List of questions
Related questions
Question 68 - 212-82 discussion
Martin, a network administrator at an organization, received breaching alerts for an application. He identified that a vulnerability in the application allowed attackers to enter malicious input. Martin evaluated the threat severity and extent of damage that could be caused by this vulnerability. He then escalated the issue to the security management team to determine appropriate mitigation strategies. In which of the following threat-modeling steps did Martin evaluate the severity level of the threat?
A.
Identify vulnerabilities
B.
Application overview
C.
Risk and impact analysis
D.
Decompose the application
Your answer:
0 comments
Sorted by
Leave a comment first