Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-96 Topic 7 Question 34 Discussion

Actual exam question for Eccouncil's 312-96 exam
Question #: 34
Topic #: 7
[All 312-96 Questions]

In which phase of secure development lifecycle the threat modeling is performed?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Valentin
8 days ago
Design phase, obviously. How else are we supposed to build a secure system if we don't model the threats first? Unless, of course, we're aiming for a 'surprise' factor.
upvoted 0 times
...
Zana
9 days ago
Threat modeling? Is that when we throw threats at the system to see if it can handle the pressure? I'll go with C. Deployment phase.
upvoted 0 times
...
Barrett
11 days ago
D. Design phase. That's when the architects and security experts should be collaborating to anticipate and mitigate threats.
upvoted 0 times
Callie
4 days ago
A) Coding phase
upvoted 0 times
...
...
Jina
13 days ago
I believe threat modeling is actually done in the Testing phase to ensure that security vulnerabilities are identified before deployment.
upvoted 0 times
...
Walker
18 days ago
I thought it was during the coding phase, where we actually implement the security controls. But I guess the design phase makes more sense.
upvoted 0 times
Verona
4 days ago
User 2: Verona, actually threat modeling is performed during the design phase.
upvoted 0 times
...
Sage
10 days ago
User 1: I thought it was during the coding phase, where we actually implement the security controls.
upvoted 0 times
...
...
Pamela
27 days ago
I agree with Leah, threat modeling should be done in the Design phase to identify potential security threats early on.
upvoted 0 times
...
Vernell
1 months ago
Definitely the design phase. Threat modeling is crucial to identify potential vulnerabilities early on.
upvoted 0 times
Quentin
3 days ago
C) Deployment phase
upvoted 0 times
...
Gail
5 days ago
B) Testing phase
upvoted 0 times
...
Carissa
23 days ago
A) Coding phase
upvoted 0 times
...
...
Leah
1 months ago
I think threat modeling is performed in the Design phase.
upvoted 0 times
...

Save Cancel