Login
Remember
Register
Ask a Question
Recent questions in Threat Modeling
0
votes
1
answer
________ generates a map that illustrates how the user moves through various features of the application.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application
0
votes
1
answer
A 'requirements model' is the foundation of the __________ methodology.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
requirement-model
0
votes
1
answer
Choose the correct option.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-calculation
0
votes
1
answer
Which of the following security property does Tampering violate?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
security-property
tampering-violate
threat-modeling
0
votes
1
answer
Process Flow Diagrams are used by ___________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
process-flow-diagrams
pfd
threat-modeling
ssa
0
votes
1
answer
Denial of Service hinders _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
service-hinders
threat-modeling
0
votes
1
answer
_________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
1
answer
The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
1
answer
Identity theft is an example of __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-example
threat-modeling
ssa
0
votes
1
answer
Which of the following are the advantages of threat modeling?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
advantage-threat-modeling
threat-modeling-advantages
0
votes
1
answer
Multifactor authentication can be used to handle _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
multifactor-authentication
authentication
application-authentication
ssa
0
votes
1
answer
Which of the following threat can be handled using access control?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-handling
threat-modeling
access-control
0
votes
1
answer
The output of the threat modeling process is a _________ which details out the threats and mitigation steps.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-process
threat-mitigation
threat-process
ssa
0
votes
1
answer
The number of distinct symbols that can be used in DFDs is __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
dfd
data-flow-diagram
threat-modeling
security-models
0
votes
1
answer
Microsoft’s Threat Modeling tool uses __________ threat classification scheme.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-tools
threat-classificaiton
0
votes
1
answer
An action that harms an asset is ________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
asset-harm
harm-action
action-harm
ssa
threat-modeling
0
votes
1
answer
Which of the following issues can be addressed using an efficient logging system?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
information-logging
security
threat-modeling
0
votes
1
answer
While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
0
votes
1
answer
Which of the following statements is NOT true regarding error handling and Logging?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
error-handling
error-logging
ssa
0
votes
1
answer
SAML uses _________ for token exchange
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
saml-token
saml-token-exchange
saml
security-service
ssa
0
votes
1
answer
Threat Modeling process can : a)Identify threats b) Provide countermeasures c) Stop threats from happening (Real Time) d) Help in flawless coding
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
0
votes
1
answer
In a typical SSO solution, What is a “Service provider”
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
sevice-provider
sso-solution
security-provider
0
votes
2
answers
Both Digital Signature & Message Authentication code (MAC) provides authentication.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
digital-signature
message-authentication-code
mac
ssa
0
votes
1
answer
State the Correct statement.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
#software-security-education
ssa
security-education
0
votes
1
answer
Team must monitor for libraries and components that are unmaintained or do not create security patches for older versions
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
monitor-libraries
security-information
database-security
components-security
0
votes
1
answer
Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
vulnerability-type
malicious
script
ssa
Page:
« prev
1
2
Recent questions in Threat Modeling
...