| The first step in analyzing the attack surface is ________.
Choose the correct option from below list
(1)Understanding the context
(2)Information gathering
(3)Creating a threat model
(4)Identifying all input to the code
Answer:-(4)Identifying all input to the code | | |