• Tutorials
  • Courses
  • Tracks

Cyber Quiz 19

Last Updated :
Discuss
Comments

Question 1

What is the primary goal of Threat Modeling?

  • To detect vulnerabilities after an attack occurs

  • To identify and mitigate potential threats before they can be exploited

  • To enhance the performance and responsiveness of a system

  • To automate the execution of penetration tests


Question 2

Which of the following is NOT a direct component of a threat model?

  • Identifying potential threats and vulnerabilities

  • Defining mitigation actions for identified risks

  • Listing specific attack vectors separately as a standalone element

  • Validating the effectiveness of implemented controls

Question 3

Which methodology uses the STRIDE mnemonic for threat modeling?

  • STRIDE-DREAD

  • STRIDE

  • DREAD

  • STRIDE-PASTA

Question 4

What is a major limitation of using a Data Flow Diagram (DFD) for threat modeling?

  • It requires detailed technical documentation to create

  • It demands advanced security domain expertise

  • It does not accurately represent the dynamic behavior of the application

  • It is primarily useful for developers rather than security analysts

Question 5

In which type of attack surface do hackers exploit vulnerabilities in software, websites, and cloud services?

  • Logical Attack Surface

  • Virtual Attack Surface

  • Network Attack Surface

  • Digital Attack Surface

Question 6

Which of the following is NOT a step in Attack Surface Management (ASM)?

  • Discovery of security weaknesses

  • Continuous monitoring and alerting

  • Forecasting specific future cyberattacks


  • Applying security patches to identified issues

Question 7

What does the term "Broken Access Control" refer to?

  • Unauthorized access to data due to misconfigured authentication mechanisms

  • Exploiting outdated or deprecated authentication methods to gain entry

  • Unauthorized access to resources caused by weak or missing enforcement of access restrictions

  • Exploiting outdated or deprecated authentication methods to gain entry

Question 8

Which cryptographic issue is related to the failure to properly secure sensitive data in transit or at rest?

  • Weak Encryption Implementation

  • Cryptographic Failures

  • Insecure Data Storage

  • Security Misconfiguration

Question 9

Which OWASP vulnerability is associated with using untrusted input in database queries?


  • Injection

  • SQL Misconfiguration

  • Command Injection

  • Data Exposure

Question 10

What is a key characteristic of the "Insecure Design" vulnerability?

  • Security features are implemented incorrectly in the code.

  • Data is transmitted without using adequate encryption methods.

  • Security considerations were not addressed during the product’s design phase.

  • Authentication features are implemented in a weak or outdated manner.

There are 10 questions to complete.

Take a part in the ongoing discussion