Isaca Certified Information Systems Auditor CISA Question # 411 Topic 42 Discussion

Isaca Certified Information Systems Auditor CISA Question # 411 Topic 42 Discussion

CISA Exam Topic 42 Question 411 Discussion:
Question #: 411
Topic #: 42

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?


A.

Threat modeling


B.

Concept mapping


C.

Prototyping


D.

Threat intelligence


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.