Why might a company implement a threat tree? a. To define firewall settings b. To monitor employee logins c. To store passwords d. To visualize how threats can exploit vulnerabilities and plan mitigations
d. To visualize how threats can exploit vulnerabilities and plan mitigations
A threat tree is a structured approach used to identify and understand the various ways in which potential threats can exploit vulnerabilities in a system, and it helps in planning appropriate mitigations to address those threats.