Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks

Answers

Answer 1

Answer:

Auditing and logging

Explanation:

Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.

To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.

Therefore, in this case, the correct answer is "Auditing and logging."


Related Questions

Which of these devices collects the most information on network activity?

a. Intrusion detection systems.
b. System Event Management systems.
c. Firewalls.
d. Packet sniffers.

Answers

Answer:

The devices collects the most information on network activity are:

d. Packet sniffers.

Explanation:

Generally, a packet sniffer is a monitoring device which examines streams of data packets that flow between computers on a network and the larger Internet.  One of the best packet sniffers is the Wireshark.  As a packet sniffer, the Wireshark is also an analysis tool.  It captures network traffic on local networks, storing the obtained data for offline analysis.

please help me



Match the technology with the appropriate task.



1. graphics software

2. word processor

3. CAD

4. laptop

5. GPS​

Answers

Complete Question:

Match the technology with the appropriate task.

Column A

1. Graphics software

2. Word processor

3. CAD

4. Laptop

5. GPS

Column B

A. Create a company logo.

B. Get directions to a customer’s office.

C. Type a report.

D. Complete many types of tasks on a computer away from the office.

E. Design a building.

Answer:

1. A

2. C

3. E

4. D

5. B

Explanation:

1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.

2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.

3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.

4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.

5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.

Answer:

1. A

2. C

3. E

4. D

5. B

Which of the following methods can be used to solve the knapsack problem?

a. Brute Force algorithm
b. Recursion
c. Dynamic programming
d. All of the mentioned

Answers

Answer: D. All of those mentioned

Explanation:

The knapsack problem is a problem that typically occurs in combinatorial optimization and is also a 2D dynamic programming example.

We should note that all the methods given in the option such as recursion, brute force algorithm and dynamic programming can all be used to solve knapsack problem.

Therefore, the correct answer is D.

. Else-if is good selection statement that help us to solve problems in C++,mostly times same problem of same nature can also be solved via switch statement. Which one you prefer to use and why?

Answers

Answer:

Else-If statements

Explanation:

Personally, I prefer using Else-If statements for conditional statements since you can start with and If statement and add to it if necessary. Aside from this, Else-If statements also allow you to add more than one condition to be met by using tags such as and or and not. Switch statements are better in scenarios where you have a set of possible inputs or results and need a specific event to happen for each input/result, but this is not as common of a scenario so Else-If is usually my go-to conditional statement.

The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.

Answers

Answer:

The body tag

Explanation:

HTML has several tags; however, the tag that handles the description in the question is the body tag.

It starts with the opening tag <body> and ends with closing tag </body>

i.e.

<body>

[Website content goes in here]

</body>

Any text, image, object etc. placed within this tag will be displayed in the website

The motherboard

allows the different parts of a computer to communicate
helps to keep things cool inside the tower
is the memory of the computer
is where the computer is plugged into an outlet in the wall

Answers

Answer:

a:(allows the different parts of a computer to communicate)

Explanation:

The motherboard is the main command center for the whole pc which recieves your inputs and responds by sending outputs...

Problem decomposition means
O Fixing the problem
O Solving the problem
O Breaking down tasks into smaller, manageable parts
0 None of the above
PLEASE HELPPPPPP

Answers

Answer: Breaking down tasks into smaller, manageable parts

Explanation:

The word decomposition means to break down so Problem decomposition means to break down the problem being faces into smaller parts with the reason being to be able to manage it better.

Some problems are simply too large to handle singularly because of the amount of resources that would have to be devoted. It would be better to break them down into smaller tasks that can then be be confronted one at a time with enough resources to solve them each.

The ________ contains links to folders and files that Windows determines you access frequently or links that you have added.

Answers

Answer:

Quick access list

Explanation:

Normally in computers, quick access list is usually the first node in the navigation pane and it contains links to folders and files that you access frequently plus the ones that you add by yourself. Windows detects them.

draw internal architecture of computer​

Answers

Answer:

If this is good, let me know in the comments and I'll draw it

Explanation:

NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Xavier is using a query that includes a LIKE comparison operator with the value of A[a-n)" Which option would
match this operator?

Apple

Aaron

Assist

Azure

Answers

Answer:

This will match the name Aaron

Explanation:

Using square brackets around a range indicates that a single character within the range of the brackets can be match.

In something like the given example

WHERE name LIKE "A[a-n]"

It will match all names that start with a capital A, which is immediately followed by a lowercase a through n.

please help

Write a method that takes 5 ints as parameters and returns the average value of the 5 ints as a double.

This method must be named average() and it must have 5 int parameters. This method must return a double.

Calling average(1, 5, 7, 4, 10) would return 5.4.

Answers

Answer:

Answered below

Explanation:

This solution is written in Kotlin programming language.

fun average (a: Int, b: Int, c: Int, d: Int, e: Int) : Double {

#variable to hold the addition of all parameters

var sum = a + b + c + d + e

#variable to hold the average of sum

var avg = sum / 5

return avg

}

#call the function to see how it works.

# this operation is done in the fun main()

var test: Double = average ( 5, 4, 7 , 3, 9)

print (test)

The illegal copying of program​

Answers

Answer:Software piracy

Explanation:

What are the three general methods for delivering content from a server to a client across a network

Answers

Answer:

Answered below.

Explanation:

The three general methods consist of unicasting, broadcasting and multicasting.

Casting implies the transfer of data from one computer (sender) to another (recipient).

Unicasting is the transfer of data from a single sender to a single recipient.

Broadcasting deals with the transfer of data from one sender to many recipients.

Multicasting defines the transfer of data from more than one sender to more than one recipients.

what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another IP address

Answers

Answer:

Man-in-the-middle attack

Explanation:

In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.

what type of device is a projector ?
a. input
b. memory
c. output
d. storage

Answers

Answer:

output

Explanation:

if I'm wrong sorryyy

Answer:

Output

Explanation:

:D

Brian has created the following selection sort class in Java. In which line is the index of the smallest value returned? In which line is the input array given as an argument?

public class SelectionSort{
private static int positionMin (int] vals, int startPosition) {
int minPosition startPosition;
for (int i startPosition; i
if (vals[i] vals[min Position]) {

minPosition = i;
return min

Position; private static void swap(int] vals, int firstPosition, int secondPosition) {

int temp; temp vals[firstPosition];
vals[firstPosition] vals[second Position];
vals[secondPosition] temp return public static void selSort(int| vals) {
int minPos for (int startPos 0; startPos< vals.length; startPos++){

minPos positionMin(vals,startPos); swap(vals,startPos, min Pos) ;

for (int i 0; i< vals.length; i++) { if(i
}else Jelse { System.out.println(vals[i]); } }; }

return; } }

Answers

Answer:

Explanation:

Since there are no line numbers in this question I will start counting from public class SelectionSort{ as line 1 and so on, as well as provide the code on that line.

The index of the smallest value is returned on line 8 where it says return min which shouldn't have any spaces and should be return minPosition;

The input array is given as an argument at the beginning of the function on line 2 where it says private static int positionMin (int] vals, int startPosition) {, as the variable vals.

This input array is also used as an argument on line 10 where it says Position; private static void swap(int] vals, int firstPosition, int secondPosition) and line 15 where it says vals[secondPosition] temp return public static void selSort(int| vals) {

Which of the following variable names follows the rules for naming variables?
A. snack $
B. favorite_snack
C. lunch time
D. 15 minute snack

Answers

D. 15 minute snack
Sorry if wrong

What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources

Answers

Answer: Trojan horse

Explanation:

Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.

It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.

Write a program that asks the user how many names they have. (If they have a first name, two middle names, and a last name, for example, they would type 4.) Then, using a for loop, ask the user for each of their names. Finally, print their full name.

Answers

Answer:

The solution is implemented in python:

numnames = int(input("Number of Names: "))

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

names = []

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

Explanation:

This prompts user for number of names

numnames = int(input("Number of Names: "))

This lists the name titles in a list

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

This initializes an empty list

names = []

The following for loop get names from the user

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

The following instructions print the user fullnames

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

An example program in Python that asks the user for the number of names they have and then prompts them to enter each name.

It will then print their full name based on the names provided:

python

Copy code

num_names = int(input("How many names do you have? "))

names = []

for i in range(num_names):

   name = input("Enter name {}: ".format(i + 1))

   names.append(name)

full_name = " ".join(names)

print("Your full name is:", full_name)

In this program, we first ask the user to enter the number of names they have. The input is converted to an integer using int() since input() returns a string.

Then, we initialize an empty list names to store the names provided by the user.

Next, we use a for loop that iterates num_names times to ask the user for each name. The loop variable i starts from 0, so we add 1 to it when displaying the prompt using i + 1.

Inside the loop, we prompt the user to enter the name and append it to the names list. After the loop completes, we join all the names in the names list using the join() method with a space as the separator. This creates a single string representing the full name.

Learn more about python on:

https://brainly.com/question/30391554

#SPJ6

How to format each dictionary item as a text string in the input file. How to covert each input string into a dictionary item. How to format each item of your inverted dictionary as a text string in the output file.

Answers

Answer:

- To get the items of a dictionary and print them as a string, use the items() method to unpack the keys and values in a for and print or write them into a file.

for key, value in mydict.items():

   print(f"{key}, {value}")

- To convert string from user input into dictionary;

   mystring = input().split(" ")  #assuming the words are separated by a space.

   from word in mystring:

       mydict[word] = mydict.get(word, 0) + 1

This would use the words in the string as the keys of the dictionary and the count of each word as the respective values.

Explanation:

A dictionary is a data structure in python used to store data in key-value pairs. The items are enclosed in curly braces and can be accessed with the key in dot or bracket notation.

Dictionaries in Python are used to represent data items in pairs; i.e. key and values

(a) Format items as strings in an input file

To do this we make use of the file manipulation.

Assume the dictionary name is given as: myDict

See attachment for the complete solution

Read more about Python dictionary at:

https://brainly.com/question/14353514

The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.

a. True
b. False

Answers

Answer:

The answer is "Option a"

Explanation:

The given question is incomplete, that's why its correct solution can be defined as follows:

The above-given question is the part of the Binary Autocomplete, in which this Autocomplete function would be a full word or sentence after just a few other letters were entered into the system. It approach improves text taking appropriate on smartphone devices of particular because every letter should not be written in such a single phrase.  

Select all the correct answers. Which statement will print the output 10 + 20=30

a. System.out.println("10 + 20 =30" );
b. System.out.println(10 + 20 =30);
c. System.out.println(10 + 20 =""+ (10+20));
d. System.out.println("10 + 20" =10+20);
e. System.out.println(10 + 20 ="" +10 +20);

Answers

Answer:

a

Explanation:

b will print out a boolean, true, i think

c gives an error?? i think

d seems weird

e is weird too

anyway, b,c,d,e all have bad syntax

Answer:

a

Explanation:

What are the two basic literary forms?

Answers

fiction and nonfiction

What will the output of the statements below? System.out.println(9%2); System.out.println(12%6); The output of the first statement is * The output of the second statement is​

Answers

Answer:

You get Exact 30 print of that sentence on a comadore 64

Explanation:

Just simple basic science. hope this helps

Is a free verse a poetry that has no images

Answers

No it just means that it does not have any specific rhymes or formats
No they just typically have no set meter

What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centimeters?

Answers

Answer:

guys all you have to do is divide and multiply 812x913=741356

and this answer they give you going divide 741356. 1225

so easy guys let me in the comment

Explanation:

Write a list comprehension statement to generate a list of all pairs of odd posi

Answers

Answer:

Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])

Explanation:

Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;

In other to ensure that ;

Lower digit is written first ; (a < b) ;

Only odd numbers are considered,

a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.

Both a and b are declared as a tuple in other to obtain a pair of odd values.

Define a class named person that contains two instance variables of type string that stores the first name and last name of a person and appropriate accessor and mutator methods. Also create a method named displayDetails that outputs the details of a person

Answers

Answer:

Answered below

Explanation:

//Program is written using Java programming language.

Class Person {

private string firstName;

private string lastName;

void set firstName(string a){

firstName = a;

}

string getFirstName(){

return firstName;

}

void setLastname( string b){

lastName = b;

}

string getLastName( ){

return lastName;

}

void displayDetails( ) {

System.out.print(firstName);

System.out.print (lastName);

}

}

//Test program

Class Main{

public static void main(String args [] ){

Person person = new Person( )

person.setFirstName("Karen")

System.out.print(person.getFirstName)

person.displayDetails()

}

}

A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by
O clicking on the View tab.
O saving a contact.
O creating an appointment.
O flagging an email.

Answers

A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.

What is a Variable Expense?‌

Business expenses can be classified as either fixed (invariable) or variable. A fixed expense does not change based on a business’s other activities. Costs like rent and administrative salaries are fixed costs, which remain the same no matter how much a business is producing. Imagine a factory that produces pencils — the cost of renting the factory building will remain the same, month after month, no matter how many pencils the company actually produces.

Variable expense ratio expresses variable expenses as a proportion of a company's sales. To calculate the variable expense ratio, simply divide the company's total variable expenses by the company's total net sales. To express the result as a percentage, simply multiply it by 100.

Therefore, A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.

Learn more about variable expense on:

https://brainly.com/question/13097236

#SPJ5

Choose the type of collection created with each assignment statement

____ collection A = {5:2}
Options: tuple, dictionary, list

____ collection B = (5,2)
Options: tuple, dictionary, list

____ collection C = [5,2]
Options: tuple, dictionary, list

Answers

Answer:

dictionary

tuple

list

Explanation:

Other Questions
Need help plz help plz what is the degree of x^6+4x-3 How do sound waves travel? PLEASE HELP IF YOU WANT BRAINLEIST AND ME TO LIKE URE COMMENT!!A. Sound causes the air near it to vibrate inwards.B. waves radiate outward from a central point.C. Sound moves randomly in different directions.D. Sound transforms waves into different frequencies. Help please it is graphing Help I need helpppppppoo What will happen when two balloons with the same charges are brought close to each other1.The balloons will attract each other.2. The balloons will repel each other.3. The charges of both balloons will change.4. The charge of one of the balloons will change. (2x+37-4)-(5x + 2)This is super URGENT please helppp what is potential energy? Help me Im about to cry I carried my doll in my back just as their mothers carry their babies" can someone please explain this to me please What is the constant of proportionality in the equation 3y = 2x Solve for x.a. 16b. 11c. 6 4. Which was NOT one of President Woodrow Wilson's Fourteen Points ?A. Creation of an independent PolandB. Lenient treatment of the Central PowersC. Creation of a peace-keeping association of nationsD. Autonomous development for the peoples of Austria-Hungary and the Ottoman Empire Which expression is not equivalent to 3x-2 Whats the ANSEWR to this Someone please help! No one every answers my questions :( What specific challenges did Floridians face during the Great Depression? Someone please do this! Which statements are accurate about Eleanor Roosevelt's early life?Choose ALL answers that are correct. A governess was mean to her.Her mother was her best friend.Her mother, brother, and father died.She lied when she didnt think people wanted the truth.Her familys wealth brought her much happiness. Why doesnt raising the minimum age to leave school always lead to higher graduation rates? Cite evidence in the text.