Question 1
[20]
What are the defence techniques you can implement with different stages of a Cyber Kill Chain?
Question 2
[20]
What is Threat modelling and Vulnerability discovery?
[10]
How can you architect your infrastructure and processesto be responsive to the inevitable changes
you'll face?
[10]
Question 3
[20]
How to classify access based on risk and examine best practices that enforce least privilege.
[10]
What are the Policy Framework for Authentication and Authorization Decisions
[10]
(a) How do you change your design while changing the landscape?
[10]
(b) What is the complication arriving when plan changes?
[10]
Question 5
[20]
(a) What are the techniques to deploy the response mechanism?
[10]
(b) What are the design principles for the system to be resilient under adverse or unexpected
circumstances
[10]
I•