In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.
DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.
Unauthorized access – When an attacker has an illegal access to host machines
<u>Application Exploitation</u>
Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.
Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.
Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.
Answer:
import random
randomlist = []
for i in range(0,20):
n = random.randint(-29,30)
if n < 0 :
n = 100
randomlist.append(n)
print(randomlist)
Explanation:
The random module is first imported as it takes care of random. Number generation.
An empty list called randomliay is created to hold the generated random integers.
Using a for loop, we specify the range of random numbers we want.
Inside the for loop ; we attach our generated random integer which will be in the range (-29 to 30) in a variable n
For each n value generated, if the value is less than 0( it is negative, since all the values are integers), replace the value with 100.
Answer: Function
Explanation: <em>"Function is a criterion that is met when the part performs its stated purpose effectively and reliably. In an electronics product, for example, function can depend on the solid-state components used, the software or firmware, and quite often on the features of the electronics enclosure selected. Poorly placed or sized ports and misleading or missing labeling are two of the most common ways in which an enclosure can fail the function criterion."</em>
Answer:
Adding extra horizontal scroll, Blocking mobile devices from viewing, Eliminating extra links, Resizing content to fit a screen.
Explanation: