Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Isaca Certified Information Systems Auditor CISA Question # 406 Topic 41 Discussion

Isaca Certified Information Systems Auditor CISA Question # 406 Topic 41 Discussion

CISA Exam Topic 41 Question 406 Discussion:
Question #: 406
Topic #: 41

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?


A.

Threat modeling


B.

Concept mapping


C.

Prototyping


D.

Threat intelligence


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.