Chapter 12 ■ Practice Test 4 295
- How many backups in total must Tara apply to the system to make the data it contains as
current as possible?
A. 1
B. 2
C. 3
D. 4 - In this backup approach, some data may be irretrievably lost. How long is the time period
where any changes made will have been lost?
A. 3 hours.
B. 5 hours.
C. 8 hours.
D. No data will be lost. - If Tara followed the same schedule but switched the differential backups to incremental
backups, how many backups in total would she need to apply to the system to make the
data it contains as current as possible?
A. 1
B. 2
C. 3
D. 4 - If Tara made the change from differential to incremental backups and we assume that the
same amount of information changes each day, which one of the following files would be
the largest?
A. Monday’s incremental backup
B. Tuesday’s incremental backup
C. Wednesday’s incremental backup
D. All three will be the same size. - Susan is conducting a STRIDE threat assessment by placing threats into one or more of the
following categories: Spoofing, Tampering, Repudiation, Information Disclosure, Denial
of Service, and Elevation of Privilege. As part of her assessment, she has discovered an
issue that allows transactions to be modified between a web browser and the application
server that it accesses. What STRIDE categorization(s) best fit this issue?
A. Tampering and Information Disclosure
B. Spoofing and Tampering
C. Tampering and Repudiation
D. Information Disclosure and Elevation of Privilege