5. Application Security
Threat Modeling — Quiz
Test your understanding of threat modeling with 5 practice questions.
Practice Questions
Question 1
Which risk assessment technique uses the factors Damage potential, Reproducibility, Exploitability, Affected users, and Discoverability to quantify threat risk?
Question 2
Which mitigation control is most appropriate to address Repudiation threats in STRIDE-based threat modeling?
Question 3
In an attack tree, which logical operator indicates that all child events must occur to satisfy the parent goal?
Question 4
In an attack tree, the root node "Compromise Server" has two child nodes combined by an AND operator: "Gain User-Level Access" and "Disable Logging". "Gain User-Level Access" further splits into two child nodes with an OR operator: "Exploit Vulnerability" and "Brute-Force Credentials". How many distinct attack paths to compromise the server exist?
Question 5
A security analyst discovers a vulnerability that allows attackers to escalate privileges by exploiting a misconfigured service. Under which STRIDE category does this threat fall?
