nerdexam
EC-CouncilEC-Council

212-82 · Question #46

212-82 Question #46: Real Exam Question with Answer & Explanation

The correct answer is C: Risk and impact analysis. Risk and impact analysis is the threat-modeling step in which Martin evaluated the severity level of the threat in the above scenario. Threat modeling is a process that involves identifying, analyzing, and mitigating threats and risks to a system or network. Threat modeling can b

Submitted by sofia.br· Mar 6, 2026Application Security for Cloud

Question

Martin, a network administrator at an organization, received breaching alerts for an application. He identified that a vulnerability in the application allowed attackers to enter malicious input. Martin evaluated the threat severity and extent of damage that could be caused by this vulnerability. He then escalated the issue to the security management team to determine appropriate mitigation strategies. In which of the following threat-modeling steps did Martin evaluate the severity level of the threat?

Options

  • AIdentify vulnerabilities
  • BApplication overview
  • CRisk and impact analysis
  • DDecompose the application

Explanation

Risk and impact analysis is the threat-modeling step in which Martin evaluated the severity level of the threat in the above scenario. Threat modeling is a process that involves identifying, analyzing, and mitigating threats and risks to a system or network. Threat modeling can be used to improve the security and resilience of a system or network by applying various methods or techniques, such as STRIDE, DREAD, PASTA, etc. Threat modeling consists of various steps or phases that perform different tasks or roles. Risk and impact analysis is a threat-modeling step that involves assessing the likelihood and consequences of threats and risks to a system or network.Risk and impact analysis can be used to evaluate the severity level of threats and risks and prioritize them for mitigation.In the scenario, Martin received breaching alerts for an application. He identified that a vulnerability in the application allowed attackers to enter malicious input. Martin evaluated the threat severity and extent of damage that could be caused by this vulnerability. He then escalated the issue to the security management team to determine appropriate mitigation strategies. This means that he performed risk and impact analysis for this purpose. Identify vulnerabilities is a threat-modeling step that involves finding and documenting the weaknesses or flaws in a system or network that can be exploited by threats or risks.Application overview is a threat-modeling step that involves defining and understanding the scope, architecture, components, and functionality of a system or network.Decompose the application is a threat-modeling step that involves breaking down a system or network into smaller and simpler elements, such as data flows, processes, assets, etc.

Topics

#Threat modeling#Risk analysis#Vulnerability assessment#Application security

Community Discussion

No community discussion yet for this question.

Full 212-82 PracticeBrowse All 212-82 Questions