Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 16 Which of these is not an appropriate way to address a threat? a. Fix it b. Accept it c. Document it internally so

QUESTION 16 Which of these is not an appropriate way to address a threat? a. Fix it b. Accept it c. Document it internally so you can manage it in the next release d. Transfer the risk 10.00000 points

QUESTION 17 Which two are examples of E threats (in STRIDE)? a. Calling web pages directly without credentials b. Claiming that a package was never received c. Finding crypto keys on disk d. Sending input to a program that causes it to crash 10.00000 points

QUESTION 18 Which two are examples of I threats (in STRIDE)? a. Sending input to a program that causes it to crash b. Using SQL injection to read database tables c. Finding crypto keys on disk d. Filling the disk with useless data 10.00000 points

QUESTION 19 Which two are examples of R threats (in STRIDE)? a. Calling web pages directly without credentials b. Claiming that a package was never received c. Filling logs files with useless data d. Finding crypto keys on disk 10.00000 points

QUESTION 20 Which two are examples of S threats (in STRIDE)? a. Creating an executable file in a local directory b. Redirecting an IP address to another host c. Finding crypto keys on disk d. Claiming that a package was never received

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DNA Databases

Authors: Stefan Kiesbye

1st Edition

0737758910, 978-0737758917

More Books

Students also viewed these Databases questions