Login
Remember
Register
User sharadyadav1986
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by sharadyadav1986
0
votes
Which vulnerability can lead to Denial of Service attack?
answered
Mar 18, 2021
in
Threat Modeling
denial-of-service-attack
dos-attack
ssa
0
votes
SSA takes care of the threats to the systems and softwares from?
answered
Mar 18, 2021
in
Threat Modeling
ssa
threats
security-threats
0
votes
Why is it not a good idea to include readymade code from Google search into the customer application deliverables even though it may save a lot of time and cost for the project?
answered
Mar 18, 2021
in
Threat Modeling
google-search
threat-modeling
ssa
0
votes
The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling
spoofing
security
ssa
0
votes
Identify reasons why TCS has adopted data protection program 1. Customer and market expectations 2. Competitive Differentiation 3. Risk Landscape 4. Legal Obligation
answered
Mar 18, 2021
in
Threat Modeling
protection-program
security
threat
0
votes
State True or False: It is not a responsibility of a supplier to deliver secure software.
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling
ssa
secure-software
0
votes
Which of the following is used to retain integrity in a software?
answered
Mar 18, 2021
in
Threat Modeling
software-integrity
software-security
ssa
0
votes
What is Single Sign-On (SSO)?
answered
Mar 18, 2021
in
Threat Modeling
single-sign-on
sso
threat-modeling
0
votes
Which of the following information item holds highest critically from confidentiality perspective?
answered
Mar 18, 2021
in
Threat Modeling
confidential-information
security
ssa
0
votes
State True or False: Security Testing Test Cases play crucial & essential part of Security Testing.
answered
Mar 18, 2021
in
Threat Modeling
security-testing
threat-modeling
testcases
0
votes
Spoofing hampers which of the following Security foundations?
answered
Mar 18, 2021
in
Threat Modeling
spoofing
threat-modeling
ssa
0
votes
While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling
threat-application-design
risk-score
ssa
0
votes
Which of the following statements is NOT true regarding error handling and Logging?
answered
Mar 18, 2021
in
Threat Modeling
error-handling
error-logging
ssa
0
votes
SAML uses _________ for token exchange
answered
Mar 18, 2021
in
Threat Modeling
saml-token
saml-token-exchange
saml
security-service
ssa
0
votes
Threat Modeling process can : a)Identify threats b) Provide countermeasures c) Stop threats from happening (Real Time) d) Help in flawless coding
answered
Mar 18, 2021
in
Threat Modeling
threat-modeling
threat-modeling-process
0
votes
In a typical SSO solution, What is a “Service provider”
answered
Mar 18, 2021
in
Threat Modeling
sevice-provider
sso-solution
security-provider
0
votes
Both Digital Signature & Message Authentication code (MAC) provides authentication.
answered
Mar 18, 2021
in
Threat Modeling
digital-signature
message-authentication-code
mac
ssa
0
votes
State the Correct statement.
answered
Mar 18, 2021
in
Threat Modeling
#software-security-education
ssa
security-education
0
votes
Team must monitor for libraries and components that are unmaintained or do not create security patches for older versions
answered
Mar 18, 2021
in
Threat Modeling
monitor-libraries
security-information
database-security
components-security
0
votes
Which type of vulnerability allows an attacker to execute a malicious script in a user browser?
answered
Mar 18, 2021
in
Threat Modeling
vulnerability-type
malicious
script
ssa
Page:
« prev
1
...
262
263
264
265
266
267
268
269
270
271
272
...
330
next »
...