ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 137 - CS0-003 discussion

Report
Export

Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?

A.
Review Of security requirements
Answers
A.
Review Of security requirements
B.
Compliance checks
Answers
B.
Compliance checks
C.
Decomposing the application
Answers
C.
Decomposing the application
D.
Security by design
Answers
D.
Security by design
Suggested answer: C

Explanation:

The OWASP Web Security Testing Guide (WSTG) includes a section on threat modeling, which is a structured approach to identify, quantify, and address the security risks associated with an application. The first step in the threat odeling process is decomposing the application, which involves creating use cases, identifying entry points, assets, trust levels, and data flow diagrams for the application. This helps to understand the application and how it interacts with external entities, as well as to identify potential threats and vulnerabilities1. The other options are not part of the OWASP WSTG threat modeling process.

asked 02/10/2024
Jay Chua
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first