Exam CS0-003 All QuestionsBrowse all questions from this exam
Question 229

Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?

    Correct Answer: C

    Decomposing the application is a crucial step in threat modeling because it involves understanding the components and architecture of the application, which helps in identifying potential vulnerabilities and threats. This procedure is part of the OWASP Web Security Testing Guide, which emphasizes breaking down the application to understand its structure, data flow, and potential weaknesses.

Discussion
MatariaOption: C

Broadly speaking, the process of threat modeling involves five essential steps Identify and define security objectives Analyze and decompose the application Identify and rank potential threats Establish countermeasures and mitigation strategies Generate a comprehensive threat modeling repor