Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged threat-modeling
Home
Tag
threat-modeling
0
votes
Spoofing hampers which of the following Security foundations?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing
threat-modeling
ssa
0
votes
State True or False: Security Testing Test Cases play crucial & essential part of Security Testing.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
security-testing
threat-modeling
testcases
0
votes
What is Single Sign-On (SSO)?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
single-sign-on
sso
threat-modeling
0
votes
State True or False: It is not a responsibility of a supplier to deliver secure software.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
secure-software
0
votes
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Why is it not a good idea to include readymade code from Google search into the customer application deliverables even though it may save a lot of time and cost for the project?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
google-search
threat-modeling
ssa
0
votes
State True or False: Maintenance (Operational) Security is not required if software is developed securely.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
secure-software
security
0
votes
Identify Correct statement:
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
sql-injection-attack
0
votes
What are the popular threat modeling techniques? A) Entry point identification b) Privilege boundaries c) Threat trees d) Flooding
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-techniques
threat-modeling
threat-trees
0
votes
The _______ approach to validation only permits characters/ASCII ranges defined within a white-list.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
#validations
threat-modeling
ssa
ascii-range
0
votes
Select the Correct statement.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
ssa
authorization
0
votes
Threat-methodology-that-is-most-effective-to-create-a-risk-aware-corporate-culture-is-__________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-methodology
0
votes
DFDs-can-be-used-to-determine-the-timing/sequencing-of-the-processes
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
0
votes
It is better to perform threat modeling from the early stages of the SDLC.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
sdlc
0
votes
Which of the following best describes the threat modeling process?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
0
votes
DREAD model can be used for ________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
dread-models
threat-modeling
0
votes
Which of the following is a tangible asset?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
tangible-asset
threat-modeling
information-security
0
votes
The following is a part of a threat model, except _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-model
threat-modeling
information-security
0
votes
Which of the following security property does Spoofing violate?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
spoofing-violate
threat-modeling
theat-security
0
votes
________ generates a map that illustrates how the user moves through various features of the application.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application
Page:
1
2
next »
...