Fundamentals of Secure Software - Microsoft Threat Model Tool demo

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the new features added to the Microsoft Threat Modeling Tool?
Voice command support
Predefined templates
Automated threat resolution
Real-time collaboration
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which stencil is NOT typically used in a simple web application threat model?
User interface
Data flow
Data store
Processes
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of defining trust boundaries in a threat model?
To increase data flow speed
To separate different security zones
To enhance visual appeal
To reduce the number of stencils
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to configure element properties in the threat model?
To increase the size of the model
To improve threat identification
To reduce the number of threats
To change the color of the stencils
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the Microsoft Threat Modeling Tool use to categorize threats?
NIST
STRIDE
DREAD
OWASP
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can you do if a threat is marked as high priority but you disagree?
Change it to medium priority
Ignore it
Add more stencils
Delete the threat
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In what format can you generate a report from the threat model?
TXT
CSV
DOCX
Similar Resources on Wayground
8 questions
Fundamentals of Secure Software - Type of Threat Modeling

Interactive video
•
University
2 questions
Fundamentals of Secure Software - Microsoft Threat Model Tool demo

Interactive video
•
University
6 questions
Fundamentals of Secure Software - Prepping for Microsoft Threat Model Tool

Interactive video
•
University
8 questions
Threat Modeling

Interactive video
•
University
8 questions
Threat Modeling

Interactive video
•
University
8 questions
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design

Interactive video
•
University
2 questions
CISSP Crash Course - Threat Modeling

Interactive video
•
University
4 questions
A Detailed Guide to the OWASP Top 10 - #4 Insecure Design

Interactive video
•
University
Popular Resources on Wayground
10 questions
SR&R 2025-2026 Practice Quiz

Quiz
•
6th - 8th Grade
30 questions
Review of Grade Level Rules WJH

Quiz
•
6th - 8th Grade
6 questions
PRIDE in the Hallways and Bathrooms

Lesson
•
12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
15 questions
Subtracting Integers

Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
34 questions
WH - Unit 2 Exam Review -B

Quiz
•
10th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
10 questions
Transition Words

Quiz
•
University
5 questions
Theme

Interactive video
•
4th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
10 questions
Spanish Greetings and Goodbyes!

Lesson
•
6th Grade - University