The process of designing a security specification and then eventually testing that specification is known as __________.
A. Threat modeling
B. Threat hunting
C. Threat intelligence
D. Threat mitigation
Ans : Threat modeling