Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. The threat modelling phase where applications are decomposed and their
- entry points are reviewed from an attacker’s perspective known as ______________
- a.thread identification
- b.impact analysis
- c.attack surface evaluation
- d.thread classification
- 2.Which of the following authentication mechanisms does J2EE support
- a. Http Basic. Form Based. Client/server Mutual. Role Based Authentication
- b. Windows Basic. Form Based. Client/server Mutual. Role Based Authentication
- c. Http Basic. Form Based. Client/server Mutual. HTTP Digest Authentication
- d. Role Based. Http Basic. Windows. HTTP Digest Authentication
- 3. Which of the following relationship is used to describe security use case scenario?
- A. Extend Relationship
- B. Mitigates Relationship
- C. Threatens Relationship
- D. Include Relationship
- 4. Identify the formula for calculating the risk during threat modelling.
- a) RISK=PROBABILITY*VULNERABILITY
- b) RISK=PROBABILITY*Attack
- c) RISK=PROBABILITY*ASSETS
- d) RISK=PROBABILITY*DAMAGE POTENTIAL
- Which of the following relationship is used to describe abuse case scenarios?
- A. Extend Relationship
- B. Mitigates Relationship
- C. Include Relationship
- D. Threatens Relationship
- Which of the risk assessment model is used to rate the threats-based risk to the application during threat modelling process?
- a.DREAD
- b.SMART
- c.RED
- d.STRIDE
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement