Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 6 What is the focus of privacy? a. Data b. The individual c. Confidenti

ID: 3700594 • Letter: Q

Question

QUESTION 6 What is the focus of privacy? a. Data b. The individual c. Confidentiality d. Being undetected 10.00000 points

QUESTION 7 What is one drawback to focusing on assets when threat modeling? a. Stepping stones may be lower in priority b. Impossible to enumerate all assets c. Difficult to place a value on assets d. Asset valuation is an accounting concept, not security 10.00000 points

QUESTION 8 What is the most likely response an attacker will have to a mitigation you have deployed? a. Defeat the mitigation control b. Attack some other system c. Look for an easier attack path d. Give up 10.00000 points

QUESTION 9 What is the visual goal for presenting an attack tree? a. No more than a single page b. No more than a page for each level c. Between 1 and 3 pages d. As many pages as necessary to include all nodes 10.00000 points

QUESTION 10 What is the best way to accept risk in an internal software project? (Choose the best answer) a. Developers do this all the time b. File a bug c. Discuss the decision with management d. Via a modal dialog

Explanation / Answer

Solution:

6)

c. Confidentiality

7)

d. Asset valuation is an accounting concept, not security ?

8)

a. Defeat the mitigation control

9)

a. No more than a single page b.

10)

d. Via a modal dialog

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote