WGU Secure-Software-Design Question Answer
Which threat modeling step identifies the assets that need to be protected?
Set the Scope
Analyze the Target
Rate Threats
Identify and Document Threats
TESTED 01 Jan 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved