Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which secure software design principle states that it is always safer to require agreement of more than one entity to make a decision?

A.

Least Privilege

B.

Total Mediation

C.

Separation of Privileges

D.

Psychological Acceptability

What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?

A.

Inputs enforce type, format, length, and range checks.

B.

All administrative activities are logged and audited.

C.

Sensitive information is not logged.

D.

All exceptions are handled in a structured way.

Which threat modeling methodology involves creating or using collections of similar threats?

A.

Data Flow Diagrams

B.

Attack Libraries

C.

Attack Trees

D.

Security Profile

Which secure coding best practice says to assume all incoming data should be considered untrusted and should be validated to ensure the system only accepts valid data?

A.

General coding practices

B.

Input validation

C.

Session management

D.

System configuration

Which threat modeling step collects exploitable weaknesses within the product?

A.

Analyze the target

B.

Rate threats

C.

Identify and document threats

D.

Set the scope