In an application architecture diagram, what categories of weaknesses are considered using
Microsoft’s threat modeling process?
A.
Man-in-the-middle, Data injection, SQL Injection, Malware, Zero-day exploits
B.
Damage, Reproducibility, Exploitability, Affected users, Discoverability
C.
Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of
privilege
D.
Cross site scripting, Clickjacking, Data input validation, SSL, RSA security, Buffer overflow,
Heap smashing, ARP injection
Explanation: