Understanding STRIDE and Threat Modelling

Understanding STRIDE and Threat Modelling

University

14 Qs

quiz-placeholder

Similar activities

iCreate - Maya Basics Modelling

iCreate - Maya Basics Modelling

University

12 Qs

Processing Data - Unit 1

Processing Data - Unit 1

University

10 Qs

Rekayasa Perangkat Lunak Review

Rekayasa Perangkat Lunak Review

University

11 Qs

AD3301-T1

AD3301-T1

University

10 Qs

Cybersecurity Threat Modeling

Cybersecurity Threat Modeling

University

10 Qs

Requirement Engineering

Requirement Engineering

University

10 Qs

Survey Post Pelatihan SGeMS T.Pertambangan UNEJ

Survey Post Pelatihan SGeMS T.Pertambangan UNEJ

University

16 Qs

Database - ERM - A Level AQA

Database - ERM - A Level AQA

11th Grade - University

10 Qs

Understanding STRIDE and Threat Modelling

Understanding STRIDE and Threat Modelling

Assessment

Quiz

Computers

University

Easy

Created by

Joshua Richards

Used 2+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'S' in STRIDE stand for in the context of threat modelling?

Spoofing

Scanning

Scripting

Spamming

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary goal of threat modelling?

To increase the complexity of a system

To identify potential security issues

To reduce system performance

To enhance user interface design

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the STRIDE model, what does 'T' represent?

Tampering

Tracking

Testing

Tunnelling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat category in STRIDE is concerned with the unauthorised exposure of data?

Denial of Service

Information Disclosure

Elevation of Privilege

Repudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of the 'Elevation of Privilege' category in STRIDE?

Gaining unauthorised access to resources

Disrupting service availability

Modifying data without permission

Intercepting data in transit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common technique used in threat modelling?

Data Flow Diagrams

Waterfall Model

Agile Development

Gantt Charts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In threat modelling, what is the purpose of using a Data Flow Diagram (DFD)?

To illustrate the user interface design

To map out the flow of data within a system

To create a timeline for project completion

To list all possible software bugs

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?