Q1. Adam is evaluating the security of a web server before it goes live. He beli
ID: 3859096 • Letter: Q
Question
Q1. Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?
Question options:
Threat
Vulnerability
Impact
Q2. Question options:Nancy performs a full backup of her server every Sunday at 1 A.M. and differential backups on Mondays through Fridays at 1 A.M. Her server fails at 9 A.M. Wednesday. How many backups does Nancy need to restore?
1
2
4
Q3. Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?
Question options:
Alice's public key
Alice's private key
Bob's private key
Q4. Question options:Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?
Alice's public key
Alice's private key
Bob's public key
a)Threat
b)Vulnerability
c)Impact
Explanation / Answer
1.
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. vulnerability describes the issue that Adam discovered.
Option b is correct.
2.
Nancy performs a full backup of her server every Sunday at 1 A.M. and differential backups on Mondays through Fridays at 1 A.M. Her server fails at 9 A.M. Wednesday. How many backups does Nancy need to restore 2 backups.
Option b is correct.
3.
Alice would like to send a message to Bob using a digital signature. Alice's private key does Alice use to create the digital signature.
Option b is correct.
4.
Option a is correct.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.