Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q1. Adam is evaluating the security of a web server before it goes live. He beli

ID: 3859350 • Letter: Q

Question

Q1. Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?

Question options:

Threat

Vulnerability

Impact

Q2. Question options:Nancy performs a full backup of her server every Sunday at 1 A.M. and differential backups on Mondays through Fridays at 1 A.M. Her server fails at 9 A.M. Wednesday. How many backups does Nancy need to restore?

1

2

4


Q3. Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?


Question options:

Alice's public key

Alice's private key

Bob's private key


Q4. Question options:Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Alice's private key

Bob's public key

a)

Threat

b)

Vulnerability

c)

Impact

Explanation / Answer

1. b) Sql Injection is possible because of system Vulnerability and can be resolved or prevented by proper implementation.

2. b) 2 as differential backup contains all the changes done from last full backup. so only last full backup and last differential backup done on Wednesday can be used for recovery.

3. b) Alice's private key is used to sign the message digitally, So that the message's sender i.e. Alice can be authenticated using Alice's public key

4. a) Alice's public key as explained in part 3