List of questions
Related questions
Question 792 - CISSP discussion
What is the threat modeling order using process for Attack simu-lation and threat analysis (PASTA)?
A.
Application decomposition, threat analysis, vulnerability detection, attack enumeration, risk/impact analysis
B.
Threat analysis, vulnerability detection, application decomposition, attack enumeration, risk/Impact analysis
C.
Risk/impact analysis, application decomposition, threat analysis, vulnerability detection, attack enumeration
D.
Application decomposition, threat analysis, risk/impact analysis, vulnerability detection, attack enumeration
Your answer:
0 comments
Sorted by
Leave a comment first