Threat Modeling: Process, Tools & Example


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

The process of identifying assets and threats in an organization is known as _____.

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. What components of a web application would not be part of a threat model?

2. What would not be a threat to a website?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Working through the quiz and worksheet gives you the chance to check your knowledge of threat modeling and the tools it involves. Examples of this process and different types of threats are covered on the quiz.

Quiz & Worksheet Goals

Take the quiz any time to properly check your knowledge of:

  • Components of a web application that are and are not part of a threat model
  • The best defense against a physical threat to a company's data center
  • Process of identifying assets and threats in an organization
  • Threats to a website

Skills Practiced

  • Information recall - access the knowledge you have gained about components that factor into a threat model for a web server
  • Reading comprehension - ensure that you draw the most important information from the lesson on threat modeling
  • Interpreting information - verify that you can read information about the best way to protect against a physical threat to a company's data center and interpret it correctly

Additional Learning

Review more topics any time by completing the lesson, Threat Modeling: Process, Tools & Example. Thanks to this lesson, you can:

  • Define threat
  • Review goals of threat modeling
  • Identify types of external threats
  • Learn the questions suggested by the Electronic Frontier Foundation for defining threats