KEO1) Exam questions and answers 2026
latest update
Module 1: Foundational Security Concepts & Threat Modeling
Q1. What is a study of real-world software security initiatives organized so
companies can measure their initiatives and understand how to evolve them
over time?
A. OWASP Top 10
B. Building Security In Maturity Model (BSIMM)
C. NIST Cybersecurity Framework
D. ISO/IEC 27001
Correct ,,,answer,,,: B
Rationale: BSIMM is a study of real-world software security initiatives that
allows organizations to measure their security practices against industry peers and
understand how to evolve them over time .
Q2. What is the analysis of computer software that is performed without
executing programs?
A. Dynamic analysis
B. Static analysis
C. Fuzzing
D. Penetration testing
,Correct ,,,answer,,,: B
Rationale: Static analysis examines source code or compiled binaries without
executing the program, identifying potential vulnerabilities through code
inspection .
Q3. Which International Organization for Standardization (ISO) standard is
the benchmark for information security today?
A. ISO/IEC 27001
B. ISO/IEC 42001
C. ISO/IEC 9001
D. ISO/IEC 20000
Correct ,,,answer,,,: A
Rationale: ISO/IEC 27001 is the internationally recognized standard for
information security management systems (ISMS), providing requirements for
establishing, implementing, maintaining, and improving security .
Q4. What is the analysis of computer software that is performed by executing
programs on a real or virtual processor in real time?
A. Static analysis
B. Dynamic analysis
C. Code review
D. Design review
Correct ,,,answer,,,: B
Rationale: Dynamic analysis involves executing programs to observe behavior,
identify runtime vulnerabilities, and detect issues that only appear during
execution .
Q5. Which person is responsible for designing, planning, and implementing
secure coding practices and security testing methodologies?
A. Software developer
B. Scrum master
,C. Software security architect
D. Quality assurance analyst
Correct ,,,answer,,,: C
Rationale: The software security architect defines secure coding standards, selects
security testing approaches, and integrates security into the software development
lifecycle .
Q6. Which security principle ensures a system is designed to minimize the
amount of code exposed to attack?
A. Defense in depth
B. Least privilege
C. Attack surface reduction
D. Fail securely
Correct ,,,answer,,,: C
Rationale: Attack surface reduction minimizes exposed components, reducing
potential entry points for attackers. Examples include disabling unused services
and removing unnecessary code .
Q7. What is the primary purpose of threat modeling?
A. To design test cases
B. To identify, classify, and prioritize threats
C. To write secure code
D. To encrypt data
Correct ,,,answer,,,: B
Rationale: Threat modeling is a structured process to identify potential threats,
classify them, and prioritize which risks require mitigation based on business
impact .
Q8. In STRIDE, the "S" (Spoofing) is prevented primarily by:
A. Access control
, B. Input validation
C. Authentication
D. Encryption
Correct ,,,answer,,,: C
Rationale: Spoofing involves an attacker pretending to be someone else. Strong
authentication mechanisms (e.g., passwords, MFA, certificates) prevent identity
spoofing .
Q9. Which STRIDE threat involves unauthorized modification of data?
A. Spoofing
B. Tampering
C. Repudiation
D. Information disclosure
Correct ,,,answer,,,: B
Rationale: Tampering involves unauthorized modification of data, whether at rest,
in transit, or during processing. Integrity controls like hashing and digital
signatures mitigate tampering .
Q10. Which STRIDE threat is mitigated by non-repudiation through digital
signatures?
A. Spoofing
B. Tampering
C. Repudiation
D. Denial of service
Correct ,,,answer,,,: C
Rationale: Repudiation occurs when a user denies performing an action. Digital
signatures provide proof of origin and integrity, preventing repudiation .
Q11. Which DREAD category is based on how easily a threat exploit can be
repeated?