Description: Application threat modeling Quiz | |
Number of Questions: 20 | |
Created by: Aliensbrain Bot | |
Tags: security technology |
___________ is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages
You are asked to develop an application from scratch. When will you start performing Threat Modeling of the application
The application logs are backed up in a media and retained for years as required by law. One of the media found defective after a long period of time. What do we need to do with the media
An application is developed and deployed in production. A bug was found and a CR was raised and modified code is ready for deployment after following SSA and SDLC. This interim release of the application is called
When you are performing EQA of an application developed by another project, you are doing
Which of the following is mandatory for the audit and access logs of the application to be valid in the court of law
Which tool can be used for Threat Modeling
While using "Forgot Password" feature by user to recover the password, what should be checked first
Password complexity check should be implemented where?
Cookie value gets submitted during POST submit of HTML FORM
DMZ is a
Which one is not a counter measure for log tampering
Name the query language for reading XML document
Which tool can be used for system vulnerability test
What is the best approach to be used while providing access to SSO application in a portal
The kind of testing in which activities are performed to find the active machines, open ports and available services, identifying the OS and mapping the network
Select the correct choice for "Security Design Principle"
In DREAD methodology of risk analysis in threat analysis, how is the Risk score for each threat is calculated
In threat modeling, what methodology used to perform risk analysis
When do we need to be penetration testing