Microsoft's STRIDE threat assessment framework uses six categories for threats: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. If a penetration tester is able to modify audit logs, what STRIDE categories best describe this issue?

A. Tampering and information disclosure
B. Elevation of privilege and tampering
C. Repudiation and denial of service
D. Repudiation and tampering


Answer: D. Repudiation and tampering

Computer Science & Information Technology

You might also like to view...

Get methods are commonly called ___________ or ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?In the accompanying image of Microsoft Excel 2016, box A points to the _____.

A. ?manual page break B. ?automatic page break C. ?worksheet border D. ?error indicator

Computer Science & Information Technology

In the accompanying figure, item 9 points to the ____.

A. Vertical scale B. Horizontal scale C. Baseline shift D. Tracking

Computer Science & Information Technology

Taking the output of one method and using it as input for a subsequent method is accomplished through a process referred to as ____ the two methods together.

A. appending B. chaining C. binding D. linking

Computer Science & Information Technology