Answer:
Option D) 5
Explanation:
4 subnet bits is 240 mask which provides , i.e., 16 subnets and provides 14 hosts for each.
In order to achieve the target and provide correct subnet mask, 5 subnet bits are required to be borrowed from the host of a classful network address as then the addition of one more subnet bit would result in 248 mask which in turn gives 5 subnet bits which results in , i.e., 32 subnets and 3 host with 6 host per subnet.
Answer:
The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology
, extended analysis of all stages
Explanation:
Solution
Penetration testing has several methodologies which include :OSSTMM and PTES
The comparison between OSSTMM and PTES is stated as follows:
OSSTMM:
Security assessment methodology
More Theoretical
Metrics based
PTES
:
Technology oriented
Penetration testing methodology
Extended analysis of all stages
Now,
There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)
- Pre-engagement Interactions
Now,
The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.
The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.
Six areas are covered by OSSTMM which are:
-
Internet technology security
Answer:
A PrintWriter reference variable named output that references a PrintWriter object is as follows:
//PrintWriter output = new PrintWriter(outfile);
PrintWriter output = new PrintWriter("output.txt");
The statement that writes the string "Hello World" to the file output is as follows:
//output.print(message)
output.print("Hello World");
Explanation:
Answer:
1. You can invoke or call a method from another program or method: TRUE
2. When methods must share data, you can pass the data into and return the data out of methods: TRUE
3. A method could be called using any numeric value as an argument, whether it is a variable, a named constant, or a literal constant: TRUE
Explanation:
Answer:
Jog
Explanation:
The variable options is a list containing 5 string values
options = ["ski", "surf", "jog", "bike", "hike"]
Indexing in python starts from 0 ; hence the index values of the list values are :
0 - ski
1 - surf
2 - jog
3 - bike
4 - hike
The statement ;
print(options[2]) means print the string at index 2 in the list named options
The string at index 2 is jog ;
Hence, the string jog is printed.