ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 792 - CISSP discussion

Report
Export

What is the threat modeling order using process for Attack simu-lation and threat analysis (PASTA)?

A.
Application decomposition, threat analysis, vulnerability detection, attack enumeration, risk/impact analysis
Answers
A.
Application decomposition, threat analysis, vulnerability detection, attack enumeration, risk/impact analysis
B.
Threat analysis, vulnerability detection, application decomposition, attack enumeration, risk/Impact analysis
Answers
B.
Threat analysis, vulnerability detection, application decomposition, attack enumeration, risk/Impact analysis
C.
Risk/impact analysis, application decomposition, threat analysis, vulnerability detection, attack enumeration
Answers
C.
Risk/impact analysis, application decomposition, threat analysis, vulnerability detection, attack enumeration
D.
Application decomposition, threat analysis, risk/impact analysis, vulnerability detection, attack enumeration
Answers
D.
Application decomposition, threat analysis, risk/impact analysis, vulnerability detection, attack enumeration
Suggested answer: A
asked 18/09/2024
alvaro Vasconcelos
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first