in Technology by

Which of the following can be defined as a family of activities for enhancing security by identifying objectives and vulnerabilities

and then defining countermeasures to prevent or mitigate the effects of the threats to the system?

(1)Threat modeling

(2)None of the options

(3)Dynamic Analysis

(4)Static Analysis

1 Answer

0 votes
by
Correct answer is:-(1)Threat modeling

Related questions

0 votes
0 votes
0 votes
    Fixing of security vulnerabilities in a system by additional programs is known as __________ patches. (a) hacking (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test. 1. RASP 2. IAST 3. SAST 4. DAST...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    CVE is a directory of lists of publicly recognized information security vulnerabilities as well as exposures. (a) True (b ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    When a function is defined then the system stores parameters and local variables in an area of memory. What this memory is known as?...
asked Nov 26, 2020 in Technology by JackTerrance
0 votes
    Which one of the following can be considered as the class of computer threats? Dos Attack Phishing Soliciting Both A and C...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    In __________ phase the hacker exploits the network or system vulnerabilities. (a) Scanning (b) Maintaining access (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______. A. $850000 B. $750000 C. $650000 D. $550000...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which of the following security activities is carried out during the coding phase? 1. Security Architecture review 2. All the options 3. Environment hardening 4. Core Inspections...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    A centrally managed solution that protects networks and all their endpoints against threats with the help of ... Endpoint Protection 3. Endpoint Security 4. Network Security...
asked Oct 24, 2020 by JackTerrance
0 votes
    What are the threats to National Security? Please answer the above question....
asked Aug 18, 2022 in Education by JackTerrance
...