Question 1
Which of the following best describes the principle of 'defense in depth' in secure system design?
Question 2
In secure system design, what is the primary purpose of implementing 'fail-safe defaults'?
Question 3
Which of the following vulnerabilities is primarily associated with improper memory management?
Question 4
What is the main goal of threat modeling in secure system design?
Question 5
Which access control model is characterized by the use of predefined roles to assign permissions?