which phase?

In the software security development life cyle process, threat modeling occurs in which phase?

In the software security development life cyle process, threat modeling occurs in which phase?

A.
Design

B.
Requirements

C.
Verification

D.
Implementation



Leave a Reply 2

Your email address will not be published. Required fields are marked *


TiltHatHacker

TiltHatHacker

How is related to CEH??

jay

jay

I know this is a question that would show up in the CISSP exam. I don’t recall ever learning about SDLC in the official CEH course.