ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 28 - 312-96 discussion

Report
Export

The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________

A.
Attack Surface Evaluation
Answers
A.
Attack Surface Evaluation
B.
Threat Classification
Answers
B.
Threat Classification
C.
Threat Identification
Answers
C.
Threat Identification
D.
Impact Analysis
Answers
D.
Impact Analysis
Suggested answer: A
asked 18/09/2024
Prinesh Chain
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first