發表文章

Module 3: Secure Application Design and Architecture

圖片
1.Which security design principle minimize the risk by reducing the number of entry point in an application? A) Apply Defence in depth B) Security through Obscurity C) Reduce Attack Surface D) Fail Securely  'Apply Defence in depth' is a principle that suggests multiple levels of security controls should be placed throughout an IT system.  'Security through Obscurity' is a principle that suggests security can be achieved by hiding the system or system's design.  'Fail Securely' is a concept where an application should handle errors by shifting to a state that prevents unintended access or data exposure. 2.In which threat modelling phase application is decomposed , and its entry points are reviewed from an attacker's perspective ? A) Control Recommendations B) Impact Analysis C) Threat Identification D) Attack Surface Evaluation Control Recommendations phase involves the process of recommending controls to deal with potential threats. Impact Analysis in...

Module 2: Security Requirements Gathering

圖片
  安全用例來自濫用案例 1.In the Derived Approach, what we don't include? A) Abuse Case B) Security Use Case C) Abuse Stories D) Octave Octave (Operationally Critical Threat, Asset, and Vulnerability Evaluation) , a risk-based strategic assessment and planning technique, is not included in the Derived Approach for system security. 2.Abuse Case is derived from______. A) Use Case B) Abuse Case C) Security Use Case D) Abuse Stories Abuse Case is a derivative of Use Case. It refers to a scenario where an application may be used in harmful ways by adversaries. So, it is derived from the Use Case by testing the extent to which it can be exploited. A Security Use Case deals with potential security threats, it doesn't give the scenarios in which an application can be used unfavorably. Hence, it can't be the origin of an Abuse Case. Abuse Stories, like User Stories in agile development, detail nefarious actions towards a software system. However, they aren't used to derive an Abuse Case; i...

Module 1: Understanding Application Security, Threats, and Attacks

圖片
1.Identify the type of attack depicted in the following figure. A. Denial-of-service attack B. SQL Injection attack C. Directory Traversal Attack D. Form Tampering Attack 2.Which of the following utilities can be used to compile managed assemblies into processor-specific native code? 以下哪些工具可以用來將受管理的組件編譯成處理器特定的原生代碼? A) gacutil B) ngen C) sn D) dumpbin 3.Which of the following components of the .NET framework provide an extensible set of classes that can be used by any .NET compliant programming language? 以下哪一種 .NET 框架的組件提供了可擴展的類別集,可以被任何 .NET 兼容的程式語言使用? A) .NET class libraries B) Common Language Runtime C) Common Language Infrastructure D) Component Object Model 4.Which of the following statements correctly define .NET Framework? A) It is an environment for developing, building, deploying and executing Desktop Applications, Web Applications and Web Services. B) It is an environment for developing, building, deploying and executing only Web Applications. C) It is an environment for develo...

Lab 06 - Implement Network Traffic Management

圖片
  https://microsoftlearning.github.io/AZ-104-MicrosoftAzureAdministrator.zh-tw/Instructions/Labs/LAB_06-Implement_Network_Traffic_Management.html Task 1: Use a template to provision an infrastructure Task 2: Configure an Azure Load Balancer Note: Notice the Load Balancer is distributing across two virtual machines in the same virtual network. 當Type選Internal時候Tier只能選Regional Create a load balancer with the following settings (leave others with their default values) then click Next: Frontend IP configuration: click Next: Frontend IP configuration: click Add a frontend IP configuration and use the following settings: Add a rule to determine how incoming traffic is distributed 172.212.60.13 (az104-lbpip) 嘗試多開(無痕)分頁不斷刷新 Task 3: Configure an Azure Application Gateway 20.115.90.178 http://20.115.90.178/image/ http://20.115.90.178/video/ Ref: https://learn.microsoft.com/zh-tw/training/modules/improve-app-scalability-resiliency-with-load-balancer/ https://learn.microsoft.com/zh-tw/training/...