<span>Spyware is a program placed on a computer without the user's knowledge that secretly collects information about the user.
</span><span>The spyware gathers information and can send this information to another program or entity which can take control over the device or use personal information to harm the user. </span>
Answer:
The answer to this question can be given as:
Statement:
number = int(line.strip())
Explanation:
In the above statement, we declare an integer variable number accept the integer value from the file that name is line. In this line, we use the strip() function. This function returns a duplicate string with both starting and tracking characters removed (based on the string parameter passed). The strip() function removes characters from both sides (left and right) based on the parameter(a string defining the collection of characters to be removed).
Answer:
The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology
, extended analysis of all stages
Explanation:
Solution
Penetration testing has several methodologies which include :OSSTMM and PTES
The comparison between OSSTMM and PTES is stated as follows:
OSSTMM:
Security assessment methodology
More Theoretical
Metrics based
PTES
:
Technology oriented
Penetration testing methodology
Extended analysis of all stages
Now,
There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)
- Pre-engagement Interactions
Now,
The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.
The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.
Six areas are covered by OSSTMM which are:
-
Internet technology security
Answer:
<em>Ethernet cables, Network Adapters, Modem, Routers, Switches.</em>
Explanation:
<em>The devices that are required in setting up a wired network for the 5 computer comprises of the following devices </em>
- <em>Ethernet Cables</em>
- <em>Network Adapters</em>
- <em>Modem/Router</em>
- <em>Network Switch</em>
<em>Ethernet cables: They are called network cables or RJ-45 cables used to in connecting two or more computers together. it has different categories called, the untwisted pair and twisted pair Ethernet, with a speed from 10-1000</em>
<em>Network Adapters : This adapters allows a computer device to connect and interface with a network computer</em>
<em>Modem/Routers : A router is a device that that sits in the middle between your local computers and modems. it takes receives information or gets information from the modem and delivers it to the computer</em>
<em>Network switch: it connects more than two computers together to a network and share data among themselves and other devices on the network</em>
Answer:
your friend just sent you 32 bits of pixel data (just the 0s and 1s for black and white pixels) that were encoded after sampling an image. Choose the two statements that are true.
------------------
The 32 bits of pixel data is enough to produce the image using the widget. Nothing else is needed.
------------------------
The digital image would be an exact copy of the analog image.
-----------------------------The correct width and height must be input into the pixelation widget to produce the image.
---------------------------The fact that only 32 bits were used to represent the image indicates relatively large sample squares were used. The digital image may vary from the analog image significantly
Explanation: