Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

WGU (D487, KEO1) Secure Software Design Exam - Topic 4 Question 8 Discussion

Actual exam question for WGU's WGU (D487, KEO1) Secure Software Design exam
Question #: 8
Topic #: 4
[All WGU (D487, KEO1) Secure Software Design Questions]

In which step of the PASTA threat modeling methodology will the team capture infrastructure, application, and software dependencies?

Show Suggested Answer Hide Answer
Suggested Answer: B

The step of the PASTA threat modeling methodology where the team will capture infrastructure, application, and software dependencies is the Define technical scope step. This step involves detailing the technical elements of the project, which includes understanding and documenting the infrastructure, applications, and software dependencies that are critical to the system's operation and security.


Contribute your Thoughts:

0/2000 characters
Kristeen
4 days ago
I feel like we discussed this in class, and it was related to defining objectives, but I could be mixing it up with another topic.
upvoted 0 times
...
Derick
9 days ago
I’m not entirely sure, but I remember something about dependencies being part of the attack modeling phase.
upvoted 0 times
...
Noelia
14 days ago
I think it might be in the "Define technical scope" step, where you outline what systems are involved.
upvoted 0 times
...

Save Cancel