List of questions
Related questions
Question 935 - CISA discussion
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
A.
Threat modeling
B.
Concept mapping
C.
Prototyping
D.
Threat intelligence
Your answer:
0 comments
Sorted by
Leave a comment first