On a daily basis, we use search engines
and directories as tools to find information on the web. However, the
difference is how they get and organize their information.
Search engines use small programs like
bots or spiders that search thoroughly through the internet, follow links, and
sends back information to the search engine’s index. Subject directories, on
the other hand, are human powered. Website owners submit their sites to
directories and human editors determine the value of the site and whether or
not it should be included in the directory.
Search engines use phrases and keywords
to locate information on the internet while subject directory allows users to
find information by using hierarchy.
Answer:
The answer is "Option a and Option f"
Explanation:
In the given question option a and option f is correct because both commands use the "cp" command, which is used to copy files and in this command, in option a, it uses the file "from cs250 to cs150", and an option "f" uses the "cs250 with '.h' that is a file extension", and the wrong choice can be defined as follows:
- In choice b, it is wrong because it is not a correct command.
- In choice c, in this command we use "?" symbol, that is wrong.
- In choice d and e both were invalid.
Answer:
def print_popcorn_time(bag_ounces):
if bag_ounces<3:
print("Too Small")
elif bag_ounces>10:
print("Too Large")
else:
total = 6*bag_ounces
print('{} seconds'.format(total))
Explanation:
Using Python programming language
The function is defined to accept a single parameter
Using a combination of if/elif/else statements, the approprite message is displayed when the function is called
Answer:
a. Remove the affected servers from the network.
Explanation:
An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;
1. Preparation.
2. Detection and analysis (identification).
3. Containment.
4. Eradication.
5. Recovery.
6. Review of incident activities.
When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.
A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.
In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).
<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>