Skip to main content

This Weeks Discussion Is Designed To Review The Semester And

Page 1

This Weeks Discussion Is Designed To Review The Semester And Leads To This week's discussion is designed to review the semester and leads to the final exam. Complete the following: 1) Write (2) questions that are appropriate for the final exam. (Multiple choice - 4 choices.) 2) Create a new thread for each new question (2 threads) 3) Publish (3) comments on other students' questions. Make substantive comments that show that you have read (and thought about) other students' questions. Question format: What does the "S" stand for in STRIDE? a. Secure *b. Spoofing c. Sanitizing d. Serial So, to summarize, you have (5) actions to complete (2 posts, 3 comments). Also need answer for these.. questions we going to post. ------------------------------------------------------------------------- Sample other student questions (also need answers to reply for these): ------------------------------------------------------------------------- 2) What is the fourth step in threat risk modeling process? a) Application Overview b) Identify vulnerabilities c) Identify threats d) Decompose Application ----------------------------------------------------------------------------- Hello Friends, Here is my question 1 for final exam 1) What are the general approaches for threat modeling?(Choose options which are applicable) a)Software Centric b) Attacker Centric c) Data Centric d) All of the above -----------------------------------------------------------------------------

Paper For Above instruction The discussion aims to facilitate students’ review of the semester and prepare for the final exam by engaging them in creating relevant multiple-choice questions, commenting on peer questions, and reinforcing their understanding of key concepts. Specifically, students are asked to develop two multiple-choice questions suitable for the final exam, each in a separate discussion thread. These questions should include four answer options, with correct answers clearly identified. Additionally, participants are required to post three substantive comments assessing or elaborating on other students’ questions, demonstrating critical engagement and comprehension of the material. To exemplify, a sample question related to signature questions in threat modeling is: “What does the ‘S’ stand for in STRIDE?” with options: a. Secure, b. Spoofing, c. Sanitizing, d. Serial. The correct answer is b. Spoofing. This highlights the importance of understanding threat classification, which is central to security risk assessments. Another example includes questions about the steps in threat risk modeling, such as “What is the fourth step in the threat risk modeling process?” with options: a) Application Overview, b) Identify vulnerabilities, c) Identify threats, d) Decompose Application, where the correct answer is d)


Turn static files into dynamic content formats.

Create a flipbook