New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Isaca Certified Information Systems Auditor CISA Question # 411 Topic 42 Discussion

Isaca Certified Information Systems Auditor CISA Question # 411 Topic 42 Discussion

CISA Exam Topic 42 Question 411 Discussion:
Question #: 411
Topic #: 42

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?


A.

Threat modeling


B.

Concept mapping


C.

Prototyping


D.

Threat intelligence


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.