__________ constructs scenarios of the types of threats that assets can face in order to
learn who the attackers are, why they attack, and what types of attacks may occur.
a. Risk assessment
b. Attack stems
c. Vulnerability prototyping
d. Threat modeling
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here