Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q1. Adam is evaluating the security of a web server before it goes live. He beli

ID: 3859096 • Letter: Q

Question

Q1. Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?

Question options:

Threat

Vulnerability

Impact

Q2. Question options:Nancy performs a full backup of her server every Sunday at 1 A.M. and differential backups on Mondays through Fridays at 1 A.M. Her server fails at 9 A.M. Wednesday. How many backups does Nancy need to restore?

1

2

4


Q3. Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?


Question options:

Alice's public key

Alice's private key

Bob's private key


Q4. Question options:Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Alice's private key

Bob's public key

a)

Threat

b)

Vulnerability

c)

Impact

Explanation / Answer

1.

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. vulnerability describes the issue that Adam discovered.

Option b is correct.

2.

Nancy performs a full backup of her server every Sunday at 1 A.M. and differential backups on Mondays through Fridays at 1 A.M. Her server fails at 9 A.M. Wednesday. How many backups does Nancy need to restore 2 backups.

Option b is correct.

3.

Alice would like to send a message to Bob using a digital signature. Alice's private key does Alice use to create the digital signature.

Option b is correct.

4.

Option a is correct.