp-protocols-interview-questions-answers
0
votes
Q: What is this code an example of?
What is this code an example of?
A. null element B. self-closing tag C. improperly named element D. incorrect XML syntax...
answered
Mar 9
in
Technology
by
JackTerrance
xml-linkedin-skill-assessment
0
votes
Q: Asynchronous Javascript and XML (Ajax) is technique for creating better, faster, and more interactive web applications.
Asynchronous Javascript and XML (Ajax) is technique for creating better, faster, and more interactive web applications. In addition to ... Perl, and C++ D. Java, ASP, and C#...
answered
Mar 9
in
Technology
by
JackTerrance
xml-likedin-skill-asssessment
To see more, click for the
full list of questions
or
popular tags
.
...