00:00

QUESTION 11

What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?

Correct Answer: A

QUESTION 12

How does network visualisation assist in managing information security?

Correct Answer: D

QUESTION 13

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

Correct Answer: D

QUESTION 14

Which of the following is an asymmetric encryption algorithm?

Correct Answer: D
https://www.omnisecu.com/security/public-key-infrastructure/asymmetric-encryption-algorithms.php

QUESTION 15

Ensuring the correctness of data inputted to a system is an example of which facet of information security?

Correct Answer: B