Top 100+ questions in Technology

0 votes
    Chef is written using (a). None of the options (b). Erlang (c). Ruby (d). both the options...
asked Mar 17, 2023 in Technology by JackTerrance
0 votes
    Which of the following requires manual configuration (a).On-Premises chef (b).Hosted chef...
asked Mar 17, 2023 in Technology by JackTerrance
0 votes
    Which tab in Chef server webUI has list of cookbooks uploaded (a).Policy (b).Cookbooks (c).Bookshelf (d).Nodes...
asked Mar 17, 2023 in Technology by JackTerrance
0 votes
    Which among the following act as a local repository for cookbooks (a).Chef-Server (b).Nodes (c).Chef-supermarket (d).Workstation...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    Which among the following is a load balancer in chef server (a).Solr (b).Lucene (c).Ngnix (d).RabitMQ...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    Multiple users can access a single organization (a).False (b).True...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    In workstation chef is installed using _____ installer (a).Multibus (b).Onewaybus (c).all the options (d).Omnibus...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    After installing chefDK you can verify the installation using the command (a).None of the options (b).chef –version (c).both the options (d).chef verify...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    Which of the Following command will create knife.rb and client.rb file (a).knife create (b).knife execute (c).knife configure (d).knife client...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    ______ helps in keeping the chef repo in sync with Git (a).Nodes (b).Chef-supermarket (c).Workstation (d).Chef-Server...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    A collection of resource forms a ________ (a).repository (b).cookbook (c).recipe...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    Which one of the following is not a knife command (a). All of the options (b). Knife list (c). Knife open (d). Knife node...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    To run a cookbook in local mode run chef-client with (a).-y (b).-z (c).-v (d).-x...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    Recipes will execute in based on priority (a).True (b).False...
asked Mar 15, 2023 in Technology by JackTerrance
0 votes
    In computer security _______ means that the information in a computer system only be accessible for reading by ... . integrity B. confidentiality C. authenticity D. availability...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which of the following organizations is primarily concerned with military encryption systems? A. NIST B. NSA C. ITU D. IEEE...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    ESP does not provide ________. A. data integrity B. source authentication C. error control D. privacy...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    In computer security _______ means that computer system assets can be modified only by authorized parities. A. integrity B. confidentiality C. authenticity D. availability...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    IPsec defines two protocols: _______ and ________. A. PGP; ESP B. AH; SSL A. PGP; SSL B. AH; ESP...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    IP Security operates in which layer of the OSI model? A. Transport B. Network C. Physical D. Application...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which two types of IPsec can be used to secure communications between two LANs? A. ESP tunnel mode B. AH tunnel mode ... transport mode D. Both AH tunnel mode and ESP tunnel mode...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    ______ provides authentication at the IP level. A. ESP B. AH C. SSL D. PGP...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Q.2 Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? A. ESP ... AH transport mode C. AH tunnel mode D. ESP tunnel mode...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? A. SHA B. Kerberos V5 C. Both SHA and MD5 D. MD5...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    What is this code an example of? A. null element B. self-closing tag C. improperly named element D. incorrect XML syntax...
asked Mar 10, 2023 in Technology by JackTerrance
0 votes
    Asynchronous Javascript and XML (Ajax) is technique for creating better, faster, and more interactive web applications. In addition to ... Perl, and C++ D. Java, ASP, and C#...
asked Mar 10, 2023 in Technology by JackTerrance
0 votes
    When working with Ajax applications, which is faster, XML or JSON? A. XML, because it is extensible B. JSON, ... D. JSON, because it is already parsed into a JavaScript object...
asked Mar 10, 2023 in Technology by JackTerrance
0 votes
    You are converting your HTML file into XHTML Strict. Which code snippet will validate without errors? asked Mar 10, 2023 in Technology by JackTerrance
0 votes
    You are working with the following XSD fragment. What does it say about the element? element has child elements which can appear in any order...
asked Mar 10, 2023 in Technology by JackTerrance
0 votes
    You are working with this XML code snippet from the XML document cars.xml. You need to return the information about the cars ... D.doc("cars.xml")/cars/car[integer(year) > 2000]...
asked Mar 10, 2023 in Technology by JackTerrance
...