Most viewed questions

0 votes
    Which of the following is considered as the world's first antivirus program? Creeper Reaper Tinkered Ray Tomlinson...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to ... Detection and prevention of deployment of malicious exploitables...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    Which of the following element allows you to create and manage virtual machines that serve either in a Web role and a ... Compute 2) Application 3) Storage 4) None of the mentioned...
asked Dec 23, 2020 by JackTerrance
0 votes
    Endpoint security solutions provide a decentralized solution to protect endpoints. 1. False 2. True...
asked Oct 24, 2020 by JackTerrance
0 votes
    _________ approach aims to include security in each phase of the development cycle. 1. Shift Left security 2. Continuous Security 3. Shift Right Security 4.Consistent Security...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    Automatic Reasoning tool is used in_____. Personal Computers Microcomputers LISP Machines All of the above...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    Which of the following plugin in Bootstrap is used to create a modal window? popup alert modal window...
asked Feb 28, 2021 in Technology by JackTerrance
0 votes
    It is safest to test ransomware by using one-at-a-time approach. False True...
asked Oct 25, 2020 in Technology by JackTerrance
+1 vote
    Which of the following services allow creation and management of virtual machines that serve either in a Web role and a Worker role?...
asked Oct 20, 2020 in Technology by JackTerrance
0 votes
    Select the 3 graphics files from the list below Choose all of the correct answers (multiple possibilities). Untitled ... jpg Unulled of Select the correct answer from above options...
asked Nov 29, 2021 in Education by JackTerrance
0 votes
    Which method of the Class.class is used to determine the name of a class represented by the class ... stackoverflow.com 🔗Source: Java Interview Questions and Answers...
asked Dec 19, 2020 in Technology by Editorial Staff
0 votes
    In which search problem, to find the shortest path, each city must be visited once only? Map coloring ... path between a source and a destination Travelling Salesman problem...
asked Mar 8, 2021 in Technology by JackTerrance
0 votes
    The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:...
asked Nov 29, 2020 in Technology by Editorial Staff
0 votes
    What is the output for the following code (function f(){ function f(){ return 1; } return f(); function f() { return 2; } })(); a) NaN b) 1 c) 2 d) Error...
asked Oct 9, 2020 in Technology by JackTerrance
0 votes
    Marionette is the former name of ___________ 1. Chef 2. CloudFormation 3. Ansible 4. Puppet...
asked Sep 18, 2021 in Technology by JackTerrance
0 votes
    Testing can readily be done in production environment. False True...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    Which one of the following is actually considered as the first computer virus? Sasser Blaster Creeper Both A and C...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    What is the output of L[2] if L = [1,2,3]?...
asked Nov 26, 2020 in Technology by JackTerrance
0 votes
    In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ Application layer Transport layer Link layer Session layer...
asked Jan 10, 2021 in Technology by JackTerrance
0 votes
    Which one of the following principles of cyber security refers that the security mechanism must be as small and ... Economy of the Mechanism Least privilege Fail-safe Defaults...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?...
asked Mar 1, 2021 in Education by Editorial Staff
0 votes
    Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit? Reliability Performance Security Longevity...
asked Mar 6, 2021 in Technology by JackTerrance
0 votes
    What is the HTML tag under which one can write the JavaScript code? A) B) C)
    Which of the following layers is an addition to OSI model when compared with TCP IP model? Application layer Presentation layer Session layer Session and Presentation layer...
asked Jan 10, 2021 in Technology by JackTerrance
0 votes
    B-tree of order n is a order-n multiway tree in which each non-root node contains __________ a) at most (n – 1)/2 keys ... ) at least 2n keys d) at least (n – 1)/2 keys...
asked Dec 23, 2020 in Technology by JackTerrance
0 votes
    An attack technique that forces a user’s session credential or session ID to an explicit value 1. Brute Force Attack 2. Session Hijacking 3. Session Fixation...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    Which statement is true Pair Work in the scaled Agile Framework?...
asked Nov 30, 2020 in Technology by Editorial Staff
0 votes
    Which of the following is an example of Changing Operating Model? (1)Enterprise Transformation (2)Management Transformation (3)IT Transformation (4)Business Process Transformation...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    In SAST, during which phases are the software artifacts analyzed to uncover vulnerabilities? 1. Testing and deployment 2. ... testing 3. Al the phases 4. Analysis and coding...
asked Oct 28, 2020 in Technology by JackTerrance
...