As we conclude this chapter, here is a list of questions for you to test your knowledge regarding this chapter's content. You will find the answers in the Assessments section of the Appendix:
- Which of the following devices functions at layer 3 of the OSI model?
- Hub
- Firewall
- Switch
- Router
- Which authentication protocol uses the three-way authentication handshake?
- Kerberos
- CHAP
- PAP
- EAP
- Which of the following is not a property of STRIDE?
- Integrity
- Authentication
- Spoofing
- Authorization
- Which of these is a known OCTAVE format?
- OCTAVE - A
- OCTAVE - S
- OCTAVE - C
- OCTAVE - T
- Which of the following is not a valid phase of the network security architecture?
- Deploying
- Testing
- Scripting
- Analyzing
- The go-live support plan originates from which phase of the network security architecture?
- Deploy
- Test
- Analyze
- Build
- What component of a web application would not be part of a threat model?
- Mobile user interface
- An application's database
- Whether the website is vulnerable to hacking
- A physical threat to a company's data center