Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Top 100+ questions in Threat Modeling
Home
Questions
Threat Modeling
0
votes
Q: Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
Q: State True or False: Security Testing Test Cases play crucial & essential part of Security Testing.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
security-testing
threat-modeling
testcases
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: What is Single Sign-On (SSO)?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
single-sign-on
sso
threat-modeling
0
votes
Q: Which of the following is used to retain integrity in a software?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
software-integrity
software-security
ssa
0
votes
Q: State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
secure-software
0
votes
Q: Identify reasons why TCS has adopted data protection program 1. Customer and market expectations 2. Competitive Differentiation 3. Risk Landscape 4. Legal Obligation
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
protection-program
security
threat
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: Why is it not a good idea to include readymade code from Google search into the customer application deliverables even though it may save a lot of time and cost for the project?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
google-search
threat-modeling
ssa
0
votes
Q: SSA takes care of the threats to the systems and softwares from?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
ssa
threats
security-threats
0
votes
Q: Which vulnerability can lead to Denial of Service attack?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
denial-of-service-attack
dos-attack
ssa
0
votes
Q: Which of the following is correct description for “Accountability” attribute?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
authorization
accountability
security-accountability
0
votes
Q: Security code review should be done throughout the SDLC.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#security-code
sdlc-security-code-review
ssa
0
votes
Q: What is Single Sign-Off?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#single-sign-off
sso
sso-authentication
0
votes
Q: State True or False: Maintenance (Operational) Security is not required if software is developed securely.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
secure-software
security
0
votes
Q: Identify Correct statement:
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
sql-injection-attack
0
votes
Q: What are the popular threat modeling techniques? A) Entry point identification b) Privilege boundaries c) Threat trees d) Flooding
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-techniques
threat-modeling
threat-trees
0
votes
Q: CAPTCHA is used as remediation for which of the following attacks?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
captcha-authentication
remediation
security-attacks
0
votes
Q: The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#validations
threat-modeling
ssa
ascii-range
0
votes
Q: Select the Correct statement.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
authorization
0
votes
Q: Threat-methodology-that-is-most-effective-to-create-a-risk-aware-corporate-culture-is-__________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-methodology
0
votes
Q: DFDs-can-be-used-to-determine-the-timing/sequencing-of-the-processes
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
0
votes
Q: It is better to perform threat modeling from the early stages of the SDLC.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
sdlc
0
votes
Q: Which of the following best describes the threat modeling process?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
0
votes
Q: Which among the following methodologies distinguishes the security concerns of development from those of the infrastructure team?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-model
infrastructure-model
0
votes
Q: DREAD model can be used for ________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
dread-models
threat-modeling
0
votes
Q: Which of the following is a tangible asset?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
tangible-asset
threat-modeling
information-security
0
votes
Q: The following is a part of a threat model, except _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-model
threat-modeling
information-security
0
votes
Q: Which of the following security property does Spoofing violate?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing-violate
threat-modeling
theat-security
0
votes
Q: ________ generates a map that illustrates how the user moves through various features of the application.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application
Page:
1
2
next »
...