Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 139 discussion

Actual exam question from ISC's CISSP
Question #: 139
Topic #: 1
[All CISSP Questions]

What testing technique enables the designer to develop mitigation strategies for potential vulnerabilities?

  • A. Source code review
  • B. Threat modeling
  • C. Penetration testing
  • D. Manual inspections and reviews
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
dev46
Highly Voted 2 years, 2 months ago
Selected Answer: B
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified and enumerated, and countermeasures prioritized. - Source (Wiki)
upvoted 7 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
franbarpro
Highly Voted 2 years, 1 month ago
Selected Answer: B
Threat modeling is a proactive method of uncovering threats not usually considered or found through code reviews and other types of audits - Techtarget
upvoted 6 times
...
TheManiac
Most Recent 6 months, 1 week ago
Selected Answer: B
potential vulnerabilities = Threat modeling
upvoted 1 times
...
Vasyamba1
8 months ago
Taking my words back. From the OSG about the SAMM Model - Design The process used by the organization to define software requirements and create software. This function includes practices for threat modeling, threat assessment, security requirements, and security architecture. So, B is probably correct.
upvoted 1 times
...
Vasyamba1
8 months ago
Selected Answer: A
As for me, the designer has nothing to do with threat modeling and pentesting.
upvoted 1 times
...
Vince_F_Fang
1 year ago
The keyword is the designer, indicating that it is in the design phase
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: B
The correct answer is B. Threat modeling is a testing technique that enables the designer to develop mitigation strategies for potential vulnerabilities in software. It involves identifying potential threats and vulnerabilities in a software system and then developing and implementing strategies to mitigate those threats and vulnerabilities. This process can help to ensure that a software system is secure and can help to prevent security breaches and other types of cyber attacks. The other options listed are also testing techniques that can be used to identify potential vulnerabilities in software, but they do not directly enable the designer to develop mitigation strategies for those vulnerabilities.
upvoted 2 times
...
rootic
2 years ago
Selected Answer: A
It's A. Is source code review a testing technique? - Yes Is it enables the designer to develop mitigation strategies for potential vulnerabilities? - Yes Threat modeling is testing technique ? - No Pentest allow to remidiate vulns that was fount and not potential. Clearly answer is A.
upvoted 1 times
...
rootic
2 years ago
"What testing technique..." Threat modeling is testing technique ?
upvoted 4 times
...
Rollizo
2 years, 1 month ago
threat modeling also implements test during the development phase
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...