Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Top 100+ questions in Technology
Home
Questions
Technology
0
votes
Q: Scala is a pure functional programming language
Scala is a pure functional programming language 1. True 2. False...
asked
Mar 7, 2023
in
Technology
by
JackTerrance
scala-contruct-interview-questions-answers
0
votes
Q: Functional programming language cannot be an object oriented language too
Functional programming language cannot be an object oriented language too 1. True 2. False...
asked
Mar 7, 2023
in
Technology
by
JackTerrance
scala-contruct-mcqs
0
votes
Q: Which of the following are the key concepts of Functional Programming
Which of the following are the key concepts of Functional Programming a. Immutability b. Pure functions c. Inheritance d. Referential Transparency...
asked
Mar 7, 2023
in
Technology
by
JackTerrance
scala-construct-interview-questions-answers
0
votes
Q: var dataset = [ 5, 10, 15, 20, 25 ]; What will be output of d3.extent(data)? -
var dataset = [ 5, 10, 15, 20, 25 ]; What will be output of d3.extent(data)? -...
asked
Mar 7, 2023
in
Technology
by
JackTerrance
d3js-interview-questions-answers
0
votes
Q: Which of the following attribute is being used to put the pen down at (10,25) in SVG?
Which of the following attribute is being used to put the pen down at (10,25) in SVG?...
asked
Mar 7, 2023
in
Technology
by
JackTerrance
d3js-interview-questions-answers
0
votes
Q: Which is not a slider available in d3.js?
Which is not a slider available in d3.js?...
asked
Mar 7, 2023
in
Technology
by
JackTerrance
d3js-interview-questions-answers
0
votes
Q: _______is the syntax to read JSON data?
_______is the syntax to read JSON data?...
asked
Mar 4, 2023
in
Technology
by
JackTerrance
d3js-interview-questions-answers
0
votes
Q: What does SVG stand for?
What does SVG stand for?...
asked
Mar 4, 2023
in
Technology
by
JackTerrance
d3js-interview-questions-answers
0
votes
Q: D3 is developed by ________ ?
D3 is developed by ________ ?...
asked
Mar 4, 2023
in
Technology
by
JackTerrance
d3js-interview-questions-answers
0
votes
Q: What is the full form on D3?
What is the full form on D3?...
asked
Mar 4, 2023
in
Technology
by
JackTerrance
d3js-mcq-solution
0
votes
Q: The _________ allows user to navigate between apps.
The _________ allows user to navigate between apps. A. Workspace area B. Me Area C. Notification area...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: IDE stands for ______ A. Integrated Design Environment B. Integrated Development Environment C. Internal Development Environment
IDE stands for ______ A. Integrated Design Environment B. Integrated Development Environment C. Internal Development Environment...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: ________ deployment option is recommended for the SAP front-end server in a productive system landscape.
________ deployment option is recommended for the SAP front-end server in a productive system landscape. A. SAP Cloud ... B. Embedded deployment C. Hub deployment D. Standalone...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: Business processes are represented as _______ in Fiori launchpad. A. Joints B. Tiles C. Groups
Business processes are represented as _______ in Fiori launchpad. A. Joints B. Tiles C. Groups...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: List of all available Fiori apps can be explored via _________.
List of all available Fiori apps can be explored via _________. A. SAP Fiori apps library B. SAP Fiori apps list C. SAP Fiori apps engine...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: OpenUI5 comes under the Apache 2.0 license.
OpenUI5 comes under the Apache 2.0 license. A. True B. False...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: OData Stands for _________.
OData Stands for _________. A. Open Data B. Out Data C. Outer Data...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: ___________ protocol is used for SAP Fiori factsheet search.
___________ protocol is used for SAP Fiori factsheet search. A. OData B. InA C. RFC...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: The ________ gives access to frequently used apps and recent activities.
The ________ gives access to frequently used apps and recent activities. A. Me Area B. Workspace area C. Notification area...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview
0
votes
Q: SAP Fiori apps can be classified based on _____. 1. Line of Business 2. Industry 3. Roles
SAP Fiori apps can be classified based on _____. 1. Line of Business 2. Industry 3. Roles A. 1,2 B. 2,3 C. 1,2,3...
asked
Mar 2, 2023
in
Technology
by
JackTerrance
sap-s4hana-fiori-overview-questions-answers
0
votes
Q: Full form of TTP is ____________.
Full form of TTP is ____________. A. Tactics, techniques and process B. Tactics, techniques and procedures C. Tactics, technology and process D. Tactics, technology and procedures...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following are the aspects of threat modeling?
Which of the following are the aspects of threat modeling? A. Killing the threats B. Understanding ... strategies E. Identify mitigation strategies Categorizing the threats...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: EDR stands for _______.
EDR stands for _______. A. End point Detection and Response B. End point Defect and Response C. End point Defense and detective D. Earlier defense and response...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following is an adaptation of the U.S. military’s kill chain process?
Which of the following is an adaptation of the U.S. military’s kill chain process? A. The Cyber Kill Chain ... The Diamond Model of intrusion analysis D. None of the options...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following is not a phase in hunting loop?
Which of the following is not a phase in hunting loop? A. Inform and enrich analytics B. Uncover new patterns and TTP’s C. Creating hypothesis D. Innovative approach...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following are threat modeling tools?
Which of the following are threat modeling tools? A. Securicor B. Irius Risk C. Threat Modeler D. All the Options...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: The process of designing a security specification and then eventually testing that specification is known as __________.
The process of designing a security specification and then eventually testing that specification is known as __________ ... hunting C. Threat intelligence D. Threat mitigation...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges.
In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges. A. True B. False...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: _______ includes the information relevant to protecting an organization from external and internal threats and also the processes, policies and tools designed to gather and analyze that information.
_______ includes the information relevant to protecting an organization from external and internal threats and also the processes ... C. Threat Intelligence D. None of the options...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: ______ is a proactive way of hunting attacks.
______ is a proactive way of hunting attacks. A. Cyber security B. Threat hunting C. Threat intelligence D. Threat modeling...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
thread-hunting-interview-questions-answers
Page:
« prev
1
...
7
8
9
10
11
12
13
...
199
next »
...