easy
Single Answer
Denis is performing threat modeling and decides that it would be useful to decompose the system into the core elements shown here. What tool is he using?
Answer Options
A
Vulnerability assessment
B
Fuzzing
C
Reduction analysis
D
Data modeling
Correct Answer: C
Explanation
In reduction analysis, the security professional breaks the system down into five core elements: trust boundaries, data flow paths, input points, privileged operations, and details about security controls.