1.

A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attackers pov is called __

Answer»

A process by which potential vulnerabilities and threats can be recognized, enumerated, and PRIORITIZED from a hypothetical attackers POV is called ___________.
Choose the CORRECT options from below LIST
(1)Threat Hunting
(2)Threat Modeling
(3)Threat Landscaping
(4)Threat Analysis

Answer:-(2)Threat Modeling



Discussion

No Comment Found