Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
User JackTerrance
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by JackTerrance
0
votes
Q: OData Stands for _________.
OData Stands for _________. A. Open Data B. Out Data C. Outer Data...
asked
Mar 2, 2023
in
Technology
sap-s4hana-fiori-overview
0
votes
Q: ___________ protocol is used for SAP Fiori factsheet search.
___________ protocol is used for SAP Fiori factsheet search. A. OData B. InA C. RFC...
asked
Mar 2, 2023
in
Technology
sap-s4hana-fiori-overview
0
votes
Q: The ________ gives access to frequently used apps and recent activities.
The ________ gives access to frequently used apps and recent activities. A. Me Area B. Workspace area C. Notification area...
asked
Mar 2, 2023
in
Technology
sap-s4hana-fiori-overview
0
votes
Q: SAP Fiori apps can be classified based on _____. 1. Line of Business 2. Industry 3. Roles
SAP Fiori apps can be classified based on _____. 1. Line of Business 2. Industry 3. Roles A. 1,2 B. 2,3 C. 1,2,3...
asked
Mar 2, 2023
in
Technology
sap-s4hana-fiori-overview-questions-answers
0
votes
Q: IBPS Bank PO General English Questions and Answers
Top 50+ IBPS Bank PO General English Questions and Answers...
asked
Mar 1, 2023
in
Education
ibps-bank-po-general-english_questions-answers
0
votes
Q: Full form of TTP is ____________.
Full form of TTP is ____________. A. Tactics, techniques and process B. Tactics, techniques and procedures C. Tactics, technology and process D. Tactics, technology and procedures...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following are the aspects of threat modeling?
Which of the following are the aspects of threat modeling? A. Killing the threats B. Understanding ... strategies E. Identify mitigation strategies Categorizing the threats...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: EDR stands for _______.
EDR stands for _______. A. End point Detection and Response B. End point Defect and Response C. End point Defense and detective D. Earlier defense and response...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following is an adaptation of the U.S. military’s kill chain process?
Which of the following is an adaptation of the U.S. military’s kill chain process? A. The Cyber Kill Chain ... The Diamond Model of intrusion analysis D. None of the options...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following is not a phase in hunting loop?
Which of the following is not a phase in hunting loop? A. Inform and enrich analytics B. Uncover new patterns and TTP’s C. Creating hypothesis D. Innovative approach...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following are threat modeling tools?
Which of the following are threat modeling tools? A. Securicor B. Irius Risk C. Threat Modeler D. All the Options...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: The process of designing a security specification and then eventually testing that specification is known as __________.
The process of designing a security specification and then eventually testing that specification is known as __________ ... hunting C. Threat intelligence D. Threat mitigation...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges.
In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges. A. True B. False...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: _______ includes the information relevant to protecting an organization from external and internal threats and also the processes, policies and tools designed to gather and analyze that information.
_______ includes the information relevant to protecting an organization from external and internal threats and also the processes ... C. Threat Intelligence D. None of the options...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: ______ is a proactive way of hunting attacks.
______ is a proactive way of hunting attacks. A. Cyber security B. Threat hunting C. Threat intelligence D. Threat modeling...
asked
Feb 27, 2023
in
Technology
thread-hunting-interview-questions-answers
0
votes
Q: Who developed hunting maturity model?
Who developed hunting maturity model? A. David Bianco, a infocyte’s security technologist B. David Bianco, ... D. David Bianco, a Vectra’s security technologist...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: Which of the following is a stage in Cyber Kill Chain?
Which of the following is a stage in Cyber Kill Chain? A. Reconnaissance B. Actions on Objectives C. Installation D. Delivery E. All the Options...
asked
Feb 27, 2023
in
Technology
threat-hunting-interview-questions-answers
0
votes
Q: _____________ is used for identification and prevention of cyber intrusions.
_____________ is used for identification and prevention of cyber intrusions. A. Hunting maturity model B. Cyber kill chain C. Hunting loop D. Hunting Matrix...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: Which of the following is the cyber threat intelligence model that have been widely used in the industry?
Which of the following is the cyber threat intelligence model that have been widely used in the industry? A. The Diamond Model ... Chain C. None of the options D. Both the options...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: Which threat hunting platform was acquired by Amazon Web Services?
Which threat hunting platform was acquired by Amazon Web Services? A. Maltego B. Exabeam C. Vectra D. Sqrrl...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: Which of the following are threat hunting techniques?
Which of the following are threat hunting techniques? A. Stack counting B. Clustering C. Grouping D. All the Options...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: Which of the following are threat hunting platforms?
Which of the following are threat hunting platforms? A. Sqrrl B. Infocyte C. Endgame Inc D. Vectra E. All the Options...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______.
Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______. A. $850000 B. $750000 C. $650000 D. $550000...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: Threat hunters use __________. A. Automated tools B. Manual methods C. Both the options D. None of the options
Threat hunters use __________. A. Automated tools B. Manual methods C. Both the options D. None of the options...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: Threat hunters will be able to offer a high degree of protection only if there is a _____________.
Threat hunters will be able to offer a high degree of protection only if there is a _____________. A. Moderate level of ... . Low level of visibility into networks D. None of these...
asked
Feb 26, 2023
in
Technology
threat-hunting-interview-question-answer
0
votes
Q: How often are process audits carried out?
How often are process audits carried out? A. Monthly B. With major releases B. Quarterly...
asked
Feb 26, 2023
in
Technology
ssa-interview-questions-answers
0
votes
Q: Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape.
Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape. A. True B. False...
asked
Feb 26, 2023
in
Technology
ssa-interview-questions-answers
0
votes
Q: What is the output of Governance Review?
What is the output of Governance Review? A. Vulnerability report B. SSA Maturity report C. Top strategic improvements D. Report with SWOT analysis...
asked
Feb 25, 2023
in
Technology
ssa-audits-interview-questions-answers
0
votes
Q: What is the output of Technical Review? A. Report with SWOT analysis B. SSA Maturity report
What is the output of Technical Review? A. Report with SWOT analysis B. SSA Maturity report C. Top strategic improvements D. Vulnerability report...
asked
Feb 25, 2023
in
Technology
ssa-interview-questions-answers
0
votes
Q: Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes?
Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes? ... Audits B. Process Maturity Review C. Technical Review...
asked
Feb 25, 2023
in
Technology
ssa-audits-interview-questions-answers
Page:
« prev
1
...
8
9
10
11
12
13
14
...
667
next »
...