Which security practice applied at the SAMM construction business function level identifies potential attacks against an organization's software to help it better understand the risks and improve the ability to manage them?

A. Secure architecture
B. Attack assessment
C. Security requirements
D. Threat assessment


Answer: D

Computer Science & Information Technology

You might also like to view...

If you accidentally insert a new row in a New Address List, click the row selector box in the row and press the ________ Entry button

A) Erase B) Hide C) Undo D) Delete

Computer Science & Information Technology

Which of the following is NOT true about a PivotChart?

A) They can be formatted similar to a regular chart. B) They function independently from the PivotTable. C) They update as the PivotTable updates. D) They can be placed on a separate worksheet.

Computer Science & Information Technology

? ? Referring to the code shown in the figure above, which element specifies the path and filename of the video file for older browsers?

A. video B. source C. object D. param

Computer Science & Information Technology

Which of the following is true of internal control?

a. It renews the health insurance of the taxpayers. b. It checks bank statements of the citizens for accuracy. c. It verifies thetaxpayers of a country for their income. d. It protects an organization’s resources.

Computer Science & Information Technology