Which of the following is NOT an effective way of carrying out threat analysis
Working through a series of attack scenarios fine-tuned to the organization's threats and vulnerabilities
Initiating a fictional but realistic attack internally and assessing the response
Engaging in periodic scenario-based training
Consulting with the government, collaborative groups, and competitors for threat intelligence