answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
2 years ago
5

Describe different types of intrusions such as SQL PL/SQL, XML, and other injections.

Computers and Technology
1 answer:
Finger [1]2 years ago
8 0

<em>Intrusion means unauthorized and harmful activities happening in your system. Any irregularities in the system is considered as intrusion and therefore monitored by administrators and can be detected using Intrusion Detection System. </em>

<em>Examples of Intrusion attacks in a network are: </em>

  • <em>Denial of Service (Dos) - denial of service means flooding the system causing it to crash and unable to respond to a service request. Normally, a DoS attack is facilitated by numbers of hosts sending enormous request to a victim computer. The requests can be in a form of code that would flood the system and making it to unresponsive.  </em>
  • <em>Man in the Middle Attack (MiM) - a hacker would be in the middle of the communication between a client computer and a server computer. The hacker can mimic IPs within the network and steal information then sends it to the intended receiver.  </em>
  • <em>SQL Injection - For websites that runs database like SQL, a code by the hacker can be added to the website and making him gained access to the database information successfully.</em>
You might be interested in
enter a formula in cell b10 to return a value of 35000 if the net profit after tax (cell B() is greater than or equal to 350000
Aliun [14]

Step by step explanation:

Statement to be written in cell B10 :

IF ( B9 >= 350000 , 35000, 1000)

Formula:

IF ( logical_test ,  [value_if_true] ,  [value_if_false] )

logical_test = Net Profit After Tax (cell B9)

value_if_true = 35000

(if the Net Profit After Tax (cell B9) is greater than or equal to 350000)

    value_if_false = 1000

(if the Net Profit After Tax (cell B9) is lesser than 350000)


6 0
2 years ago
Read 2 more answers
In cell F29, use an IF function to display the correct Shipping Charge, based on the amount of the Discounted Total. If the Disc
sladkih [1.3K]

Answer:

= IF(B29 >= B28,0,(0.05 * B29))

Explanation:

Given

Free Shipping Minimum = B28

Shipping Charge = F29

Required

Write a formula in F29 to calculate the total shipping charge based on the condition in the question.

To solve this, the following assumption needs to be made.

It'll be assumed that cell B29 contains the value for Discounted Total.

So,

Discounted Total = B29

The condition in the question says

1. If Discounted Total (B29) is greater than or equal to the Free Shipping Minimum (B29), then Shipping Charge (F29) is 0

This can be represented as

If(B29 >= B28)

F29 = 0

2. Else (i.e. if (1) above is false), Shipping Charge (F29) equals 5% of Discounted Total (B29)

This can also be represented as

F29 = 0.05 * B29

Writing the formula in (1) and (2) together in Excel format;

= IF(B29 >= B28, 0, (0.05 * B29))

The above formula will give the desired result based on the condition in the question.

Take for instance;

Free Shipping Minimum = B28 = 28

Discounted Total = B29 = 30

Since 30 >= 28, the value of F29 will be 0 because it satisfies condition 1.

But if

Free Shipping Minimum = B28 = 30

Discounted Total = B29 = 28

Since 28 < 30, the value of F29 will be 5% of 28 = 1.4 because it satisfies condition 2

8 0
2 years ago
Which DFS option can be used to help manage peak bändwidth needs by forcing replication to occur during off hours?
andrey2020 [161]

Answer: D. Scheduling

Explanation:

Distributed file system (DFS) replication scheduling are used most especially when large files need to be replicated across lower bandwidth connections. It helps manage peak bandwidth by forcing replication to occur during off hours

5 0
2 years ago
Company A is setting up a network of mostly Windows machines. Which networking file system protocol would you recommend for maxi
maxonik [38]

Answer:

For maximum interoperability, NFSv4 is recommended.

Explanation:

When setting up a network of mostly windows machines, it is better to use NFSv4 because it includes performance improvements, mandates strong security, and a stateful protocol.

4 0
2 years ago
Write a program that reads the data from rawdata_2004.txt into a dictionary whose keys are country names and whose values are pe
san4es73 [151]

Answer:

import re

def country_capita():

   #opens file

   file=open("inputfile.txt", "r")

   dictionary=dict()

   #reads line by line

   for line in file.readlines():

       # substitutes for multiple space a single space

       line = re.sub(r"[\s]{2, }", ' ', line)

       list=[]

       #splits line on space

       list=line.split(" ")

       #put into dictionary

       dictionary[list[1]]=list[2]

#   get input

   while True:

       choice=input("Enter the country name or quit to exit: ")

       if choice=="quit":

           break

       elif choice in dictionary.keys():

           print(dictionary[choice])

       else:

           print("Invalid Country")

country_capita()

Explanation:

Using python to code this program. First we, (line 1) import the re module which offers us a set of functions that allows us to search a string for a match. ((line 2) Next we define a function country_capita() that will open rawdata_2004.txt, read the information within line by line and create a dictionary list. The we create a while loop with conditional statements that prompt the user to enter country names, print the corresponding values and stops when the user enters quit.

7 0
2 years ago
Other questions:
  • Julie bought a house for $315,000 and has a $285,000 mortgage. she claims she has $315,000 in equity. is she correct? if not, ho
    12·2 answers
  • The final step of the DHCP Discovery process is known as ______.
    5·1 answer
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • Jenny has to include the image of a sun on one of her slides. She needs to write relevant text about it on a dark background on
    6·1 answer
  • Interpretations of​ Moore's law assert​ that:
    13·1 answer
  • Charlie has a large book collection. He was keeping track of it in a spreadsheet, but it has grown big enough that he wants to c
    10·1 answer
  • You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
    8·1 answer
  • A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
    8·1 answer
  • Write a program to declare a matrix A[][] of order (MXN) where ‘M’ is the number of rows and ‘N’ is the
    8·1 answer
  • You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!