Which of the follow...
 
Notifications
Clear all

Which of the following methodologies would BEST address this task?

1 Posts
1 Users
0 Likes
124 Views
(@colmenerocarmelo)
Posts: 746
Noble Member
Topic starter
 

A security analyst needs to identify possible threats to a complex system a client is developing .

Which of the following methodologies would BEST address this task?

  • A . Open Source Security Information Management (OSSIM)
    B. Software Assurance Maturity Model (SAMM)
    C. Open Web Application Security Project (OWASP)
    D. Spoofing, Tampering. Repudiation, Information disclosure. Denial of service, Elevation of privileges (STRIDE)

Show Answer Hide Answer

Suggested Answer: C
 
Posted : 11/02/2023 12:13 pm
Topic Tags

Latest CS0-002 V2 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: