Threat modeling is conducted during which of the following phases of the SDLC?
A. Requirements
B. Design
C. Development
D. Testing
E. Deployment
Answer: B
Explanation: Threat modeling and security design reviews are the two major processes of the design phase.
You might also like to view...
Explain why the three-level organization of a transaction processing system (including transaction servers) is said to be scalable to large enterprise-wide systems. Discuss issues of cost, security, maintainability, authentication, and authorization.
What will be an ideal response?
Describe the tunneling transition to IPv6 method.
What will be an ideal response?
In order for a VLAN to get its name, what is typically appended to the word "VLAN"?
A. A number B. A slash C. An IP address D. A MAC address
An irreversible process used to reduce the size of Photoshop files is called ____.
A. parsing B. data parsing C. flattening D. compacting