Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Quearn

Quearn Logo Quearn Logo

Quearn Navigation

  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Quearn Academy
  • About Us
  • Blog
  • Contact Us
Home/security

Quearn Latest Questions

VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 14, 2023In: Cyber Security

The replacement of a bad block generally is not totally automatic because ___________ a) data in bad block can not be replaced b) data in bad block is usually lost c) bad block does not contain any data d) none of the mentioned

  • 0

cyber ethicsecurity
  • 2 Answers
  • 172 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 14, 2023In: Cyber Security

What are the different ways to classify an IDS? a) Zone based b) Host & Network based c) Network & Zone based d) Level based

  • 0

cyber ethicitsecurity
  • 2 Answers
  • 53 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

A process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________ a) Local Procedure Call b) Inter Process Communication c) Remote Procedure Call d) Remote Machine Invocation

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 2 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

The remote method invocation __________ a) allows a process to invoke memory on a remote object b) allows a thread to invoke a method on a remote object c) allows a thread to invoke memory on a remote object d) allows a process to invoke a method on a remote object

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 1 View
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

What is the full form of RMI? a) Remote Memory Installation b) Remote Memory Invocation c) Remote Method Installation d) Remote Method Invocation

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 1 View
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

To resolve the problem of data representation on different systems RPCs define _____________ a) machine dependent representation of data b) machine representation of data c) machine-independent representation of data d) none of the mentioned

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 1 View
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

What is stub? a) transmits the message to the server where the server side stub receives the message and invokes procedure on the server side b) packs the parameters into a form transmittable over the network c) locates the port on the server d) all of the mentioned

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 1 View
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

RPC provides a(an) _____ on the client-side, a separate one for each remote procedure. a) stub b) identifier c) name d) process identifier

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 1 View
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

To differentiate the many network services a system supports ______ are used. a) Variables b) Sockets c) Ports d) Service names

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 1 View
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 10, 2023In: Cyber Security

Remote Procedure Calls are used ____________ a) for communication between two processes remotely different from each other on the same system b) for communication between two processes on the same system c) for communication between two processes on separate systems d) none of the mentioned

  • 0

cyber ethicitsecurity
  • 0 Answers
  • 1 View
Answer
Load More Questions

Sidebar

Ask A Question
  • Popular
  • Answers
  • imran

    Point out the wrong statement. A. The standard instances are ...

    • 282 Answers
  • imran

    Point out the correct statement. A. A volume is mounted ...

    • 259 Answers
  • VARISHA PARVEZ

    Which type of e‐commerce focuses on consumers dealing with ...

    • 181 Answers
  • monoshwinee
    monoshwinee added an answer A. indemnity June 9, 2023 at 6:45 pm
  • krati jain
    krati jain added an answer D. occupies only the size it needs and not the… June 9, 2023 at 6:44 pm
  • monoshwinee
    monoshwinee added an answer A. loss of profit June 9, 2023 at 6:44 pm

Top Members

gabbitidurga

gabbitidurga

  • 0 Questions
  • 0 Answers
Bhavitha27

Bhavitha27

  • 0 Questions
  • 0 Answers
Sayali

Sayali

  • 1 Question
  • 0 Answers

Trending Tags

account algorithm analytics answer c computer computer science python cs e commerce electric electronics it language mcq mechanical physics poll programming python question

Explore

  • Home
  • Quearn Academy
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help

Footer

Quearn

Quearn is a social questions & Answers Engine which will help you establish your community and connect with other people, Also you Can Earn Money.

About Us

  • Meet The Team
  • Blog
  • About Us
  • Contact Us

Legal Stuff

  • Terms of Use
  • Privacy Policy
  • Cookie Policy

Help

  • Knowledge Base
  • Support

Follow

© 2018-2023 Quearn®. All Rights Reserved | Developed by ASHAS Industries Proudly 🇮🇳