easy
Single Answer

Denis is performing threat modeling and decides that it would be useful to decompose the system into the core elements shown here. What tool is he using?

Answer Options

A

Vulnerability assessment

B

Fuzzing

C

Reduction analysis

D

Data modeling

Correct Answer: C

Explanation

In reduction analysis, the security professional breaks the system down into five core elements: trust boundaries, data flow paths, input points, privileged operations, and details about security controls.

View Reference Material