Add to Chrome
✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
In threat modeling, what is a key consideration for identifying business logic vulnerabilities?
The complexity of encryption algorithms used.
The size of the application’s codebase.
The strength of password policies.
Whether the workflows align with business rules and cannot be exploited.
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!