Answer:
A. The function definition must appear before the function is called
Explanation:
Given
The above lines of code
Required
Determine the error in the program
In python, functions has be defined before they are called but in this case (of the given program), the function is called before it was defined and this will definitely result in an error;
<em>Hence, option A answers the question</em>
The correct sequence of the program is as follows:
<em>def evenOdd(n):
</em>
<em> if n % 2 == 0:
</em>
<em> return "even"
</em>
<em> return "odd"
</em>
<em>num = int(input("Enter an integer: "))
</em>
<em>print("The integer is", evenOdd(num))
</em>
<em />
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Answer:
The correct selection is the letter C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.
Explanation:
In this case, the letter C is the right answer because with the first ACL exactly:
access-list 102 deny tcp any any
We are denying all traffic with the next line deny tcp any any, in this case, the others line are being ignored.
access-list 104 permit udp host 10.0.0.3 any
access-list 110 permit tcp host 10.0.0.2 eq www any
access-list 108 permit tcp any eq ftp any
For that nobody can access to the internet, the security administrator of ABC must change the first ACL.
(B) CIO, because they make $308,561 per year and it wouldn’t be A cause they only make $140,265 per year nor would C .