Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-96 Topic 7 Question 34 Discussion

Actual exam question for Eccouncil's 312-96 exam
Question #: 34
Topic #: 7
[All 312-96 Questions]

Which of the following can be derived from abuse cases to elicit security requirements for software system?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Lashandra
3 days ago
I'm going to go with B) Data flow diagram. That's the only option that seems completely unrelated to the question, so it must be the wrong answer. A little humor never hurts, right?
upvoted 0 times
...
Michael
4 days ago
Definitely D) Security use cases. Abuse cases are all about identifying potential security threats, so that's the logical choice here.
upvoted 0 times
...
Amie
10 days ago
I'm not sure, but I think D) Security use cases could also be derived from abuse cases to elicit security requirements.
upvoted 0 times
...
Cassi
12 days ago
I agree with Lorean, because abuse cases can help identify potential misuse scenarios.
upvoted 0 times
...
Lorean
16 days ago
I think the answer is A) Misuse cases.
upvoted 0 times
...
Ailene
17 days ago
I'm torn between A) Misuse cases and D) Security use cases. Both seem relevant, but I'm going to go with D to be safe.
upvoted 0 times
Elouise
2 days ago
I think both A) Misuse cases and D) Security use cases are important.
upvoted 0 times
...
...
Sarina
18 days ago
Hmm, I think the correct answer is D) Security use cases. Abuse cases should help us identify the security requirements for the system.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77