Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following best describes the threat modeling process?
Home
Threat Modeling
Which of the following best describes the threat modeling process?
0
votes
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
Which of the following best describes the threat modeling process?
Select the best answer from below options
a) Fixed
b) Iterative
c) Seldom refined
d) Deterministic
threat-modeling
threat-modeling-process
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 17, 2021
by
sharadyadav1986
Iterative best describes the threat modeling process
Correct Answer is b) Iterative
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Threat Modeling process can : a)Identify threats b) Provide countermeasures c) Stop threats from happening (Real Time) d) Help in flawless coding
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
0
votes
Q: The output of the threat modeling process is a _________ which details out the threats and mitigation steps.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-process
threat-mitigation
threat-process
ssa
0
votes
Q: DFDs-can-be-used-to-determine-the-timing/sequencing-of-the-processes
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-process
0
votes
Q: Which of the following are the advantages of threat modeling?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
advantage-threat-modeling
threat-modeling-advantages
0
votes
Q: While performing threat modeling for an application design, which of the following is the formula for calculating Risk Score?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-application-design
risk-score
ssa
0
votes
Q: What are the popular threat modeling techniques? A) Entry point identification b) Privilege boundaries c) Threat trees d) Flooding
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling-techniques
threat-modeling
threat-trees
0
votes
Q: It is better to perform threat modeling from the early stages of the SDLC.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
sdlc
0
votes
Q: Microsoft’s Threat Modeling tool uses __________ threat classification scheme.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
threat-modeling-tools
threat-classificaiton
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: Which of the following threat can be handled using access control?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-handling
threat-modeling
access-control
...