448 Appendix ■ Answers
2 7. C. A power spike is a momentary period of high voltage. A surge is a prolonged period of
high voltage. Sags and brownouts are periods of low voltage.
- A. Subjects are active entities that can access a passive object to retrieve information from
or about an object. Subjects can also make changes to objects when they are properly
authorized. Users are often subjects, but not all subjects are users. - A. OSPF is a link state protocol. Link state protocols maintain a topographical map of
all connected networks and preferentially select the shortest path to remote networks
for traffic. A distance vector protocol would map the direction and distance in hops to
a remote network, whereas shortest path first and link mapping are not types of routing
protocols. - A. Machine languages are examples of first-generation programming languages.
Second-generation languages include assembly languages. Third-generation languages
include compiled languages. Fourth- and fifth-generation languages go beyond standard
compiled languages to include natural languages and declarative approaches to
programming. - A. Tara first must achieve a system baseline. She does this by applying the most recent
full backup to the new system. This is Sunday’s full backup. Once Tara establishes this
baseline, she may then proceed to apply differential backups to bring the system back to a
more recent state. - B. To restore the system to as current a state as possible, Tara must first apply Sunday’s
full backup. She may then apply the most recent differential backup, from Wednesday at
noon. Differential backups include all files that have changed since the most recent full
backup, so the contents of Wednesday’s backup contain all of the data that would be
contained in Monday and Tuesday’s backups, making the Monday and Tuesday backups
irrelevant for this scenario. - A. In this scenario, the differential backup was made at noon and the server failed at
3 p.m. Therefore, any data modified or created between noon and 3 p.m. will not be
contained on any backup and will be irretrievably lost. - D. By switching from differential to incremental backups, Tara’s weekday backups will
only contain the information changed since the previous day. Therefore, she must apply all
of the available incremental backups. She would begin by restoring the Sunday full backup
and then apply the Monday, Tuesday, and Wednesday incremental backups. - D. Each incremental backup contains only the information changed since the most recent
full or incremental backup. If we assume that the same amount of information changes
every day, each of the incremental backups would be roughly the same size. - A. Information that is modifiable between a client and a server also means that it
is accessible, pointing to both tampering and information disclosure. Spoofing in
STRIDE is aimed at credentials and authentication, and there is no mention of this in
the question. Repudiation would require that proving who performed an action was
important, and elevation of privilege would come into play if privilege levels were
involved.