Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Can any one help with quiz QUESTION 5 What is the best definition of a trust bou

ID: 3700087 • Letter: C

Question

Can any one help with quiz

QUESTION 5

What is the best definition of a trust boundary?

a. The border between two countries

b. Everywhere two principals interact

c. Where you start threat modeling

d. Where there is untrusted data

10.00000 points   

QUESTION 6

What is the focus of privacy?

a. Data

b. The individual

c. Confidentiality

d. Being undetected

10.00000 points   

QUESTION 7

What is one drawback to focusing on assets when threat modeling?

a. Stepping stones may be lower in priority

b. Impossible to enumerate all assets

c. Difficult to place a value on assets

d. Asset valuation is an accounting concept, not security

10.00000 points   

QUESTION 8

What is the most likely response an attacker will have to a mitigation you have deployed?

a. Defeat the mitigation control

b. Attack some other system

c. Look for an easier attack path

d. Give up

10.00000 points   

QUESTION 9

What is the visual goal for presenting an attack tree?

a. No more than a single page

b. No more than a page for each level

c. Between 1 and 3 pages

d. As many pages as necessary to include all nodes

10.00000 points   

QUESTION 10

What is the best way to accept risk in an internal software project? (Choose the best answer)

a. Developers do this all the time

b. File a bug

c. Discuss the decision with management

d. Via a modal dialog

10.00000 points   

QUESTION 11

When should you start to threat model in a software development project?

a. When coding starts

b. When the project begins

c. When initial coding is complete

d. As part of the delivery phase

10.00000 points   

QUESTION 12

Which approach to threat modeling is best when time is limited?

a. Depth first

b. Top down

c. Breadth first

d. Bottom up

10.00000 points   

QUESTION 13

Which attack tree representation generally takes more work but can help the reader to focus their attention better?

a. Graphically

b. Linear map

c. Directed graph

d. Outline

10.00000 points   

QUESTION 14

Which of the following can have integrity protections applied to them? (choose all that apply)

a. Disk

b. People

c. Network

d. Memory

10.00000 points   

QUESTION 15

Which of these is NOT a good prioritization strategy? (choose all that apply)

a. Wait and see

b. Randomly fix issues

c. DREAD

d. Bug bars

10.00000 points   

QUESTION 16

Which of these is not an appropriate way to address a threat?

a. Fix it

b. Accept it

c. Document it internally so you can manage it in the next release

d. Transfer the risk

10.00000 points   

QUESTION 17

Which two are examples of E threats (in STRIDE)?

a. Calling web pages directly without credentials

b. Claiming that a package was never received

c. Finding crypto keys on disk

d. Sending input to a program that causes it to crash

10.00000 points   

QUESTION 18

Which two are examples of I threats (in STRIDE)?

a. Sending input to a program that causes it to crash

b. Using SQL injection to read database tables

c. Finding crypto keys on disk

d. Filling the disk with useless data

10.00000 points   

QUESTION 19

Which two are examples of R threats (in STRIDE)?

a. Calling web pages directly without credentials

b. Claiming that a package was never received

c. Filling logs files with useless data

d. Finding crypto keys on disk

10.00000 points   

QUESTION 20

Which two are examples of S threats (in STRIDE)?

a. Creating an executable file in a local directory

b. Redirecting an IP address to another host

c. Finding crypto keys on disk

d. Claiming that a package was never received

10.00000 points   

QUESTION 21

Which type of STRIDE threat violates Authentication?

a. Spoofing

b. Repudiation

c. Information Disclosure

d. Tampering

10.00000 points   

QUESTION 22

Which type of STRIDE threat violates Authorization?

a. Tampering

b. Denial-of-Service

c. Information Disclosure

d. Elevation of Privilege

10.00000 points   

QUESTION 23

Which type of STRIDE threat violates Availability?

a. Repudiation

b. Denial-of-Service

c. Spoofing

d. Elevation of Privilege

10.00000 points   

QUESTION 24

Which type of attack tree contains nodes that are true if any of the nodes below it are true?

a. OR

b. AND

c. NOT

d. NOR

10.00000 points   

QUESTION 25

Which is the most difficult type of attack tree for you to create?

a. Trees developed by someone else for their organization

b. Trees you develop for your own organization

c. Trees you develop for general use

d. Commercially developed attack trees

a. The border between two countries

b. Everywhere two principals interact

c. Where you start threat modeling

d. Where there is untrusted data

Explanation / Answer

Answer 5) d. Where there is untrusted data.

A trust boundary is the portion where the data's are circulated from an untrusted source.

Answer 6) The focus of privacyis on all the aspects mentioned which is for data, individual information, confidentiality and being undetected where as the focus is on Data Security and privacy.

Answer 7) a) Stepping stones may be lower in priority

Answer 8) c) Look for an easier attack path.

The attackers always find an easirer way to hack the system without much complicasy.

Answer 9) a) No more than a single page

To present an attacked tree it is always advisable to use 1 page.

Answer 10) b) File a bug

By filing a bug and asking the development team work on it is an acceptable technique in any project.

Answer 11) a) When coding starts

Ideally the threat model should start when the architecture is setup in an SDLC Phase.

This is an important aspect of a project and should be started as soon as the architecture is setup.

Answer 12) c) Breadth first.

When the time is short we need to trace back in breadth first approach.

Answer 13) a) Graphically

When graphically the tree is represented then it helps the reader to focus on and have a better claity of the information provided.

Answer 14) Disk, Network and Memory need to have integrity protection applied to them.

Answer 15) Wait and see, Randomly fix issues and Dread are absolutely not good prioritization strategy.

Bug bar is denoted as the accepted range of bugs and severity in a system.

Answer 16) d) Transfer the risk

When a system is vulnerable to threat is should be well communicated and documented and an immediate setup to fix the issue should be done on a serious note. Any negligence would result in crashing of the application.

Answer 17) a) Calling web pages directly without credentials

d) Sending input to a program that causes it to crash

Security is a major concern in e-commerce and also the texts that are being send can have malicious and viruses injected into the system which would result in crashing the system.

Answer 21) a) Spoofing

Answer 22) d) Elevation of Privilege

Answer 23) b) Denial-of-Service

Any unavailable data threats the availability.

The answers against the question number are mentioned with explanation.

Hope this answer helps. :) Happy to help :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote