Threat modeling is conducted during which of the following phases of the SDLC?

A. Requirements
B. Design
C. Development
D. Testing
E. Deployment

Answer: B
Explanation: Threat modeling and security design reviews are the two major processes of the design phase.

Computer Science & Information Technology

You might also like to view...

When you want to copy music from a CD to your hard drive, you can do which one of the following?

A) scan the CD B) pull the CD C) burn the CD D) rip the CD

Computer Science & Information Technology

In a switch statement, what keyword is followed by one of the possible values that might equal the switch expression?

A. case B. default C. break D. switch

Computer Science & Information Technology