Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam CPIM-8.0 All Questions
Exam CPIM-8.0 All Questions

View all questions & answers for the CPIM-8.0 exam

APICS CPIM CPIM-8.0 Question # 161 Topic 17 Discussion

CPIM-8.0 Exam Topic 17 Question 161 Discussion:
Question #: 161
Topic #: 17

Which of the following is a methodology for threat modeling in application?


A.

Disaster, Reproducibility, Exploitability, Affected Users, And Discoverability (DREAD)


B.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE)


C.

Pretend, Allow, Crash, Modify, Ascertain, Name


D.

Confidentiality, Authentication, Integrity, Nonrepudiation, Availability


Get Premium CPIM-8.0 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.