What are the software requirements specifications for each module in an application?
A. Object modeling
B. Conceptual model
C. Interaction diagrams
D. Class diagrams
Answer: D
You might also like to view...
Susan is conducting a STRIDE threat assessment by placing threats into one or more of the following categories: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. As part of her assessment, she has discovered an issue that allows transactions to be modified between a web browser and the application server that it accesses. What STRIDE categorization(s) best fit this issue?
A. Tampering and Information Disclosure B. Spoofing and Tampering C. Tampering and Repudiation D. Information Disclosure and Elevation of Privilege
SHA-2 is an example of a:
a. Message digest b. Stream cipher c. Block cipher d. Key exchange