Module 3: Secure Application Design and Architecture



1.Which security design principle minimize the risk by reducing the number of entry point in an application?
A) Apply Defence in depth
B) Security through Obscurity
C) Reduce Attack Surface
D) Fail Securely


 'Apply Defence in depth' is a principle that suggests multiple levels of security controls should be placed throughout an IT system. 

'Security through Obscurity' is a principle that suggests security can be achieved by hiding the system or system's design.

 'Fail Securely' is a concept where an application should handle errors by shifting to a state that prevents unintended access or data exposure.


2.In which threat modelling phase application is decomposed, and its entry points are reviewed from an attacker's perspective?
A) Control Recommendations
B) Impact Analysis
C) Threat Identification
D) Attack Surface Evaluation


Control Recommendations phase involves the process of recommending controls to deal with potential threats.

Impact Analysis involves determining the potential consequences of a threat.

Threat Identification simply involves recognizing potential threats to the application.


3.What defines the application's dependency on outside entities such as servers ,firewalls, security policies,os ,network etc.
A) External Dependecies
B) Enumerate Entry points
C) Enumerate Trust Levels
D) Enumerate Assets

External Dependencies in an application refer to any dependency of the system that comes from outside, such as servers, firewalls, security policies, network setup, etc. Assessing these dependencies is vital to understanding the overall architecture and potential vulnerabilities in an application.

enumerating entry points refers to identifying all possible ways an attacker can enter the system, such as exposed APIs, Form submissions, and many more.

enumerating trust levels means identifying different access levels within an application, such as user access, admin access, etc.

enumerating assets involves identifying the valuable data or services of the system that an attacker might be interested in. 


4.In which phase of secure development lifecycle the threat modeling is performed?
A. Coding phase
B. Testing phase
C. Deployment phase
D. Design phase


5.Which of the threat classification model is used to classify threats during threat modeling process?

A. RED
B. STRIDE
C. DREAD
D. SMART




6.Which of the risk assessment model is used to rate the threats-based risk to the application during threat modeling process?

A. DREAD
B. SMART
C. STRIDE
D. RED




7.Identify the formula for calculating the risk during threat modeling.

A. RISK = PROBABILITY *Attack
B. RISK = PROBABILITY * ASSETS
C. RISK = PROBABILITY * DAMAGE POTENTIAL
D. RISK = PROBABILITY * VULNERABILITY







Ref:


留言

這個網誌中的熱門文章

何謂淨重(Net Weight)、皮重(Tare Weight)與毛重(Gross Weight)

(2021年度)駕訓學科筆試準備題庫歸納分析_法規是非題

經得起原始碼資安弱點掃描的程式設計習慣培養(五)_Missing HSTS Header