Explore topic-wise InterviewSolutions in Current Affairs.

This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1.

Microsoft s Threat Modeling tool uses __________ threat classification scheme.

Answer»

Microsoft s Threat MODELING TOOL uses __________ threat classification scheme.
Choose the correct option from below list
(1)VAST
(2)STRIDE
(3)Trike
(4)PASTA
(5)OCTAVE

Answer:-(2)STRIDE

2.

DREAD model can be used for ________.

Answer»

DREAD MODEL can be used for ________.
CHOOSE the CORRECT option from below LIST
(1)Identifying threats
(2)Rating threats
(3)Identifying assets
(4)Documentation

Answer:-(2)Rating threats

3.

_________ is a medium that allows data to flow between domains of trust.

Answer»

_________ is a medium that ALLOWS DATA to flow between DOMAINS of trust.
Choose the correct option from below list
(1)Data Flow
(2)Data Store
(3)Trust boundary
(4)Attack Vector

Answer:-(3)Trust boundary

4.

An action that harms an asset is ________.

Answer»

An action that harms an asset is ________.
Choose the CORRECT option from below list
(1)ATTACK
(2)THREAT
(3)Vulnerability

Answer:-(1)Attack

5.

The number of distinct symbols that can be used in DFDs is __________.

Answer»

The number of distinct symbols that can be used in DFDS is __________.
CHOOSE the correct option from below list
(1)Six
(2)Five
(3)DEPENDS on the APPLICATION
(4)Four

Answer:-(2)Five

6.

The output of the threat modeling process is a _________ which details out the threats and mitigation steps.

Answer»

The OUTPUT of the THREAT modeling process is a _________ which details out the threats and mitigation steps.
Choose the CORRECT option from below LIST
(1)Document
(2)DFD
(3)PFD
(4)List

Answer:-(1)Document

7.

Which of the following threat can be handled using access control?

Answer»

Which of the following threat can be handled using access control?
Choose the correct OPTION from below list
(1)Information Disclosure
(2)Tampering
(3)DENIAL of Service
(4)Elevation of PRIVILEGE
(5)All the OPTIONS

Answer:-(5)All the options

8.

The theft of intellectual property is a threat to information security.

Answer»

The theft of intellectual PROPERTY is a threat to information security.
Choose the correct option from below LIST
(1)TRUE
(2)False

Answer:-(1)True

9.

Denial of Service hinders _________.

Answer»

Denial of Service hinders _________.
CHOOSE the correct option from below LIST
(1)Integrity
(2)Confidentiality
(3)Availability
(4)Authenticity

Answer:-(3)Availability

10.

Process Flow Diagrams are used by ___________.

Answer»

Process Flow Diagrams are USED by ___________.
Choose the CORRECT option from below list
(1)APPLICATION THREAT Models
(2)OPERATIONAL Threat Models

Answer:-(1)Application Threat Models

11.

Which of the following security property does Tampering violate?

Answer»

Which of the following SECURITY property does TAMPERING violate?
CHOOSE the correct option from below list
(1)Authentication
(2)INTEGRITY
(3)Confidentiality
(4)Availability

Answer:-(2)Integrity

12.

The following is a part of a threat model, except _________.

Answer»

The following is a part of a THREAT MODEL, except _________.
Choose the correct option from below list
(1)Mitigation steps for each threat
(2)Implementation of processes
(3)A list of potential threats
(4)ANALYSIS of actions taken

Answer:-(2)Implementation of processes

13.

Which of the following is a tangible asset?

Answer»

Which of the FOLLOWING is a TANGIBLE asset?
Choose the correct option from below list
(1)Brand Reputation
(2)Data on a database
(3)PATENT
(4)Goodwill

Answer:-(2)Data on a database

14.

Which among the following methodologies distinguishes the security concerns of development from those of the infrastruct

Answer»

Which among the following methodologies distinguishes the security CONCERNS of DEVELOPMENT from those of the infrastructure team?
Choose the correct option from below LIST
(1)VAST
(2)OCTAVE
(3)Trike
(4)STRIDE

Answer:-(1)VAST

15.

Identity theft is an example of __________.

Answer»

Identity THEFT is an example of __________.
Choose the correct option from below LIST
(1)SPOOFING
(2)Non-Repudiation
(3)DoS
(4)Tampering

Answer:-(1)Spoofing

16.

Which of the following issues can be addressed using an efficient logging system?

Answer»

Which of the following ISSUES can be addressed using an efficient LOGGING system?
Choose the correct option from below list
(1)Spoofing
(2)Tampering
(3)Repudiation
(4)DENIAL of Service

Answer:-(3)Repudiation

17.

Multifactor authentication can be used to handle _________.

Answer»

Multifactor authentication can be used to handle _________.
Choose the CORRECT OPTION from below list
(1)SPOOFING
(2)Repudiation
(3)Tampering
(4)DoS

Answer:-(1)Spoofing

18.

Which of the following are the advantages of threat modeling?

Answer»

Which of the following are the advantages of THREAT modeling?
CHOOSE the correct option from below list
(1)Helps ENGINEER and deliver better products
(2)Helps find security bugs early
(3)All the options
(4)Helps UNDERSTAND security requirements

Answer:-(3)All the options

19.

Choose the correct option.

Answer»

Choose the correct OPTION.
Choose the correct option from below list
(1)THREAT = Risk * Vulnerability
(2)Threat = Vulnerability * ATTACK
(3)Risk = Threat * LOSS
(4)Risk = Threat * Vulnerability

Answer:-(4)Risk = Threat * Vulnerability

20.

________ generates a map that illustrates how the user moves through various features of the application.

Answer»

________ generates a MAP that illustrates how the user moves through VARIOUS features of the application.
Choose the correct option from below list
(1)Process Flow Diagram
(2)SEQUENCE Diagram
(3)DATA Flow Diagram
(4)Entity Diagram

Answer:-(1)Process Flow Diagram

21.

A 'requirements model' is the foundation of the __________ methodology.

Answer»

A 'requirements model' is the FOUNDATION of the __________ methodology.
Choose the correct OPTION from below list
(1)PASTA
(2)Trike
(3)OCTAVE
(4)STRIDE

Answer:-(2)Trike

22.

It is better to perform threat modeling from the early

Answer»

It is better to perform threat modeling from the EARLY stages of the SDLC.
Choose the correct option from below LIST
(1)True
(2)False

Answer:-(1)True

23.

Which of the following best describes the threat modeling process?

Answer»

Which of the following best DESCRIBES the threat modeling process?
Choose the correct option from below LIST
(1)Fixed
(2)ITERATIVE
(3)SELDOM refined
(4)Deterministic

Answer:-(2)Iterative

24.

Which of the following security property does Spoofing violate?

Answer»

Which of the FOLLOWING security property does Spoofing violate?
Choose the correct option from below LIST
(1)Authentication
(2)Availability
(3)Confidentiality
(4)Integrity

Answer:-(1)Authentication

Previous Next