View all questions & answers for the CPIM-8.0 exam
What order BEST reflects the steps when adding threat modeling practices to a Software Development Life Cycle (SDLC)?
Inventory use cases, categorize threats, evaluate business impact
Understand attack front, identify trust levels, decompose application
Inventory countermeasures, identify threats, implement mitigations
Establish monitoring, identify risks, implement countermeasures
Submit