Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged threat-modeling
Home
Tag
threat-modeling
0
votes
A 'requirements model' is the foundation of the __________ methodology.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
requirement-model
0
votes
Choose the correct option.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-calculation
0
votes
Which of the following security property does Tampering violate?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
security-property
tampering-violate
threat-modeling
0
votes
Process Flow Diagrams are used by ___________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
process-flow-diagrams
pfd
threat-modeling
ssa
0
votes
Denial of Service hinders _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
service-hinders
threat-modeling
0
votes
_________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
0
votes
Identity theft is an example of __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-example
threat-modeling
ssa
0
votes
Which of the following are the advantages of threat modeling?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
advantage-threat-modeling
threat-modeling-advantages
0
votes
Which of the following threat can be handled using access control?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-handling
threat-modeling
access-control
0
votes
The number of distinct symbols that can be used in DFDs is __________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
dfd
data-flow-diagram
threat-modeling
security-models
0
votes
Microsoft’s Threat Modeling tool uses __________ threat classification scheme.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-tools
threat-classificaiton
0
votes
An action that harms an asset is ________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
asset-harm
harm-action
action-harm
ssa
threat-modeling
0
votes
Which of the following issues can be addressed using an efficient logging system?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
information-logging
security
threat-modeling
0
votes
While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
0
votes
Threat Modeling process can : a)Identify threats b) Provide countermeasures c) Stop threats from happening (Real Time) d) Help in flawless coding
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
Page:
« prev
1
2
...