Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


In the threat modeling process, what is the first step to perform?

  1. Application overview

  2. Identify threats

  3. Identify vulnerabilities

  4. Identify security objectives

The correct answer is: Identify vulnerabilities

In the threat modeling process, the first step is to create an application overview. This step involves understanding the application's architecture, its components, and how they interact with one another and with external systems. An application overview establishes a clear context for the subsequent steps in threat modeling, which include identifying potential threats and vulnerabilities relevant to that specific application. By focusing first on the application overview, teams can better understand the environment in which the application operates, the data flows, user interactions, and any specific technologies in use. This foundational knowledge is crucial for accurately assessing threats and determining the security objectives tailored to the application's needs. Identifying threats and vulnerabilities comes later in the process, once there is a solid understanding of what the application entails. This sequential approach ensures that the threat modeling is both relevant and effective in addressing potential risks within the application's ecosystem.