312-85 question 17 discussion

View all Certified Threat Intelligence Analyst Exam here
back to eccouncil forum

Question 17

Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan
countermeasures against cyber attacks. She used a threat modelling methodology where she
performed the following stages:
Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans
Which of the following threat modelling methodologies was used by Lizzy in the aforementioned
scenario?

  • A. TRIKE
  • B. VAST
  • C. OCTAVE
  • D. DREAD
Answer:

C

User Votes:
A
50%
B
50%
C 1 votes
50%
D
50%
Discussions
0 / 1000
darave
4 months, 3 weeks ago

Correct answer.
Module 5 p602