MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Software Engg knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
CIRCUMSTANCES_THAT_HAVE_POTENTIAL_TO_CAUSE_LOSS_OR_HARM_IS_KNOWN_AS?$ |
| A. | Attack |
| B. | Threat |
| C. | Vulnerability |
| D. | Control |
| Answer» C. Vulnerability | |
| 2. |
THE_RECORDS_OF_EACH_PATIENT_THAT_IS_RECEIVING_OR_HAS_RECEIVED_TREATMENT_RESEMBLES_WHICH_SECURITY_CONCEPT_??$ |
| A. | Asset |
| B. | Threat |
| C. | Vulnerability |
| D. | Control |
| Answer» B. Threat | |
| 3. |
An impersonation of an authorised user is an example of a security threat? |
| A. | True |
| B. | False |
| Answer» C. | |
| 4. |
A system resource that has a value and has to be protected is known as |
| A. | Asset |
| B. | Control |
| C. | Vulnerability |
| D. | None of the mentioned |
| Answer» B. Control | |
| 5. |
What is Life cycle risk assessment ? |
| A. | Risk assessment before the system has been deployed |
| B. | Risk assessment while the system is being developed |
| C. | All of the mentioned |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 6. |
Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering. |
| A. | Fault avoidance |
| B. | Fault tolerance |
| C. | Fault detection |
| D. | Fault Recovery |
| Answer» B. Fault tolerance | |
| 7. |
Controls that are intended to repel attacks is analogous to ____________ in dependability engineering. |
| A. | Fault avoidance |
| B. | Fault tolerance |
| C. | Fault detection |
| D. | None of the mentioned |
| Answer» C. Fault detection | |
| 8. |
What are security controls ? |
| A. | Controls that are intended to ensure that attacks are unsuccessful |
| B. | Controls that are intended to detect and repel attacks |
| C. | Controls that are intended to support recovery from problems |
| D. | All of the mentioned |
| Answer» E. | |
| 9. |
Security engineering is only concerned with maintenance of systems such that they can resist malicious attacks. |
| A. | True |
| B. | False |
| Answer» C. | |
| 10. |
Which of the following is a layer of protection for Security ? |
| A. | Platform-level protection |
| B. | Application-level protection |
| C. | Record-level protection |
| D. | All of the mentioned |
| Answer» E. | |