This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Microsoft s Threat Modeling tool uses __________ threat classification scheme. |
|
Answer» Microsoft s Threat MODELING TOOL uses __________ threat classification scheme. |
|
| 2. |
DREAD model can be used for ________. |
|
Answer» DREAD MODEL can be used for ________. |
|
| 3. |
_________ is a medium that allows data to flow between domains of trust. |
|
Answer» _________ is a medium that ALLOWS DATA to flow between DOMAINS of trust. |
|
| 4. |
An action that harms an asset is ________. |
|
Answer» An action that harms an asset is ________. |
|
| 5. |
The number of distinct symbols that can be used in DFDs is __________. |
|
Answer» The number of distinct symbols that can be used in DFDS is __________. |
|
| 6. |
The output of the threat modeling process is a _________ which details out the threats and mitigation steps. |
|
Answer» The OUTPUT of the THREAT modeling process is a _________ which details out the threats and mitigation steps. |
|
| 7. |
Which of the following threat can be handled using access control? |
|
Answer» Which of the following threat can be handled using access control? |
|
| 8. |
The theft of intellectual property is a threat to information security. |
|
Answer» The theft of intellectual PROPERTY is a threat to information security. |
|
| 9. |
Denial of Service hinders _________. |
|
Answer» Denial of Service hinders _________. |
|
| 10. |
Process Flow Diagrams are used by ___________. |
|
Answer» Process Flow Diagrams are USED by ___________. |
|
| 11. |
Which of the following security property does Tampering violate? |
|
Answer» Which of the following SECURITY property does TAMPERING violate? |
|
| 12. |
The following is a part of a threat model, except _________. |
|
Answer» The following is a part of a THREAT MODEL, except _________. |
|
| 13. |
Which of the following is a tangible asset? |
|
Answer» Which of the FOLLOWING is a TANGIBLE asset? |
|
| 14. |
Which among the following methodologies distinguishes the security concerns of development from those of the infrastruct |
|
Answer» Which among the following methodologies distinguishes the security CONCERNS of DEVELOPMENT from those of the infrastructure team? |
|
| 15. |
Identity theft is an example of __________. |
|
Answer» Identity THEFT is an example of __________. |
|
| 16. |
Which of the following issues can be addressed using an efficient logging system? |
|
Answer» Which of the following ISSUES can be addressed using an efficient LOGGING system? |
|
| 17. |
Multifactor authentication can be used to handle _________. |
|
Answer» Multifactor authentication can be used to handle _________. |
|
| 18. |
Which of the following are the advantages of threat modeling? |
|
Answer» Which of the following are the advantages of THREAT modeling? |
|
| 19. |
Choose the correct option. |
|
Answer» Choose the correct OPTION. |
|
| 20. |
________ generates a map that illustrates how the user moves through various features of the application. |
|
Answer» ________ generates a MAP that illustrates how the user moves through VARIOUS features of the application. |
|
| 21. |
A 'requirements model' is the foundation of the __________ methodology. |
|
Answer» A 'requirements model' is the FOUNDATION of the __________ methodology. |
|
| 22. |
It is better to perform threat modeling from the early |
|
Answer» It is better to perform threat modeling from the EARLY stages of the SDLC. |
|
| 23. |
Which of the following best describes the threat modeling process? |
|
Answer» Which of the following best DESCRIBES the threat modeling process? |
|
| 24. |
Which of the following security property does Spoofing violate? |
|
Answer» Which of the FOLLOWING security property does Spoofing violate? |
|