ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 30 Topic 4 Discussion

ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 30 Topic 4 Discussion

212-82 Exam Topic 4 Question 30 Discussion:
Question #: 30
Topic #: 4

Martin, a network administrator at an organization, received breaching alerts for an application. He identified that a vulnerability in the application allowed attackers to enter malicious input. Martin evaluated the threat severity and extent of damage that could be caused by this vulnerability. He then escalated the issue to the security management team to determine appropriate mitigation strategies. In which of the following threat-modeling steps did Martin evaluate the severity level of the threat?


A.

Identify vulnerabilities


B.

Application overview


C.

Risk and impact analysis


D.

Decompose the application


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.