ExamGecko
Question list
Search
Search

Related questions











Question 935 - CISA discussion

Report
Export

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?

A.
Threat modeling
Answers
A.
Threat modeling
B.
Concept mapping
Answers
B.
Concept mapping
C.
Prototyping
Answers
C.
Prototyping
D.
Threat intelligence
Answers
D.
Threat intelligence
Suggested answer: A

Explanation:

Threat modeling is an approach that enables IS auditors to identify, analyze, and mitigate potential security vulnerabilities within an application by understanding the threats, attacks, vulnerabilities, and countermeasures. This proactive technique helps in designing secure applications.

Reference

ISACA CISA Review Manual 27th Edition, Page 276-277 (Threat Modeling)

asked 18/09/2024
David Murinda
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first