Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
How can you increase the security policy limit for the Identity and Access Management (IAM) in IBM Cloud?
When inviting more than one user to an IBM Cloud account using a single invitation, how can you assign access?
Which IBM Cloud service enables bringing encryption keys to protect business data against threats from tampering and unauthorized access?
Developers typically follow industry recommendations such as Open Web Application Security Project (OWASP), technology-specific security guidance, or both. Which service provides key application security capabilities in IBM Cloud?
How can one detect and address potential security vulnerabilities for a cloud native application on IBM Cloud?
What IBM Key Protect Service feature can mitigate the inappropriate deletion of a root key?
What is enabled to help avoid network disruption during network maintenance when considering network options for an IBM Cloud Bare Metal server port .
The firewall rules apply only to ----- when using Hardware Firewall for IBM BMS
Shift left is a best practice that allows the _____ team to identify security risks and exposures early and ensure that these security threats are addressed.
Who has the responsibility to detect and mitigate incoming threats to ensure continuous security of customer and application data?
A company has applications hosted on IBM Cloud for VMware Solutions. The company is looking for a solution to secure credit card transactions and help to evaluate risks, identify cyber threats and vulnerabilities, and ensure compliance through automation. What is the recommended solution?
A team wants to gather an external container image to be used in their application architecture. The architect asks "Is the container image signed and from trusted sources? and "How are known vulnerabilities identified and tracked?" These questions should help the architect best know how to ____.
Container registry API Keys are deleted when the ----- is deleted
All data stored on ----- are automatically encrypted, providing at-rest and in-flight data protection.
A client has a security policy involving Red (DMZ), Yellow (MZ), and Blue (Management) zones. Data encryption in transit is needed for communication between the zones. An architect suggests creating three VPCs for Red, Yellow, and Blue Zones along with a ____ to communicate between the three VPC workloads.
What are some protection(s) are provided by cloud internet services?
Service Endpoints for IBM Cloud Databases are only available in which IBM Cloud regions?
Visibility is a DevSecOps best practice that measures the heartbeat of the operation, sends alerts, and ______.
IBM Cloud Internet Services helps clients secure their web content and internet applications before they reach the cloud and avoid ____ attacks.
For all federation options, users connect an IBMid or an IBM Cloud App instance with their identity provider via a ___.
