Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following is used to retain integrity in a software?
Home
Threat Modeling
Which of the following is used to retain integrity in a software?
0
votes
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
Which of the following is used to retain integrity in a software?
a) Encryption
b) Hashing
c) Recovery
d) Redundancy
software-integrity
software-security
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 18, 2021
by
sharadyadav1986
d) Redundancy
commented
Mar 13
by
anonymous
a) Encryption
Related questions
0
votes
Q: List the full names of abbreviations related to Software security?
asked
Nov 30, 2022
in
Fortify code scanner
by
Robin
software-security
0
votes
Q: State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
secure-software
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
0
votes
Q: Which of the following statements is NOT true regarding error handling and Logging?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
error-handling
error-logging
ssa
0
votes
Q: Multifactor authentication can be used to handle _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
multifactor-authentication
authentication
application-authentication
ssa
0
votes
Q: Process Flow Diagrams are used by ___________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
process-flow-diagrams
pfd
threat-modeling
ssa
0
votes
Q: Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
vulnerability-type
malicious
script
ssa
...