Answer:
b) one needs to follow through all phases, assessment, design, deploy and manage security
Explanation:
The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form
At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step
Therefore according to the given options, the second option is correct
Answer:
I am writing the Python program:
lyrics = ["I wanna be your endgame", "I wanna be your first string",
"I wanna be your A-Team", "I wanna be your endgame, endgame"]
lines_of_sanity = 6
counter = 0
while counter <= lines_of_sanity+1:
for line in lyrics:
print(line)
counter = counter + 1
print("MAKE IT STOP")
Explanation:
- The lyrics is a list which has the following lines of song.
I wanna be your endgame
I wanna be your first string
I wanna be your A-Team
I wanna be your endgame, endgame
- The value of lines_of_sanity is 6.
- counter variable is initialized to 0.
- The while loop starts which keeps executing until the value of counter becomes greater than 6 which is the value of lines_of_sanity
- The for loop inside the while loop moves through each line of lyrics list and prints that line. The counter variable increments to 1 at each iteration.
- Lets see what the while and for loops print at each iteration:
1st iteration: counter = 0, following line is displayed:
- I wanna be your endgame
- Value of counter increments by 1.
- counter = 1
2nd iteration: counter = 1, following line is displayed:
- I wanna be your first string
- Value of counter increments by 1.
- counter = 2
3rd iteration: counter = 2, following line is displayed:
- I wanna be your A-Team
- Value of counter increments by 1.
- counter = 3
4th iteration: counter = 3, following line is displayed:
- I wanna be your endgame, endgame
- Value of counter increments by 1.
- counter = 4
5th iteration: counter = 4, following line is displayed:
- I wanna be your endgame
- Value of counter increments by 1.
- counter = 5
6th iteration: counter = 5, following line is displayed:
- I wanna be your first string
- Value of counter increments by 1.
- counter = 6
7th iteration: counter = 6, following line is displayed:
- I wanna be your A-Team
- Value of counter increments by 1.
- counter = 7
- The program should keep going to finish out the current verse. So following line is displayed:
- I wanna be your endgame, endgame
- The loop breaks as the value of counter = 7 is greater than lines_of_sanity i.e. 6
- So at last the print("MAKE IT STOP") statement is execute which displays the following line:
- MAKE IT STOP
- The program along with the output is attached.
Answer:
Option (1) the is correct answer for the above question.
Explanation:
"DDos" stands for distributed denial-of-service. It is a type of attack which affects the network route. It disturbs the normal route like a traffic Jam. It operators from some hosts point and act after getting access to the system in an unauthorized way.
It attacks to disturb the service provided by the other system. It authorized the hosts' system and entered into the system to get disturb the routine of the system.
- Option 1 also suggests the same hence it is a correct option.
- While option 2 suggests that it is a software, but it is a concept that means to disturb the normal routine of the system and he can get that information access which is transmitted over the signals. hence option 2 is not fit for the question.