What concept does the "T" represent in the STRIDE threat model? A. TLS B. Testing C. Tampering with data D. Transport Suggested Answer: C Community Answer: C Explanation - Any application that sends data to the user will face the potential that the user could manipulate or alter the data, whether it resides in cookies, GET or POST commands, or headers, or manipulates client-side validations. If the user receives data from the application, it is crucial that the application validate and verify any data that is received back from the user. This question is in CCSP Certified Cloud Security Professional Exam For getting Certified Cloud Security Professional (CCSP) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISC. Trademarks, certification & product names are used for reference only and belong to ISC. The website does not contain actual questions and answers from ISC's Certification Exams.
Please login or Register to submit your answer