Threat modeling is conducted during which of the following phases of the SDLC?
A. Requirements
B. Design
C. Development
D. Testing
E. Deployment
Answer: B
Explanation: Threat modeling and security design reviews are the two major processes of the design phase.
Computer Science & Information Technology
You might also like to view...
When you want to copy music from a CD to your hard drive, you can do which one of the following?
A) scan the CD B) pull the CD C) burn the CD D) rip the CD
Computer Science & Information Technology
In a switch statement, what keyword is followed by one of the possible values that might equal the switch expression?
A. case B. default C. break D. switch
Computer Science & Information Technology