Question
QUESTION 16 Which of these is not an appropriate way to address a threat? a. Fix it b. Accept it c. Document it internally so
QUESTION 16 Which of these is not an appropriate way to address a threat? a. Fix it b. Accept it c. Document it internally so you can manage it in the next release d. Transfer the risk 10.00000 points
QUESTION 17 Which two are examples of E threats (in STRIDE)? a. Calling web pages directly without credentials b. Claiming that a package was never received c. Finding crypto keys on disk d. Sending input to a program that causes it to crash 10.00000 points
QUESTION 18 Which two are examples of I threats (in STRIDE)? a. Sending input to a program that causes it to crash b. Using SQL injection to read database tables c. Finding crypto keys on disk d. Filling the disk with useless data 10.00000 points
QUESTION 19 Which two are examples of R threats (in STRIDE)? a. Calling web pages directly without credentials b. Claiming that a package was never received c. Filling logs files with useless data d. Finding crypto keys on disk 10.00000 points
QUESTION 20 Which two are examples of S threats (in STRIDE)? a. Creating an executable file in a local directory b. Redirecting an IP address to another host c. Finding crypto keys on disk d. Claiming that a package was never received
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started