Question 1
What is the primary goal of Threat Modeling?
To detect vulnerabilities after an attack occurs
To identify and mitigate potential threats before they can be exploited
To enhance the performance and responsiveness of a system
To automate the execution of penetration tests
Question 2
Which of the following is NOT a direct component of a threat model?
Identifying potential threats and vulnerabilities
Defining mitigation actions for identified risks
Listing specific attack vectors separately as a standalone element
Validating the effectiveness of implemented controls
Question 3
Which methodology uses the STRIDE mnemonic for threat modeling?
STRIDE-DREAD
STRIDE
DREAD
STRIDE-PASTA
Question 4
What is a major limitation of using a Data Flow Diagram (DFD) for threat modeling?
It requires detailed technical documentation to create
It demands advanced security domain expertise
It does not accurately represent the dynamic behavior of the application
It is primarily useful for developers rather than security analysts
Question 5
In which type of attack surface do hackers exploit vulnerabilities in software, websites, and cloud services?
Logical Attack Surface
Virtual Attack Surface
Network Attack Surface
Digital Attack Surface
Question 6
Which of the following is NOT a step in Attack Surface Management (ASM)?
Discovery of security weaknesses
Continuous monitoring and alerting
Forecasting specific future cyberattacks
Applying security patches to identified issues
Question 7
What does the term "Broken Access Control" refer to?
Unauthorized access to data due to misconfigured authentication mechanisms
Exploiting outdated or deprecated authentication methods to gain entry
Unauthorized access to resources caused by weak or missing enforcement of access restrictions
Exploiting outdated or deprecated authentication methods to gain entry
Question 8
Which cryptographic issue is related to the failure to properly secure sensitive data in transit or at rest?
Weak Encryption Implementation
Cryptographic Failures
Insecure Data Storage
Security Misconfiguration
Question 9
Which OWASP vulnerability is associated with using untrusted input in database queries?
Injection
SQL Misconfiguration
Command Injection
Data Exposure
Question 10
What is a key characteristic of the "Insecure Design" vulnerability?
Security features are implemented incorrectly in the code.
Data is transmitted without using adequate encryption methods.
Security considerations were not addressed during the product’s design phase.
Authentication features are implemented in a weak or outdated manner.
There are 10 questions to complete.