A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.

Q & ACategory: Ethical HackingA process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.
Admin Staff asked 5 years ago

A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker’s pov is called ___________.

A)Threat Modeling
B)Threat Landscaping
C)Threat Analysis
D)Threat Hunting

1 Answers
Admin Staff answered 5 years ago

A)Threat Modeling