4. Architecture and Design

Security By Design — Quiz

Test your understanding of security by design with 5 practice questions.

Read the lesson first

Practice Questions

Question 1

Which of the following describes a key challenge in integrating security principles into complex university systems, particularly concerning legacy infrastructure and diverse stakeholder requirements?

Question 2

In the context of 'Security by Design' for university systems, what is the most effective approach to 'threat modeling' when dealing with highly sensitive research data?

Question 3

When designing a secure university system, which 'mitigation' strategy is most crucial for protecting against advanced persistent threats (APTs) targeting intellectual property?

Question 4

Consider a university's student information system that processes sensitive personal data. Which principle of 'Security by Design' would primarily guide the architectural decision to encrypt data both at rest and in transit?

Question 5

A university is developing a new online learning platform. To integrate security effectively from the outset, which of the following actions should be prioritized during the initial requirements gathering phase?