Questions

  1. Threat modeling is only related to developers. QAs, architects, or operation teams don't need to get involved. True or false?
  2. Which of the following modules should apply threat modeling?
    1. Legacy modules
    2. Modules with external interaction with third-party vendors
    3. Modules that handle personal information
    4. All of the above
  1. Which of the following is a security mitigation for Repudiation?
    1. Hash
    2. Authentication logging
    3. Load balance
    4. Encryption
  2. Which one of the following is not mainly used for threat library references?
    1. CAPE
    2. ATTCK
    3. SeaSponge
    4. CWE
  3. Which one of the following is not related to the authentication security framework?
    1. Shiro
    2. Spring Security
    3. VisualCaptcha
    4. Java Commons Validator

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.