exam questions

Exam 312-85 All Questions

View all questions & answers for the 312-85 exam

Exam 312-85 topic 1 question 17 discussion

Actual exam question from ECCouncil's 312-85
Question #: 17
Topic #: 1
[All 312-85 Questions]

Lizzy, an analyst, wants to recognize the level of risks to the organization so as to plan countermeasures against cyber attacks. She used a threat modelling methodology where she performed the following stages:
Stage 1: Build asset-based threat profiles
Stage 2: Identify infrastructure vulnerabilities
Stage 3: Develop security strategy and plans
Which of the following threat modelling methodologies was used by Lizzy in the aforementioned scenario?

  • A. TRIKE
  • B. VAST
  • C. OCTAVE
  • D. DREAD
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BionicBeaver
11 months ago
Selected Answer: C
Answer is C As per Module 05 Page 460 of CTIA Courseware
upvoted 2 times
...
Anzk
11 months, 2 weeks ago
ec council ref page 460. Octave is the right answer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...