Login
Remember
Register
User sharadyadav1986
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by sharadyadav1986
0
votes
Threat-methodology-that-is-most-effective-to-create-a-risk-aware-corporate-culture-is-__________.
answered
Mar 17, 2021
in
Threat Modeling
threat-modeling
threat-methodology
0
votes
It is better to perform threat modeling from the early stages of the SDLC.
answered
Mar 17, 2021
in
Threat Modeling
threat-modeling
sdlc
0
votes
Which of the following best describes the threat modeling process?
answered
Mar 17, 2021
in
Threat Modeling
threat-modeling
threat-modeling-process
0
votes
Which among the following methodologies distinguishes the security concerns of development from those of the infrastructure team?
answered
Mar 17, 2021
in
Threat Modeling
threat-model
infrastructure-model
0
votes
DREAD model can be used for ________.
answered
Mar 17, 2021
in
Threat Modeling
dread-models
threat-modeling
0
votes
Which of the following is a tangible asset?
answered
Mar 17, 2021
in
Threat Modeling
tangible-asset
threat-modeling
information-security
0
votes
The following is a part of a threat model, except _________.
answered
Mar 17, 2021
in
Threat Modeling
threat-model
threat-modeling
information-security
0
votes
Which of the following security property does Spoofing violate?
answered
Mar 17, 2021
in
Threat Modeling
spoofing-violate
threat-modeling
theat-security
0
votes
________ generates a map that illustrates how the user moves through various features of the application.
answered
Mar 17, 2021
in
Threat Modeling
threat-modeling
threat-application
0
votes
A 'requirements model' is the foundation of the __________ methodology.
answered
Mar 17, 2021
in
Threat Modeling
threat-modeling
requirement-model
0
votes
Choose the correct option.
answered
Mar 17, 2021
in
Threat Modeling
threat-modeling
threat-calculation
0
votes
Which of the following security property does Tampering violate?
answered
Mar 17, 2021
in
Threat Modeling
security-property
tampering-violate
threat-modeling
0
votes
Process Flow Diagrams are used by ___________.
answered
Mar 17, 2021
in
Threat Modeling
process-flow-diagrams
pfd
threat-modeling
ssa
0
votes
Denial of Service hinders _________.
answered
Mar 17, 2021
in
Threat Modeling
service-hinders
threat-modeling
0
votes
_________ is a medium that allows data to flow between domains of trust.
answered
Mar 17, 2021
in
Threat Modeling
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
The theft of intellectual property is a threat to information security.
answered
Mar 17, 2021
in
Threat Modeling
theft-information
information-security
threat-modeling
ssa
0
votes
Identity theft is an example of __________.
answered
Mar 17, 2021
in
Threat Modeling
theft-example
threat-modeling
ssa
0
votes
Which of the following are the advantages of threat modeling?
answered
Mar 17, 2021
in
Threat Modeling
threat-modeling
advantage-threat-modeling
threat-modeling-advantages
0
votes
Multifactor authentication can be used to handle _________.
answered
Mar 17, 2021
in
Threat Modeling
multifactor-authentication
authentication
application-authentication
ssa
0
votes
Which of the following threat can be handled using access control?
answered
Mar 17, 2021
in
Threat Modeling
threat-handling
threat-modeling
access-control
Page:
« prev
1
...
264
265
266
267
268
269
270
271
272
273
274
...
330
next »
...