Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge.
Can blockchain help in maintaining medical records?
Answer: a. Yes
Answer: a. Yes
See lessWhich of the following is not meant to be delivered by the 5G technology?
Correct Answer: Q1. c. Ultra high latency Q2. a. True
Correct Answer:
Q1. c. Ultra high latency
Q2. a. True
See lessWhich of the following are themselves a collection of different data types?
Correct Answer: Q1) d. Structure Q2) c. The scope of the member name is confined to the particular structure, within which it is defined
Correct Answer:
Q1) d. Structure
Q2) c. The scope of the member name is confined to the particular structure, within which it is defined
See lessDescribe the software metrics for analysis and design models.
https://sikshapath.in/question/describe-the-software-metrics-for-analysis-and-design-models/
Python program to implement linear search
1. Python program to implement linear search. 2. Python program to implement bubble sort. 3. Python program to implement binary search without recursion. 4. Python program to implement selection sort. ANSWER: Download the Below Attachment To Get All Four Questions Code:
1. Python program to implement linear search.
2. Python program to implement bubble sort.
3. Python program to implement binary search without recursion.
4. Python program to implement selection sort.
ANSWER:
Download the Below Attachment To Get All Four Questions Code:
Which one of the following is a type of antivirus program?
Correct Answer to the question 'Which one of the following is a type of antivirus program' is b. Norton Explanation: Antivirus are those software programs that help to detect and remove viruses from the computer and provides a safe environment for users to work on. In the market, there are several aRead more
Correct Answer to the question ‘Which one of the following is a type of antivirus program’ is b. Norton
Explanation: Antivirus are those software programs that help to detect and remove viruses from the computer and provides a safe environment for users to work on. In the market, there are several antivirus programs available and the Norton is one of them.
See lessWhat is a sink? a. A node with no incoming …
Answer: Q1. d. A node with no outgoing edges. Q2. c. Randomly choose a node from all nodes.
Answer:
Q1. d. A node with no outgoing edges.
Q2. c. Randomly choose a node from all nodes.
See lessNMAP command can be used for? a. Host Discovery b. …
Answer: Q1. a. Host Discovery b. Port Scanning c. Service and Version Detection d. OS Detection e. Vulnerability Scanning Q2. b. Target is down.
Answer:
Q1. a. Host Discovery
b. Port Scanning
c. Service and Version Detection
d. OS Detection
e. Vulnerability Scanning
Q2. b. Target is down.
See lessA manufacturer claims that only 4% of his products supplied …
Download Below Attachment for answer: Also, Vote Up the Answers.
Download Below Attachment for answer:
Also, Vote Up the Answers.
See lessIdentify and explain any five security vulnerabilities and provide a …
A vulnerable software system can be exploited by attackers and the system could be compromised, the attacker might take control of the system to damage it, to launch new attacks or obtain some privileged information that he can use for his own benefit. Software Security Vulnerabilities: 1. CryptograRead more
A vulnerable software system can be exploited by attackers and the system could be compromised, the attacker might take control of the system to damage it, to launch new attacks or obtain some privileged information that he can use for his own benefit.
Software Security Vulnerabilities:
1. Cryptographic Failures
Sensitive data — such as addresses, passwords, and account numbers — must be properly protected. If it isn’t, untrustworthy agents take advantage of the vulnerabilities to gain access.
2. Injection
Injection flaws occur when untrusted data is sent as part of a command or query. The attack can then trick the targeted system into executing unintended commands. An attack can also provide untrustworthy agents access to protected data.
3. Insecure Design
Insecure design refers to risks related to design flaws, which often includes the lack of at least one of the following:
4. Security Misconfiguration
Security misconfigurations are often the result of:
5. Vulnerable and Outdated Components
Components are made up of libraries, frameworks, and other software modules. Often, the components run on the same privileges as your application. If a component is vulnerable, it can be exploited by an untrustworthy agent. This causes serious data loss or server takeover.
Prevent Software Vulnerabilities
1. Test Your Software
It’s a good practice to test your software often as this will help you find and get rid of vulnerabilities quickly. You can test your software using code analysis tools, white box testing, black box testing, and other techniques.
2. Update the Software Regularly
It is important to regularly update software as outdated software is prone to vulnerabilities. By making sure your software uses up to date components and dependencies, you can prevent security issues and software vulnerabilities.
3. Set Up Software Design Requirements
Define a set of principles that need to be followed while developing each software release. These principles will show the developers how to write, inspect, and demonstrate their code to ensure security best practices are followed. Following the latest information from organizations such as CWE, OWASP, and CERT will also help you detect and prevent vulnerabilities.
4. Use a Code Signing Certificate
Digitally signing your code using a code signing certificate will make your code tamper-proof, making it impossible for third parties to tamper with your code. A code signing certificate will make sure your files remain secure and it will also prevent hackers from adding security vulnerabilities to your code.
See less