Which three steps of the defense-centric threat modeling process are concerned with understanding the IoT system? (Choose three.)

IT Questions BankCategory: IoT SecurityWhich three steps of the defense-centric threat modeling process are concerned with understanding the IoT system? (Choose three.)

Which three steps of the defense-centric threat modeling process are concerned with understanding the IoT system? (Choose three.)

  • Document the IoT system architecture.
  • Identify and rate threats.
  • Identify security objectives.
  • Develop mitigation processes.
  • Recommend mitigation.
  • Decompose the IoT system.

Explanation: The three steps concerned with understanding the IoT system are identify security objectives, document the IoT system architecture, and decompose the IoT system.

More Questions: IoT Security 1.1 Chapter 6 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x