

MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Software Engg knowledge and support exam preparation. Choose a topic below to get started.
1. |
CIRCUMSTANCES_THAT_HAVE_POTENTIAL_TO_CAUSE_LOSS_OR_HARM_IS_KNOWN_AS?$ |
A. | Attack |
B. | Threat |
C. | Vulnerability |
D. | Control |
Answer» C. Vulnerability | |
2. |
THE_RECORDS_OF_EACH_PATIENT_THAT_IS_RECEIVING_OR_HAS_RECEIVED_TREATMENT_RESEMBLES_WHICH_SECURITY_CONCEPT_??$ |
A. | Asset |
B. | Threat |
C. | Vulnerability |
D. | Control |
Answer» B. Threat | |
3. |
An impersonation of an authorised user is an example of a security threat? |
A. | True |
B. | False |
Answer» C. | |
4. |
A system resource that has a value and has to be protected is known as |
A. | Asset |
B. | Control |
C. | Vulnerability |
D. | None of the mentioned |
Answer» B. Control | |
5. |
What is Life cycle risk assessment ? |
A. | Risk assessment before the system has been deployed |
B. | Risk assessment while the system is being developed |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
6. |
Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering. |
A. | Fault avoidance |
B. | Fault tolerance |
C. | Fault detection |
D. | Fault Recovery |
Answer» B. Fault tolerance | |
7. |
Controls that are intended to repel attacks is analogous to ____________ in dependability engineering. |
A. | Fault avoidance |
B. | Fault tolerance |
C. | Fault detection |
D. | None of the mentioned |
Answer» C. Fault detection | |
8. |
What are security controls ? |
A. | Controls that are intended to ensure that attacks are unsuccessful |
B. | Controls that are intended to detect and repel attacks |
C. | Controls that are intended to support recovery from problems |
D. | All of the mentioned |
Answer» E. | |
9. |
Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks. |
A. | True |
B. | False |
Answer» C. | |
10. |
Which of the following is a layer of protection for Security ? |
A. | Platform-level protection |
B. | Application-level protection |
C. | Record-level protection |
D. | All of the mentioned |
Answer» E. | |