Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-96 Topic 7 Question 34 Discussion

Actual exam question for Eccouncil's 312-96 exam
Question #: 34
Topic #: 7
[All 312-96 Questions]

Which of the following can be derived from abuse cases to elicit security requirements for software system?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Talia
1 months ago
I'm with Lashandra on this one. Data flow diagrams? Really? That's about as relevant as a penguin in a desert!
upvoted 0 times
Fernanda
1 days ago
D) Security use cases
upvoted 0 times
...
Willard
19 days ago
C) Use cases
upvoted 0 times
...
Daron
23 days ago
A) Misuse cases
upvoted 0 times
...
...
Lashandra
1 months ago
I'm going to go with B) Data flow diagram. That's the only option that seems completely unrelated to the question, so it must be the wrong answer. A little humor never hurts, right?
upvoted 0 times
...
Michael
1 months ago
Definitely D) Security use cases. Abuse cases are all about identifying potential security threats, so that's the logical choice here.
upvoted 0 times
...
Amie
2 months ago
I'm not sure, but I think D) Security use cases could also be derived from abuse cases to elicit security requirements.
upvoted 0 times
...
Cassi
2 months ago
I agree with Lorean, because abuse cases can help identify potential misuse scenarios.
upvoted 0 times
...
Lorean
2 months ago
I think the answer is A) Misuse cases.
upvoted 0 times
...
Ailene
2 months ago
I'm torn between A) Misuse cases and D) Security use cases. Both seem relevant, but I'm going to go with D to be safe.
upvoted 0 times
Tyisha
24 days ago
Great choice, D) Security use cases can help ensure comprehensive security requirements.
upvoted 0 times
...
Charlette
27 days ago
That's a good point, I'll go with D) Security use cases as well.
upvoted 0 times
...
Chun
1 months ago
I agree, but I believe D) Security use cases would cover more aspects.
upvoted 0 times
...
Elouise
1 months ago
I think both A) Misuse cases and D) Security use cases are important.
upvoted 0 times
...
...
Sarina
2 months ago
Hmm, I think the correct answer is D) Security use cases. Abuse cases should help us identify the security requirements for the system.
upvoted 0 times
...

Save Cancel