Threat modeling is conducted during which of the following phases of the SDLC?

A. Requirements
B. Design
C. Development
D. Testing
E. Deployment


Answer: B
Explanation: Threat modeling and security design reviews are the two major processes of the design phase.

Computer Science & Information Technology

You might also like to view...

Explain why the three-level organization of a transaction processing system (including transaction servers) is said to be scalable to large enterprise-wide systems. Discuss issues of cost, security, maintainability, authentication, and authorization.

What will be an ideal response?

Computer Science & Information Technology

Describe the tunneling transition to IPv6 method.

What will be an ideal response?

Computer Science & Information Technology

In order for a VLAN to get its name, what is typically appended to the word "VLAN"?

A. A number B. A slash C. An IP address D. A MAC address

Computer Science & Information Technology

An irreversible process used to reduce the size of Photoshop files is called ____.

A. parsing B. data parsing C. flattening D. compacting

Computer Science & Information Technology