Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Can any one help with the quiz QUESTION 1 Which is not an approach for prioritizing threats? a. Wait and see b. Change detection c.

Can any one help with the quiz

QUESTION 1

Which is not an approach for prioritizing threats?

a.

Wait and see

b.

Change detection

c.

Easy fixes first

d.

FAIR

5.00000 points

QUESTION 2

Which of the following is considered a short coming of FAIR?

a.

FAIR is used to derive and articulate risk

b.

The asset and attacker-centricity of FAIR

c.

FAIR defines risk as a function of loss

d.

FAIR estimates worst-case loss

5.00000 points

QUESTION 3

Which is a factor to consider when deciding to mitigate or accept risk?

a.

Information being collected and stored

b.

Users of the system

c.

Fitness for purpose

d.

All of the above

5.00000 points

QUESTION 4

Which is a valid test of a threat mitigation?

a.

Test of the mitigation

b.

Test of the mitigation bypass

c.

B but not A

d.

Both A and B

5.00000 points

QUESTION 5

Software produced for sale should minimize:

a.

License costs

b.

Database connections

c.

Acceptance of risks

d.

Communication of threat model

5.00000 points

QUESTION 6

Which is a valid form of monitoring for the emergence of threats?

a.

Change detection

b.

Impact detection

c.

Auto detection

d.

Both A and B

5.00000 points

QUESTION 7

Which is a valid form of standard mitigation technology?

a.

Platform provided controls

b.

Operational controls

c.

Both A and B

d.

A but not B

5.00000 points

QUESTION 8

Which is a valid method for using design to eliminate risk?

a.

FAIR

b.

Comparative method

c.

Integrated method

d.

Both B and C

5.00000 points

QUESTION 9

Adding more code to a system can:

a.

Eliminate the source of security vulnerabilities

b.

Not address the source of security vulnerabilities

c.

Expand the source of security vulnerabilities

d.

A, B and C

5.00000 points

QUESTION 10

A threat tracking method that features thresholds for threat severity is a:

a.

Threshold proximinator

b.

Bug BI

c.

Both A and B

d.

Bug bar

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design And Implementation

Authors: Edward Sciore

2nd Edition

3030338355, 978-3030338350

More Books

Students also viewed these Databases questions

Question

a sin(2x) x Let f(x)=2x+1 In(be)

Answered: 1 week ago