What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
Correct Answer:
A
How does network visualisation assist in managing information security?
Correct Answer:
D
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Correct Answer:
D
Which of the following is an asymmetric encryption algorithm?
Correct Answer:
D
https://www.omnisecu.com/security/public-key-infrastructure/asymmetric-encryption-algorithms.php
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
Correct Answer:
B