Which three steps of the defense-centric threat modeling process are concerned with understanding the IoT system? (Choose three.)
- Document the IoT system architecture.
- Identify and rate threats.
- Identify security objectives.
- Develop mitigation processes.
- Recommend mitigation.
- Decompose the IoT system.
Explanation: The three steps concerned with understanding the IoT system are identify security objectives, document the IoT system architecture, and decompose the IoT system.
Exam with this question: IoT Security 1.1 Chapter 6 Quiz Answers
Please login or Register to submit your answer