Edited, memorised or added to reading list

on 17-Jun-2019 (Mon)

Do you want BuboFlash to help you learning these things? Click here to log in or create user.

Flashcard 4009036221708

Question

In terraform, for map keys, fill out occulsion below to show how you would treat a map key that is a non-literal expression, specifically the map key is the value of input variable "business_unit_tag_name":

{

[...] = "SRE"

}

Answer

(var.business_unit_tag_name)

^^^ note how the non-literal map key is enclosed in brackets!!


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4009118010636

Question

In terrafrom, say you have already run "terraform apply" but still want to see the value of output variable "ip" (which is say the public ip of your newly-created AWS Elastic IP resource), you can do so via following command:

terraform [...] [...]

Answer
terraform output ip

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Hanyu Shuiping Kaoshi (HSK, 汉语水平考试) is China’s national standardized test designed to assess the Chinese language proficiency of non-native speakers such as foreign students and overseas Chinese. This chapter opens with a brief account of the history and development of HSK over the past thirty years (1984–the present): How it ca
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4139596778764

Question
proficient test; it has expanded from a test with a focus on assessment of linguistic knowledge to a
Answer
[default - edit me]

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4139597827340

Question
[default - edit me]
Answer
language

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







WHO said it could not be done? And what great victories has he to his credit which qualify him to judge others accurately? – Napoleon Hill
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Fortunate is the young man or young woman who learns, early in life, to use imagination, and doubly so in this age of greater opportunity
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Imagination is a faculty of the mind which can be cultivated, developed, extended and broadened by use.
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




teoría del diseño del trabajo ha desempeñado un papel importante. El rediseño del trabajo se definió originalmente como un conjunto de oportunidades y limitaciones estructuradas en tareas y responsabili- dades que afectan a la forma en que un trabajador realiza y experi- menta su trabajo (Hackman y Oldham, 1980). Por lo tanto, los inves- tigadores en este ámbito trataron de averiguar las características laborales que hacen que las personas se sientan satisfechas con su trabajo y estén motivadas para alcanzar las metas organizacionales. Actualmente el diseño del trabajo se define de forma más amplia como “el compendio de los procesos y resultados referentes a cómo se organiza, estructura, experimenta y sanciona el trabajo...” (Grant, Fried y Juillerat, 2010, p. 418). De acuerdo con Grant y sus colabora- dores, esta definición más amplia abre la puerta a roles emergentes y dinámicos en lugar de limitarse a descripciones del trabajo estáti- cas compuestas de tareas fijas asignadas por la dirección (véase tam- bién Parker, Wall y Cordery, 2001)
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




se expone la teoría de Demandas y Recursos La- borales (DRL), que supone una extensión del modelo de Demandas y Recursos Laborales (Bakker & Demerouti, 2007; Demerouti, Bakker, Nachreiner y Schaufeli, 2001) y que a su vez se inspira en las teorías del diseño del trabajo y del estrés laboral. Mientras que las teorías de diseño de trabajo a menudo han ignorado el papel de los estresores laborales, los modelos de estrés en el trabajo han omitido frecuente- mente el potencial motivador de los recursos laborales
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




aúna ambas tradiciones de investigación y explica cómo las deman- das y recursos laborales tienen efectos directos e indirectos sobre el estrés laboral y la motivación. Además, la teoría de DRL propone efectos causales inversos: mientras que los empleados quemados pueden crearse más demandas laborales de empleo a lo largo del tiempo, los trabajadores con engagement movilizan sus propios re- cursos laborales para mantener altos niveles del mismo.
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flexibilidad Uno de los motivos de la popularidad de la teoría DRL es proba- blemente su flexibilidad. Según la teoría, los distintos entornos de trabajo o características laborales pueden dividirse en dos catego- rías diferentes: demandas y recursos laborales. Por lo tanto, la teo- ría puede ser aplicada a todos los entornos de trabajo y profesiones.
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Las demandas laborales hacen referencia a aquellos aspectos físicos, psicológicos, organizacionales o sociales del trabajo que re- quieren un esfuerzo sostenido y conllevan costes fisiológicos y psíquicos (Demerouti et al., 2001). Algunos ejemplos son la presión laboral o la relación emocionalmente exigente con clientes. Aunque las demandas laborales no sean necesariamente negativas pueden suponer un obstáculo cuando requieren un esfuerzo elevado y la persona no se encuentra suficientemente recuperada (Meijman & Mulder, 1998
statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4146690133260

Question
QUESTION NO: 1 Which of the following should be the FIRST step in developing an information security plan? A. Perform a technical vulnerabilities assessment B. Analyze the current business strategy C. Perform a business impact analysis D. Assess the current levels of security awareness
Answer
[default - edit me]

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4146691181836

Question
[default - edit me]
Answer
Answer: B Explanation: Prior to assessing technical vulnerabilities or levels of security awareness, an information security manager needs to gain an understanding of the current business strategy and direction. A business impact analysis should be performed prior to developing a business continuity plan, but this would not be an appropriate first step in developing an information security strategy because it focuses on availability.

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4146694327564

Question
QUESTION NO: 3 The MOST appropriate role for senior management in supporting information security is the: A. evaluation of vendors offering security products. B. assessment of risks to the organization. C. approval of policy statements and funding. D. monitoring adherence to regulatory requirements.
Answer
[default - edit me]

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4146695376140

Question
[default - edit me]
Answer
Answer: C Explanation: Since the members of senior management are ultimately responsible for information security, they are the ultimate decision makers in terms of governance and direction. They are responsible for approval of major policy statements and requests to fund the information security practice. Evaluation of vendors, assessment of risks and monitoring compliance with regulatory requirements are day-to-day responsibilities of the information security manager; in some organizations, business management is involved in these other activities, though their primary role is direction and governance.

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4146698259724

Question
QUESTION NO: 1 Which of the following should be the FIRST step in developing an information security plan? A. Perform a technical vulnerabilities assessment B. Analyze the current business strategy C. Perform a business impact analysis D. Assess the current levels of security awareness
Answer
Answer: B Explanation: Prior to assessing technical vulnerabilities or levels of security awareness, an information security manager needs to gain an understanding of the current business strategy and direction. A business impact analysis should be performed prior to developing a business continuity plan, but this would not be an app

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4146700619020

Question
[default - edit me]
Answer
Answer: D Explanation: Senior management seeks to understand the business justification for investing in security. This can best be accomplished by tying security to key business objectives. Senior management will not be as interested in technical risks or examples of successful attacks if they are not tied to the impact on business environment and objectives. Industry best practices are important to senior management but, again, senior management will give them the right level of importance when they are presented in terms of key business objectives.

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4146701667596

Question
QUESTION NO: 2 Senior management commitment and support for information security can BEST be obtained through presentations that: A. use illustrative examples of successful attacks. B. explain the technical risks to the organization. C. evaluate the organization against best security practices. D. tie security risks to key business objectives
Answer
[default - edit me]

statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs