List of questions
Related questions
Question 28 - 312-96 discussion
The threat modeling phase where applications are decomposed and their entry points are reviewed from an attacker's perspective is known as ________
A.
Attack Surface Evaluation
B.
Threat Classification
C.
Threat Identification
D.
Impact Analysis
Your answer:
0 comments
Sorted by
Leave a comment first