Which of the following is a process for assessing and documenting the weaknesses or security risks associated with an application?

  1. Control Identification

  2. Threat Modeling

  3. Control Prioritization

  4. Attack Surface Evaluation


Correct Option: B

AI Explanation

To answer this question, you need to understand the process of assessing and documenting weaknesses or security risks associated with an application.

Let's go through each option to understand why it is correct or incorrect:

A. Control Identification - This option is incorrect because control identification refers to the process of identifying and documenting the controls that are in place to mitigate risks, rather than assessing weaknesses or security risks associated with an application.

B. Threat Modeling - This option is correct. Threat modeling is a process for assessing and documenting the weaknesses or security risks associated with an application. It involves identifying potential threats, analyzing their impact and likelihood, and prioritizing them for mitigation.

C. Control Prioritization - This option is incorrect because control prioritization refers to the process of prioritizing controls based on their importance and effectiveness in mitigating risks, rather than assessing weaknesses or security risks associated with an application.

D. Attack Surface Evaluation - This option is incorrect because an attack surface evaluation is a process of identifying and analyzing the potential points of vulnerability in an application or system, rather than assessing weaknesses or security risks associated with an application.

The correct answer is B) Threat Modeling. This option is correct because threat modeling is a process specifically designed for assessing and documenting the weaknesses or security risks associated with an application.

Find more quizzes: