Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
A fully managed, serverless platform that runs containerized workloads — including web apps, micro-services, event-driven functions, or batch jobs — and can build container images from customers' source code.
The _____ control plane component in Code Engine is responsible for scaling the application.
140-2 is the ____ standard that IBM-managed encryption operates across virtual private cloud.
Account management services, classic infrastructure service and ____ are specific IBM cloud access permissions that can be granted.
Service Specific API Keys only have access to specific server instances?
Hyper Protect DBaaS for MongoDB provides workload isolation, restricted administrator access, and ____ protection for data at rest and in transit.
Within the encryption key lifecycle, a key moves into the _____ state on the expiration date, if one is assigned. In this state, the key is unable to cryptographically protect data and can be moved only to the destroyed state.
What is the process to create a VPC VSI boot volume for a hospital that requires an IBM Cloud supplied RHEL VSI deployed with all data encrypted in transit and at rest using keys managed with a dedicated key manager?
A client would like to expose Cloud Functions actions with the ability to apply security and rate limiting policies. What secure way can the client achieve this?
Using IAM, environments such as DEV, TEST, and PROD can be separated into custom resource groups to clearly ____ access for each group, and resources can be provisioned to those resource groups for access control.
Using the CLI images from an account, how can IBM Code Engine be accessed?
What is the process to create a VPC VSI boot volume for a financial services organization that requires a Kali Linux server to be deployed with all data encrypted in transit and at rest using keys they manage with a dedicated key manager?
IBM Key Protect is a full-service encryption solution that leverages FIPS 140-2 Level 3 certification, provides _____ access control to keys, and provides user monitoring and measurement of interactions with applications.
What option helps avoid network disruption during network maintenance when considering network options for IBM Cloud Bare Metal server port redundancy?
Identity and Access Management (IAM) is an option on IBM Cloud used by virtual private endpoint ____to manage access to the service's resources.
With_____, users connect to supported IBM Cloud services from a VPC network by using the IP addresses of choice, allocated from a subnet within the VPC.
With IBM Cloud Data Shield, users can protect data in containerized workloads that run on Kubernetes Service and _____ on IBM Cloud clusters while data is in use.
_______ automatically caches file extensions such as .png, .pdf, .jpg, and .doc
IBM is responsible for assigning subnets to specified ___ when a client is setting up IBM Cloud Direct Link for connectivity from an external source into their IBM Cloud private network.
IBM Cloud Hardware Security Module (HSM) provides secure key storage and cryptographic operations within a FIPS 140-2 Level 3 and has single-unit key storage, which means there is a central key management system that streamlines administration and reduces_____.
