During the threal modeling process for a new application that a company is launching, a security analyst needs to define methods and items to take into consideralion Which of the following are part of a known threat modeling method?

During the threal modeling process for a new application that a company is launching, a security analyst needs to define methods and items to take into consideralion Which of the following are part of a known threat modeling method?
A. Threat profile, infrastructure and application vulnerabilities, security strategy and plans
B. Purpose, objective, scope, (earn management, cost, roles and responsibilities
C. Spoofing tampering, repudiation, information disclosure, denial of service elevation of privilege
D. Human impact, adversary’s motivation, adversary’s resources, adversary’s methods

CS0-002: CompTIA CySA+ Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

One thought on “During the threal modeling process for a new application that a company is launching, a security analyst needs to define methods and items to take into consideralion Which of the following are part of a known threat modeling method?

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.