Chapter 12 ■ Practice Test 4 295
- How many backups in total must Tara apply to the system to make the data it contains as
 current as possible?
 A. 1
 B. 2
 C. 3
 D. 4
- In this backup approach, some data may be irretrievably lost. How long is the time period
 where any changes made will have been lost?
 A. 3 hours.
 B. 5 hours.
 C. 8 hours.
 D. No data will be lost.
- If Tara followed the same schedule but switched the differential backups to incremental
 backups, how many backups in total would she need to apply to the system to make the
 data it contains as current as possible?
 A. 1
 B. 2
 C. 3
 D. 4
- If Tara made the change from differential to incremental backups and we assume that the
 same amount of information changes each day, which one of the following files would be
 the largest?
 A. Monday’s incremental backup
 B. Tuesday’s incremental backup
 C. Wednesday’s incremental backup
 D. All three will be the same size.
- Susan is conducting a STRIDE threat assessment by placing threats into one or more of the
 following categories: Spoofing, Tampering, Repudiation, Information Disclosure, Denial
 of Service, and Elevation of Privilege. As part of her assessment, she has discovered an
 issue that allows transactions to be modified between a web browser and the application
 server that it accesses. What STRIDE categorization(s) best fit this issue?
 A. Tampering and Information Disclosure
 B. Spoofing and Tampering
 C. Tampering and Repudiation
 D. Information Disclosure and Elevation of Privilege
