Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Can anyone help with quiz QUESTION 1 The best time to threat model is: At the st

ID: 3733490 • Letter: C

Question

Can anyone help with quiz

QUESTION 1

The best time to threat model is:

At the start of the project

As you work through the features

Both A and B

A but not B

5.00000 points   

QUESTION 2

Which is an audience for external security notes?

Customers

Agents

API Callers

Both A and C

5.00000 points   

QUESTION 3

Good security design involves:

Minimizing risk through appropriate design

Hiring brilliant programmers

Enforcement of the customer/vendor trust boundary

Both A and C

5.00000 points   

QUESTION 4

What is the most important thing that designers of new technology can do?

Isolate their solution from the Internet

Implement SHA-3

Define and communicate trust relationships

Keep their design secret

5.00000 points   

QUESTION 5

The high-trust side of an API needs to do the following:

Perform all security checks inside the trust boundary

Disconnect users after 5 minutes

Both A and B

Neither A nor B

5.00000 points   

QUESTION 6

Which is an approach for mitigating spoofing?

Two-factor authentication

Kerberos authentication

Neither A nor B

Both A and B

5.00000 points   

QUESTION 7

Which is an approach for mitigating tampering?

Tripwire

Reference Monitor

Both A and B

Neither A nor B

5.00000 points   

QUESTION 8

Which is an approach for mitigating repudiation?

IP address geolocation

Device Fingerprinting

Both A and B

IP Sec

5.00000 points   

QUESTION 9

Which is an approach for mitigating Denial of Service?

Stenography

DNS Hosting

Traffic filtering

All of the above

5.00000 points   

QUESTION 10

Which is the best way to address threats to a system?

Custom solutions

IP filtering

Standard, well tested products and features

A but not C

a.

At the start of the project

b.

As you work through the features

c.

Both A and B

d.

A but not B

Explanation / Answer

Solution:

The first four subparts have been answered as per Chegg guidelines, please repost others

1)

c

Explanation:

It is always a good time to start figuring out security vulnerabilities in at the start of the project but you need to consider threat model in between as well.

2)

d. Both A and C

Explanation:

Both the customers and API callers need to learn about the security of the product.

3)

Both A and C
4)

c. Design and communicate trust relationship

5)

c.A

Perform all the security checks inside the trust boundaries.

6)

Both A and B

7)

Tripwire

8)

Both A and B

9)

d

10)

c

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)