0

Application threat modeling Quiz - 2

Description: Application threat modeling Quiz
Number of Questions: 20
Created by:
Tags: security technology
Attempted 0/20 Correct 0 Score 0

When do we need to be penetration testing

  1. After integration testing but before acceptance testing by the client/end user

  2. after unit test

  3. after integration testing

  4. during system testing


Correct Option: A
  1. Risk score = (Reproducibility * Exploitability * Discoverability) / (Damage potential * Affected users)

  2. Risk score = (Reproducibility * Exploitability - Discoverability) ^ (Damage potential + Affected users)

  3. Risk score = (Reproducibility + Exploitability + Discoverability) / (Damage potential + Affected users)

  4. Risk score = (Reproducibility + Exploitability + Discoverability) * (Damage potential + Affected users)


Correct Option: D

Select the correct choice for "Security Design Principle"

  1. 1) Keep it easy to understand 2) Secure default access 3) Defense in Depth 4) encapsulation 5) Highest privilege

  2. 1) Keep it easy to understand 2) Secure access 3) Defense in Depth 4) encapsulation 5) Highest privilege

  3. 1) Keep it simple and secure 2) Secure default access 3) Defense in Depth 4) Compartmentalization 5) Least privilege

  4. 1) Keep it easy to understand 2) Secure access 3) DMZ 4) encapsulation 5) Highest privilege


Correct Option: C

What is the best approach to be used while providing access to SSO application in a portal

  1. Mandatory access control

  2. Role Based Access Control

  3. Discretionary Access Control

  4. Biometric access control


Correct Option: B
  1. Digitally signed and stamped logs

  2. Log file Read/write privilege is controlled by System administrator

  3. Separate logs for system events

  4. Transaction log for all application events


Correct Option: B
  1. DMZ is the place where customers servers are deployed.

  2. DMZ is an area where all the protocols are allowed to pass through.

  3. semi trusted network zone that separates the untrusted internet from the companys trusted internal network

  4. DMZ is cyber warfare terminology


Correct Option: C
  1. SQL Injection

  2. Cross site request forgery

  3. Session fixation

  4. session hijack


Correct Option: C
  1. Client side only

  2. server side only

  3. Both client and server side

  4. In the SQL procedure


Correct Option: B

While using "Forgot Password" feature by user to recover the password, what should be checked first

  1. whether the credentials provided are valid and correct

  2. whether account is already disabled

  3. whether account is locked

  4. whether the CAPTCHA values entered by the user same as what is in the image


Correct Option: B
  1. HP Web Inspect

  2. Nessus

  3. Open Vas

  4. TAM


Correct Option: D
  1. log should have url accessed by user

  2. Date and time logged in the logs should be in IST format

  3. logs have to be in W3C format

  4. System time is in sync with INDIA domain time and the logs should have uniquely identifiable information about the user


Correct Option: D
  1. white box testing

  2. black box testing

  3. security testing

  4. vulnerability testing


Correct Option: A
  1. Use it for overwriting current logs

  2. Inform stakeholders and degauss the media

  3. Keep it safely and securely in the fire proof safe

  4. format the media


Correct Option: B
  1. At the design stage

  2. At the beginning of testing phase

  3. During requirements collection phase

  4. HP Webinspect performs the Threat Modeling, I do not need to do anything


Correct Option: C
- Hide questions