Question 1
When performing a threat model, what is the primary purpose of identifying 'attack vectors'?
Question 2
In the context of threat modeling, what does the term 'trust boundary' refer to?
Question 3
Which of the following best describes the 'DREAD' model in threat modeling?
Question 4
In the context of threat modeling, what is the significance of creating a visual representation?
Question 5
What is the primary goal of mitigation strategies in threat modeling?