|  | The first step in analyzing the attack surface is ________. Choose the correct option from below list
 (1)Understanding the context
 (2)Information gathering
 (3)Creating a threat model
 (4)Identifying all input to the code
 
 Answer:-(4)Identifying all input to the code
 |  |  |