Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 148 discussion

Actual exam question from ISC's CISSP
Question #: 148
Topic #: 1
[All CISSP Questions]

Which of the following techniques evaluates the secure design principles of network or software architectures?

  • A. Risk modeling
  • B. Waterfall method
  • C. Threat modeling
  • D. Fuzzing
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
dev46
Highly Voted 2 years, 2 months ago
Selected Answer: C
Threat Modeling approaches on below is the foundation of secure design 1) Focus on assets 2) Focus on attackers 3) Focus on software/ application
upvoted 9 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
Meowson
1 year, 4 months ago
Your reply is totally useless and not helping, stop trolling around.
upvoted 4 times
...
...
...
zilm0diafpinc
Most Recent 10 months, 2 weeks ago
C. design is the keywoard
upvoted 1 times
...
Vince_F_Fang
1 year ago
Risk modeling includes threat modeling and vulnerability modeling. This question evaluates security design principles and does not yet involve specific software and network architecture. There is no need to evaluate vulnerability, so only threat modeling is needed. Unfortunately, I initially saw that software and network architecture chose risk modeling, but now I have compiled the interpretation according to the correct answer🤷‍♀️
upvoted 2 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: C
The technique that evaluates the secure design principles of network or software architectures is C (Threat modeling). Threat modeling is a process used to identify potential threats and vulnerabilities in software, network, or system architectures. It involves identifying potential attackers, their capabilities, and the types of attacks they may carry out. Threat modeling considers the system's design and implementation to identify weaknesses and potential vulnerabilities before they can be exploited. Risk modeling (A) is a broader process that includes identifying potential risks to an organization, assessing their likelihood and impact, and developing strategies to mitigate or manage those risks.
upvoted 2 times
...
Bach1968
1 year, 4 months ago
Selected Answer: C
The technique that evaluates the secure design principles of network or software architectures is threat modeling. Threat modeling is a structured approach used to identify, assess, and mitigate potential threats and vulnerabilities in a system or application. It involves analyzing the system's components, data flows, and potential attack vectors to identify potential threats and their potential impact. By evaluating the secure design principles of network or software architectures, organizations can identify and address security weaknesses early in the development lifecycle. Therefore, the correct answer is C. Threat modeling.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...