No it is not. it's quite simple when you get the hang of it
```
#!/usr/local/bin/python3
import sys
coins = { "quarters" : 25, "dimes" : 10, "nickels" : 5, "pennies" : 1 }
def mkChange( balance, coin ):
qty = balance // coins[ coin ]
if( qty ):
print( str( qty ) + ' ' + coin )
return( balance % coins[ coin ] )
if( __name__ == "__main__" ):
if( len( sys.argv ) == 2 ):
balance = int( sys.argv[ 1 ] )
balance = mkChange( balance, "quarters" )
balance = mkChange( balance, "dimes" )
balance = mkChange( balance, "nickels" )
balance = mkChange( balance, "pennies" )
else:
sys.stderr.write( "\nusage: " + sys.argv[ 0 ] + " <change owed>\n" )
```
Answer:
The answer is C) SQL Injection
Explanation:
Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.
SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.
From the above brief definition; it is seen that the answer is C) SQL Injection.