Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Top 100+ questions in Technology
Home
Questions
Technology
0
votes
Q: Who developed hunting maturity model?
Who developed hunting maturity model? A. David Bianco, a infocyte’s security technologist B. David Bianco, ... D. David Bianco, a Vectra’s security technologist...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following is a stage in Cyber Kill Chain?
Which of the following is a stage in Cyber Kill Chain? A. Reconnaissance B. Actions on Objectives C. Installation D. Delivery E. All the Options...
asked
Feb 27, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-questions-answers
0
votes
Q: Cognizant Bulk Hiring Freshers and Experienced | CTC 5 to 15 LPA | Apply Now
Cognizant Bulk Hiring Freshers and Experienced 2023| CTC 5 to 15 LPA | Apply Now...
asked
Feb 27, 2023
in
Technology
by
Editorial Staff
cognizant
bulk
hiring
freshers
and
experienced
ctc
5
to
15
lpa
apply
now
0
votes
Q: _____________ is used for identification and prevention of cyber intrusions.
_____________ is used for identification and prevention of cyber intrusions. A. Hunting maturity model B. Cyber kill chain C. Hunting loop D. Hunting Matrix...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: Which of the following is the cyber threat intelligence model that have been widely used in the industry?
Which of the following is the cyber threat intelligence model that have been widely used in the industry? A. The Diamond Model ... Chain C. None of the options D. Both the options...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: Which threat hunting platform was acquired by Amazon Web Services?
Which threat hunting platform was acquired by Amazon Web Services? A. Maltego B. Exabeam C. Vectra D. Sqrrl...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: Which of the following are threat hunting techniques?
Which of the following are threat hunting techniques? A. Stack counting B. Clustering C. Grouping D. All the Options...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: Which of the following are threat hunting platforms?
Which of the following are threat hunting platforms? A. Sqrrl B. Infocyte C. Endgame Inc D. Vectra E. All the Options...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______.
Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______. A. $850000 B. $750000 C. $650000 D. $550000...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: Threat hunters use __________. A. Automated tools B. Manual methods C. Both the options D. None of the options
Threat hunters use __________. A. Automated tools B. Manual methods C. Both the options D. None of the options...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: Threat hunters will be able to offer a high degree of protection only if there is a _____________.
Threat hunters will be able to offer a high degree of protection only if there is a _____________. A. Moderate level of ... . Low level of visibility into networks D. None of these...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
threat-hunting-interview-question-answer
0
votes
Q: How often are process audits carried out?
How often are process audits carried out? A. Monthly B. With major releases B. Quarterly...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
ssa-interview-questions-answers
0
votes
Q: Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape.
Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape. A. True B. False...
asked
Feb 26, 2023
in
Technology
by
JackTerrance
ssa-interview-questions-answers
0
votes
Q: What is the output of Governance Review?
What is the output of Governance Review? A. Vulnerability report B. SSA Maturity report C. Top strategic improvements D. Report with SWOT analysis...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits-interview-questions-answers
0
votes
Q: What is the output of Technical Review? A. Report with SWOT analysis B. SSA Maturity report
What is the output of Technical Review? A. Report with SWOT analysis B. SSA Maturity report C. Top strategic improvements D. Vulnerability report...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-interview-questions-answers
0
votes
Q: Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes?
Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes? ... Audits B. Process Maturity Review C. Technical Review...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits-interview-questions-answers
0
votes
Q: Which of the following approaches are adopted during Governance Review?
Which of the following approaches are adopted during Governance Review? A. Question and Answer B. Data Analysis C. Subjective Judgement D. All of these...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits-interview-questions-answers
0
votes
Q: How often are Process Maturity Reviews conducted?
How often are Process Maturity Reviews conducted? A. With major releases B. Half Yearly...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits-interview-questions-answers
0
votes
Q: The safeguards that are integrated throughout the delivery lifecycle by SSA, making solutions and services reliable, resilient, and immune to attacks and failures are _________.
The safeguards that are integrated throughout the delivery lifecycle by SSA, making solutions and services ... Privacy, Reliability D. Confidentiality, Integrity, Availability...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits-interview-questions-answers
0
votes
Q: Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy, and reliability requirements?
Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy ... Maturity Review B. Process Audits C. Technical Review...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-interview-questions-answers
0
votes
Q: Which of the following properties aim to generate a trail to identify the source and path of attack?
Which of the following properties aim to generate a trail to identify the source and path of attack? A. Repudiation B. Resilience C. Traceability D. Accountability...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits_interview-questions-answers
0
votes
Q: Which of the following is a highly data-oriented review that provides independent inputs on SSA strategies?
Which of the following is a highly data-oriented review that provides independent inputs on SSA strategies? A. Process ... . Technical Review C. Process Audits D. Governance Review...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits-inerview-questions-answers
0
votes
Q: Which of the following approaches generates a report with SWOT analysis?
Which of the following approaches generates a report with SWOT analysis? A. Technical Review B. Process Audit C. Process Maturity Review...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-audits-interview-questions-answers
0
votes
Q: A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc.
A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc. A. Flows B. Contracts C. Transactions D. Cordapps...
asked
Feb 23, 2023
in
Technology
by
JackTerrance
r3-corda-interview-questions-answers
0
votes
Q: ___________ is the core business logic on which CorDapps run.
___________ is the core business logic on which CorDapps run. A. Transaction B. Contract C. Legal prose D. Flow framework...
asked
Feb 23, 2023
in
Technology
by
JackTerrance
r3-corda-interview-questions-answers
0
votes
Q: Communication between nodes occur in the context of flows, and is point to point.
Communication between nodes occur in the context of flows, and is point to point. A. True B. False...
asked
Feb 23, 2023
in
Technology
by
JackTerrance
r3-corda-interview-questions-answers
0
votes
Q: ________ are a set of rules that determine the execution of a transaction.
________ are a set of rules that determine the execution of a transaction. A. Program B. Instruction C. Tables D. Contracts...
asked
Feb 23, 2023
in
Technology
by
JackTerrance
r3-corda-interview-questions-answers
0
votes
Q: _______ include data shared between two more or more nodes in a network.
_______ include data shared between two more or more nodes in a network. A. Data B. Messages C. Shared fact D. Contracts...
asked
Feb 23, 2023
in
Technology
by
JackTerrance
r3-corda-interview-questions-answers
0
votes
Q: __________ is a distributed ledger technology where data is stored in the form of blocks.
__________ is a distributed ledger technology where data is stored in the form of blocks. A. Blockchain B. Database C. Cryptocurrency D. Contracts...
asked
Feb 23, 2023
in
Technology
by
JackTerrance
r3-corda-interview-questions-answers
0
votes
Q: R3 Corda is a private, permissioned blockchain.
R3 Corda is a private, permissioned blockchain. A. True B. False...
asked
Feb 23, 2023
in
Technology
by
JackTerrance
r3-corda-questions-answers
Page:
« prev
1
...
8
9
10
11
12
13
14
...
199
next »
...