Which of the follow...
 
Notifications
Clear all

Which of the following methodologies would BEST address this task?

1 Posts
1 Users
0 Likes
131 Views
(@casausisaiah)
Noble Member
Joined: 2 years ago
Posts: 710
Topic starter  

A security analyst needs to identify possible threats to a complex system a client is developing.

Which of the following methodologies would BEST address this task?

  • A . Open Source Security Information Management (OSSIM)
  • B . Software Assurance Maturity Model (SAMM)
  • C . Open Web Application Security Project (OWASP)
  • D . Spoofing, Tampering. Repudiation, Information disclosure. Denial of service, Elevation of privileges (STRIDE)

Show Answer Hide Answer

Suggested Answer: C

   
Quote
Topic Tags

Latest CS0-002 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: