Q1. Adam is evaluating the security of a web server before it goes live. He beli
ID: 3859350 • Letter: Q
Question
Q1. Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?
Question options:
Threat
Vulnerability
Impact
Q2. Question options:Nancy performs a full backup of her server every Sunday at 1 A.M. and differential backups on Mondays through Fridays at 1 A.M. Her server fails at 9 A.M. Wednesday. How many backups does Nancy need to restore?
1
2
4
Q3. Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?
Question options:
Alice's public key
Alice's private key
Bob's private key
Q4. Question options:Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?
Alice's public key
Alice's private key
Bob's public key
a)Threat
b)Vulnerability
c)Impact
Explanation / Answer
1. b) Sql Injection is possible because of system Vulnerability and can be resolved or prevented by proper implementation.
2. b) 2 as differential backup contains all the changes done from last full backup. so only last full backup and last differential backup done on Wednesday can be used for recovery.
3. b) Alice's private key is used to sign the message digitally, So that the message's sender i.e. Alice can be authenticated using Alice's public key
4. a) Alice's public key as explained in part 3
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.