Which of the following is NOT a commonly used method for identifying risks to information systems?
Vulnerability scanning
Code review
Expert elicitation
Threat modeling

Information Security Exercises are loading ...